DevOps Glossary

From agile to automation to analytics, unpack the toolbox of modern

DevOps terminology.

Log Levels

Categories used to distinguish the importance and nature of logged messages, aiding in log analysis and troubleshooting.

Log Management

Process of collecting, storing, analyzing, and disposing of log data generated by various IT systems and applications.

Log Management Policy

Set of guidelines and procedures governing the collection, storage, analysis, and retention of log data within an organization.

Log Management Process

Systematic approach to collecting, storing, analyzing, and disposing of log data.

Log Rotation

Process of archiving filled log files and starting new ones to prevent excessive disk space usage.

Log.io

Real-time log monitoring tool that allows users to view and search logs from multiple sources in a single web-based interface.

LogShell Vulnerability

Critical security flaw in the Log4j library, allowing remote code execution and posing significant security risks.

Loggly

Cloud-based log management and analytics service that helps organizations collect, analyze, and act on machine-generated data from various sources.

Logstash

Open-source data processing pipeline that ingests data from multiple sources simultaneously.

Logster

Utility for reading log files and generating metrics for monitoring systems like Graphite and Ganglia.

Loom

Project aimed at adding lightweight concurrency and new programming models to Java.

Low-code

Software development approach requiring little to no coding to build applications and processes.

M Silicon

Apple's custom-designed ARM-based processors for Mac computers, offering improved performance and energy efficiency.

MITRE ATT&CK

Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

MLOps

Set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.

MTTI

Mean Time to Identify; average time between the start of an incident and its discovery.

MTTR (Mean Time To Recovery)

Average time required to repair a failed system and restore it to normal operation, a key metric for measuring system reliability.

Machine Data

Digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.

Machine Learning (ML)

Field of study giving computers the ability to learn without being explicitly programmed.

Magecart

Group of threat actors that specialize in stealing credit card data from online stores.

Managed Detection and Response

Cybersecurity service that combines technology and human expertise to rapidly identify and respond to threats.

Managed SIEM

Security Information and Event Management offered as a managed service, providing expert monitoring and threat detection.

Managing Secrets

Process of securely storing and handling sensitive information like passwords and API keys.

Mass Assignment

Vulnerability where an active record pattern in a web application is abused to modify data items that the user should not be allowed to access.

Maturity Model

Structured representation of improvement across multiple dimensions of an organization or service.