Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to a business.
DevOps

Compliance Level

Degree to which an organization meets regulatory or industry-specific requirements.
DevOps

Compliance as Code

Approach to maintaining regulatory compliance by defining compliance requirements as code, enabling automation and consistency.
DevOps

Complicated-subsystem Team

Team responsible for a specific complex component within a larger system, requiring specialized knowledge.
DevOps

ConDep

Open-source tool for automating continuous deployment and server provisioning, simplifying infrastructure management.
DevOps

Configuration Drift

Inconsistencies between the desired configuration state and the actual state of a system.
DevOps

Configuration Management

Process of maintaining systems, such as computer servers, in a desired, consistent state across time.
DevOps

Configuration as Code (CaC)

Managing and provisioning computing infrastructure through machine-readable definition files.
DevOps

Constraint

Limitation or restriction in a system that affects its performance or capacity, often a focus in optimization efforts.
DevOps

Consul

Service networking platform to connect and secure services across any runtime platform and cloud.
DevOps

Container Image

Lightweight, standalone, executable package of software that includes everything needed to run an application.
DevOps

Container Registry

Centralized repository for storing, managing, and distributing container images, crucial for container-based development and deployment.
DevOps

Containerization

Encapsulating an application and its environment to ensure consistent operation across different computing environments.
DevOps

Containers

Lightweight, standalone executable packages of software that include everything needed to run an application.
DevOps

Containers-as-a-Service (CaaS)

Model where container engines, orchestration and underlying compute resources are provided on-demand.
DevOps

Content Delivery Network (CDN)

Geographically distributed network of proxy servers to provide high availability and performance.
DevOps

Continuous Compliance

Ongoing process of adhering to regulatory and security standards throughout the development lifecycle.
DevOps

Continuous Delivery (CD)

Approach where teams produce software in short cycles, ensuring it can be reliably released at any time.
DevOps

Continuous Delivery Pipeline

Automated implementation of an application's build, deploy, test, and release process.
DevOps

Continuous Deployment (CD)

Practice of automatically deploying every change that passes all stages of the production pipeline.
DevOps

Continuous Feedback

Constant flow of information about a product or process to facilitate continuous improvement.
DevOps

Continuous Governance

Ongoing process of implementing and monitoring policies and controls in software development.
DevOps

Continuous Improvement

Ongoing effort to enhance products, services, or processes, central to many management philosophies including Lean and Six Sigma.
DevOps

Continuous Integration (CI)

Development practice where code changes are automatically built, tested, and prepared for a release.
DevOps

Continuous Integration and Deployment (CI/CD)

Combined practices of Continuous Integration and either Continuous Delivery or Continuous Deployment.
DevOps

Continuous Intelligence

Real-time analytics embedded into business operations, processing current and historical data.
DevOps

Continuous Learning Culture

Organizational approach that encourages ongoing skill development and knowledge sharing.
DevOps

Continuous Monitoring

Automated process of identifying compliance and security risks in an IT infrastructure.
DevOps

Continuous Quality

Ongoing process of building quality assurance into every step of the development lifecycle.
DevOps

Continuous Quality Improvement (CQI)

Systematic approach to enhancing processes and products to achieve better performance.
DevOps

Continuous Reliability

Practice of building and maintaining reliable systems through constant monitoring and improvement.
DevOps

Continuous Security

Integrating security practices throughout the entire software development and deployment lifecycle.
DevOps

Continuous Testing

Process of executing automated tests as part of the software delivery pipeline to obtain feedback on business risks.
DevOps

Contract Testing

Testing method that verifies interactions at the boundary of an external service meet expectations.
DevOps

Cordova

Mobile application development framework that allows developers to build mobile apps using web technologies like HTML, CSS, and JavaScript.
DevOps

CoreOS

Lightweight Linux operating system designed for providing infrastructure to clustered deployments, now part of Red Hat.
DevOps

Coupon Scraping

Automated collection of online coupon codes, often to exploit promotional offers.
DevOps

Create Test for Every Bug

Practice of writing a test that reproduces a bug before fixing the issue, ensuring the bug doesn't recur.
DevOps

Credential Abuse

Unauthorized use of valid credentials to gain access to systems or data, often resulting from poor password practices or stolen credentials.
DevOps

Credential Stuffing

Cyberattack method where stolen account credentials are used to gain unauthorized access to user accounts through large-scale automated login requests.
DevOps

Credmgr

Credential manager tool for securely storing and managing passwords and other secrets.
DevOps

Cron Job

Time-based job scheduler in Unix-like operating systems, used to automate system maintenance or administration tasks.
DevOps

Cross Platform

Ability of software or hardware to work across different types of platforms or operating systems.
DevOps

Cross-Functional Team

Group of people with different functional expertise working toward a common goal.
DevOps

Cross-Site Scripting (XSS)

Security vulnerability allowing attackers to inject client-side scripts into web pages viewed by others.
DevOps

CruiseControl

Java-based framework for creating a custom continuous integration and deployment environment, popular in early CI/CD implementations.
DevOps

Cryptomining Malware

Malicious software that uses system resources to mine cryptocurrency without user consent.
DevOps

Culture

Shared values, beliefs, and practices that characterize an organization, crucial in shaping DevOps and Agile transformations.
DevOps

Cumulative Layout Shift (CLS)

Web performance metric measuring visual stability, quantifying how much page content unexpectedly shifts during loading.
DevOps

Cybersecurity

Practice of protecting systems, networks, and programs from digital attacks, crucial in today's interconnected world.
DevOps

DAST

Dynamic Application Security Testing; analyzes running applications to find vulnerabilities.
DevOps

DDoS

Distributed Denial of Service; cyberattack that floods a system with traffic to make it unavailable.
DevOps

DNS Lookup Time

Time taken to query the Domain Name System to translate a domain name into an IP address.
DevOps

DORA Metrics

Four key metrics (deployment frequency, lead time for changes, time to restore service, change failure rate) used to measure software delivery performance.
DevOps

Dark Launch

Technique of releasing features to production that are invisible to users until activated, allowing for testing in real environments.
DevOps

Dark Launching

Deploying code or feature flags to production without making them visible to users.
DevOps

Dark Release

Releasing new features to production that are invisible to users until activated.
DevOps

Dashboards

Visual displays of key performance indicators and metrics, providing at-a-glance views of business performance or system status.
DevOps

Data Breach

Incident where sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by unauthorized individuals.
DevOps

Data Leakage

Unauthorized transmission of data from within an organization to an external destination or recipient.
DevOps

Data Loss Prevention (DLP)

Set of tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
DevOps

Data Security

Protective measures applied to prevent unauthorized access to databases, websites, and computers.
DevOps

Database Management

Process of storing, organizing, and managing data in databases, ensuring data integrity, security, and accessibility.
DevOps

Database Versioning

Practice of keeping different versions of database schemas, often in conjunction with application versioning.
DevOps

Datadog

Monitoring and analytics platform for cloud-scale applications, providing full-stack observability for IT infrastructure and application performance.
DevOps

Dead Code

Source code that's never executed or has no effect on program output, often a target for removal to improve maintainability and performance.
DevOps

Declarative Infrastructure

Defining infrastructure using a descriptive model, focusing on what should be deployed rather than how.
DevOps

Dedicated Environment

Computing resources exclusively allocated to a single user, project, or organization.
DevOps

Defense-in-Depth (DiD)

Cybersecurity strategy that employs multiple layers of security controls to protect assets and data from various types of threats.
DevOps

Definition of Done

Agreed-upon set of items that must be completed before a project or user story can be considered complete.
DevOps

Deis

Open-source Platform-as-a-Service (PaaS) that makes it easy to deploy and manage applications.
DevOps

Denial of Service (DoS)

Cyberattack aimed at making a machine or network resource unavailable to its intended users.
DevOps

Deploykit

Tool designed to simplify and automate the process of deploying software applications across different environments and platforms.
DevOps

Deployment

Process of making software available and ready for use in a specific environment.
DevOps

Deployment Frequency

Rate at which new code or features are deployed to production, often used as a key metric in DevOps practices.
DevOps

Deployment Pattern

Standardized approach to rolling out software updates or changes, ensuring consistency and reliability in the deployment process.
DevOps

Deployment Pipeline

Automated manifestation of the process for getting software from version control to users.
DevOps

Deployment Target

Specific environment or infrastructure where software is deployed, such as development, staging, or production environments.
DevOps

Design Patterns

Reusable solutions to commonly occurring problems in software design, providing tested, proven development paradigms.
DevOps

Dev (from DevOps)

Represents the development aspects in the DevOps methodology, focusing on software creation and testing processes.
DevOps

DevOps

Set of practices combining software development (Dev) and IT operations (Ops) to shorten the development lifecycle.
DevOps

DevOps Assembly Line

Series of automated steps for building, testing, and deploying software in a DevOps environment.
DevOps

DevOps Culture

Organizational culture that bridges the gap between development and operation teams.
DevOps

DevOps Engineer

Professional combining software development and IT operations skills to improve collaboration and productivity.
DevOps

DevOps Lifecycle

Continuous cycle of development, testing, deployment, and monitoring in DevOps practices.
DevOps

DevOps Model

Conceptual framework for integrating development and operations teams and practices.
DevOps

DevOps Pipeline

Automated processes and tools used to move code from development to production in DevOps.
DevOps

DevOps Team

Cross-functional team responsible for the entire software delivery process in a DevOps environment.
DevOps

DevOps-as-a-Service

Outsourcing of DevOps functions to a third-party provider, offering expertise and tools to improve software delivery processes.
DevOps

DevSecOps

Approach integrating security practices within the DevOps process, ensuring security is considered throughout the software development lifecycle.
DevOps

DevSecOps Pipeline

Automated workflow that integrates security at every phase of the software development lifecycle.
DevOps

DevXOps

Extension of DevOps principles to include all teams involved in delivering software.
DevOps

Developer Experience

Overall experience developers have when using tools, platforms, or processes in their work.
DevOps

Device Fingerprinting

Technique of collecting information about a device for identification purposes, used in security and fraud prevention.
DevOps

Diamond

Ruby-based system monitoring tool that collects metrics and allows configuring custom collectors.
DevOps

Digital Customer Experience

Overall experience a customer has with a brand through digital channels and touchpoints.
DevOps

Directory Traversal

Security vulnerability allowing attackers to access unauthorized directories, potentially exposing sensitive files.
DevOps

Distributed Tracing

Method of tracking application requests as they flow through distributed systems.
DevOps

Distributed Version Control System (DVCS)

Version control system where the complete codebase, including its full history, is mirrored on every developer's computer.
DevOps

Django Framework

High-level Python web framework that encourages rapid development and clean, pragmatic design.
DevOps
special ref

special ref

A Git reference with a specific meaning or function, such as HEAD or FETCH_HEAD.
staging instance

staging instance

A deployment environment used for testing changes before releasing to production in Git-based workflows.
star

star

A feature on Git hosting platforms allowing users to bookmark repositories of interest.
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Programmable Data Planes

Network architectures allowing customization of data packet processing in cloud infrastructure.

Progressive Delivery

Technique for gradually rolling out new features to subsets of users in cloud applications.

Pub/Sub Messaging

Asynchronous communication pattern for decoupled microservices in cloud architectures.

Pulumi

Infrastructure-as-Code tool for deploying and managing cloud resources using programming languages.

Quantum Annealing

Quantum computing technique for solving optimization problems in cloud environments.

Quantum Circuit Simulation

Cloud-based emulation of quantum circuits for algorithm development and testing.

Quantum Cloud API

Interface for accessing and controlling quantum computing resources in the cloud.

Quantum Computing as a Service

Cloud-based platforms offering access to quantum computing resources and algorithms.

Quantum Databases

Experimental database systems leveraging quantum principles for enhanced performance in the cloud.

Quantum Error Correction

Techniques for mitigating errors in quantum computations performed in cloud environments.

Quantum Internet Services

Experimental cloud services utilizing quantum communication for enhanced security and speed.

Quantum Key Distribution

Secure communication method using quantum mechanics principles in cloud environments.

Quantum Key Distribution (QKD) Networks

Infrastructure for ultra-secure data transmission using quantum principles in cloud systems.

Quantum Key Distribution Networks

Systems for ultra-secure data transmission using quantum mechanics in cloud environments.

Quantum Machine Learning

Applying quantum computing techniques to machine learning tasks in cloud environments.

Quantum Machine Learning Services

Cloud-based platforms offering quantum-enhanced machine learning algorithms and resources.

Quantum Optimization

Using quantum computing to solve complex optimization problems in cloud environments.

Quantum Programming Frameworks

Tools and libraries for developing quantum algorithms in cloud computing environments.

Quantum Resource Estimation

Assessing quantum computational requirements for algorithms in cloud environments.

Quantum Software Development Kit (SDK)

Tools for creating and testing quantum algorithms in cloud computing platforms, enabling quantum application development.

Quantum Supremacy

Demonstrating quantum computers' ability to outperform classical computers in specific tasks.

Quantum Volume

Metric for measuring the capability and performance of quantum computing systems in the cloud.

Quantum as a Service (QaaS)

Cloud-based access to quantum computing resources and algorithms, enabling exploration of quantum applications.

Quantum-Classical Hybrid Algorithms

Algorithms combining quantum and classical computing techniques for enhanced problem-solving in the cloud.

Quantum-Inspired Algorithms

Classical algorithms that emulate quantum computing concepts to solve problems efficiently in the cloud.

Quantum-Inspired Annealing

Optimization technique inspired by quantum annealing, used for complex problems in cloud computing.

Quantum-Inspired Anomaly Detection

Algorithms based on quantum concepts for identifying unusual patterns in cloud data.

Quantum-Inspired Cryptography

Encryption methods inspired by quantum principles, designed for use in classical cloud systems.

Quantum-Inspired Data Encoding

Techniques for data representation inspired by quantum states, used in classical cloud computing.

Quantum-Inspired Evolutionary Algorithms

Optimization methods combining evolutionary principles with quantum concepts in cloud environments.

Quantum-Inspired Feature Maps

Data transformation techniques based on quantum principles for machine learning in the cloud.

Quantum-Inspired Financial Modeling

Applying quantum-like algorithms to financial analysis and prediction in cloud environments.

Quantum-Inspired Generative Models

AI models for data generation based on quantum computing principles, used in classical cloud systems.

Quantum-Inspired Machine Learning

Classical ML algorithms incorporating quantum computing concepts for improved performance in the cloud.

Quantum-Inspired Natural Language Processing

NLP techniques leveraging quantum computing principles in classical cloud environments.

Quantum-Inspired Neural Networks

AI models mimicking both neural and quantum systems for enhanced learning in cloud computing.

Quantum-Inspired Optimization Algorithms

Classical algorithms using quantum-like approaches for solving complex optimization problems in the cloud.

Quantum-Inspired Reinforcement Learning

RL techniques incorporating quantum principles for improved decision-making in cloud environments.

Quantum-Inspired Sampling

Data sampling methods based on quantum principles, used in classical cloud computing tasks.

Quantum-Inspired Tensor Networks

Data structures and algorithms inspired by quantum tensor networks, used in classical cloud computing.

Quantum-Resistant Cryptography

Encryption methods designed to withstand attacks from future quantum computers in cloud systems.

Quantum-Resistant Databases

Database systems designed to maintain security against potential quantum computer attacks in the cloud.

Quantum-Resistant Hardware Security Modules

Cloud-based HSMs designed to resist attacks from both classical and quantum computers, ensuring long-term data protection.

Quantum-Safe Cryptography

Encryption techniques designed to be secure against both quantum and classical attacks in cloud environments.

Quantum-inspired AI Algorithms

Classical algorithms mimicking quantum principles to improve AI performance in cloud environments.

Query Optimization

Techniques for improving the efficiency and speed of database queries in cloud environments.

RI Utilization and Coverage

Metrics for assessing the usage and financial impact of Reserved Instances in cloud environments.

Re-platforming

Process of moving applications to a new cloud platform, often involving some code modifications.

Reactive Programming in the Cloud

Development paradigm for building responsive, resilient applications in cloud environments.

Read Replica

Copy of a database that allows read-only queries, improving performance and scalability in cloud environments.

Read Replicas

Multiple copies of a database for distributing read operations, enhancing performance in cloud systems.

Real-Time Analytics

Instantaneous processing and analysis of data as it's generated in cloud environments.

Real-Time Analytics Pipelines

Systems for continuous data processing and analysis in cloud environments with minimal latency.

Real-Time Data Harmonization

Process of standardizing diverse data formats in real-time within cloud environments.

Real-Time Data Synchronization

Ensuring immediate consistency of data across multiple cloud systems or locations.

Real-time Business Activity Monitoring

Continuous tracking and analysis of business processes in cloud-based systems, enabling rapid decision-making.

Real-time Data Integration

Combining data from multiple sources instantly in cloud-based systems, enabling up-to-date analytics and decision-making.

Real-time Regulatory Reporting

Instantaneous generation and submission of compliance reports in cloud environments.

Recommendation Systems

AI-driven tools suggesting items or actions to users based on data analysis in the cloud.

Regulatory Reporting

Generation and submission of compliance-related reports using cloud-based tools and data.

Regulatory Technology (RegTech) as a Service

Cloud-based solutions for managing regulatory compliance and reporting, streamlining governance processes.

Reinforcement Learning

AI technique where agents learn optimal behaviors through trial and error in cloud environments.

Reinforcement Learning Environments

Simulated or real-world scenarios for training AI agents in cloud-based systems.

Relational Database Service (e.g., Amazon RDS, Azure SQL Database)

Managed cloud service for deploying, operating, and scaling relational databases.

Renewable Energy Credits (RECs)

Certificates representing clean energy used to power cloud data centers, promoting sustainable cloud operations.

Renewable Energy Credits (RECs) Management

Tracking and optimizing the use of clean energy certificates in cloud operations.

Reproducible Research Platforms

Cloud-based environments ensuring scientific experiments can be replicated precisely.

Reserved Capacity Management

Optimizing the use of pre-purchased cloud resources to maximize cost savings and ensure resource availability.

Reserved Instance Management

Administering pre-purchased cloud instances to optimize costs and resource allocation.

Reserved Instance Planning

Strategizing the purchase of discounted cloud instances for long-term use to reduce costs.

Reserved Instances

Pre-purchased cloud compute capacity offered at a discount for a committed term.

Resource Graph

Visual representation of cloud resources and their relationships for better management and insight.

Resource Organization

Structuring and categorizing cloud resources for efficient management and access control.

Resource Quotas and Limits

Restrictions on the amount or type of cloud resources that can be consumed by a user or account.

Resource Tagging

Assigning metadata to cloud resources for better organization, management, and cost allocation.

Resource Tagging for Billing

Using metadata tags to track and allocate cloud costs across different projects or departments.

Retention Policies

Rules determining how long data is kept in cloud storage before being deleted or archived.

Right to be Forgotten

Data privacy principle allowing individuals to request deletion of their personal data from cloud systems.

Rightsizing

Adjusting cloud resource allocations to match actual usage, optimizing performance and cost.

Robot Fleet Management

Cloud-based systems for coordinating and monitoring multiple robots in industrial or commercial settings.

Robot as a Service (RaaS)

Cloud-based platform for remotely operating and managing robotic systems, enabling scalable robotics applications.

Robotic Process Automation (RPA) in the Cloud

Using cloud-based software robots to automate repetitive tasks and workflows, improving efficiency and accuracy.

Robotic Teleoperation via Cloud

Controlling robots remotely using cloud infrastructure for communication and processing.

Root Cause Analysis Automation

AI-driven tools for identifying the source of issues in cloud systems, speeding up troubleshooting and resolution.

Route Table

Configuration defining network traffic paths between subnets and gateways in cloud environments.

Runtime Application Self-Protection (RASP)

Security technology that detects and prevents attacks on cloud applications in real-time.

SOC 2 Compliance

Adherence to security and privacy standards for cloud service providers handling customer data.

SSL/TLS Certificates

Digital certificates ensuring secure, encrypted connections to cloud services and applications.

Savings Plans

Flexible pricing model offering lower prices on cloud compute usage in exchange for a commitment.

Secrets Management

Tools for securely storing, accessing, and managing sensitive information in cloud environments.

Secure Multi-Party Computation (SMPC) Platforms

Cloud services enabling collaborative computation while keeping individual inputs private.

Security Chaos Engineering

Proactively testing cloud system resilience by simulating security incidents and failures.

Security Group

Virtual firewall for controlling inbound and outbound traffic to cloud resources.

Security Groups

Virtual firewalls controlling inbound and outbound traffic for cloud instances within defined security rules.

Security Orchestration, Automation and Response (SOAR)

Platforms integrating security tools and automating incident response in the cloud.

Self-Driving Databases

Cloud databases using AI to automate administration, optimization, and security tasks.

Self-Service Analytics

Tools allowing non-technical users to perform data analysis in cloud environments without IT assistance.

Semantic Interoperability Frameworks

Standards enabling meaningful data exchange between different cloud systems and services.

Serverless AI

AI services that automatically scale and manage underlying infrastructure in cloud environments.

Serverless Application Model (SAM)

Framework for building and deploying serverless applications in cloud environments.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.