Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

I/O Throughput

Measure of the amount of data processed by a system's input/output operations in a given amount of time.
DevOps

IAST

Interactive Application Security Testing; security testing methodology that analyzes code for security vulnerabilities while the app is run.
DevOps

IDE

Integrated Development Environment; software application that provides comprehensive facilities to computer programmers for software development.
DevOps

IIS Log Viewer

Tool for analyzing and troubleshooting logs from Microsoft Internet Information Services.
DevOps

IIS Server

Microsoft's web server for hosting websites, web applications, and services on Windows operating systems, offering various features and security options.
DevOps

IOPS (Input/Output Operations per Second)

Performance measurement for storage devices, indicating how many read/write operations can be performed in one second.
DevOps

IT Infrastructure

Composite hardware, software, network resources, and services required for the existence, operation, and management of an enterprise IT environment.
DevOps

IT Operations

Daily work of managing the IT infrastructure and systems that support an organization's business operations.
DevOps

IT Operations Management (ITOM)

Practices and processes for operating, administering, and maintaining IT infrastructure and services.
DevOps

ITSI

IT Service Intelligence; uses machine learning for monitoring, anomaly detection, and service health.
DevOps

IaC (Infrastructure as Code)

Infrastructure as Code; managing and provisioning infrastructure through code instead of manual processes.
DevOps

IaaS (Infrastructure-as-a-Service)

Infrastructure as a Service; cloud-computing service in which compute, storage, and networking resources are provided on-demand.
DevOps

Icinga

Open source monitoring system checking availability and performance of network resources.
DevOps

Identity and Access Management (IAM)

Framework of policies and technologies for ensuring that the right users have the appropriate access to resources.
DevOps

Improper Assets Management

Security issue where an organization fails to properly inventory, update, and manage its IT assets.
DevOps

Incident

Any unplanned interruption or reduction in quality of a service, requiring prompt response and resolution to minimize impact.
DevOps

Incident Management

Structured approach to responding to and resolving IT service disruptions, minimizing their impact on business operations.
DevOps

Incident Prozess

The Incident Prozess involves identifying, managing, and resolving unexpected disruptions to restore normal service, minimizing impact and preventing recurrence.
DevOps

Incident Response

Organized approach to addressing and managing the aftermath of a security breach or attack.
DevOps

Indicators of Compromise (IoC)

Pieces of forensic data that identify potentially malicious activity on a network or system.
DevOps

InfluxDB

Open-source time series database designed to handle high write and query loads, often used for monitoring and metrics.
DevOps

Information Security Management

Set of policies and procedures for systematically managing an organization's sensitive data.
DevOps

Infrastructure

Composite of all DevOps components that make up an organization's environment, including hardware, software, and networking.
DevOps

Infrastructure Drift

Unplanned changes to infrastructure over time, deviating from the desired state.
DevOps

Infrastructure Management (IM)

Process of managing essential operation components, such as policies, processes, equipment, data, human resources, and external contacts.
DevOps

Infrastructure Metrics

Measurements used to assess the performance, health, and efficiency of IT infrastructure components.
DevOps

Infrastructure Monitoring

Process of collecting and analyzing data from infrastructure to ensure optimal performance.
DevOps

Infrastructure Resilience

Ability of IT infrastructure to withstand and recover from disruptions and disasters.
DevOps

Infrastructure as Code (IaC)

Managing and provisioning infrastructure through code instead of manual processes. Enables version control, automation, and consistent environments.
DevOps

Infrastructure as Code (IaC) Framework

Set of tools and practices for managing infrastructure through machine-readable definition files.
DevOps

Infrastructure as Data

Approach to infrastructure management where the desired state is described as data, not procedural code.
DevOps

Infrastructure as Software

Treating infrastructure configuration and management as a software development problem.
DevOps

Infrastructure on Demand

Ability to provision and de-provision infrastructure resources as needed, often in cloud environments.
DevOps

Infrastructure-as-a-Service (IaaS)

Cloud computing model providing virtualized computing resources over the internet. Users can rent servers, storage, networks, and operating systems.
DevOps

Ingress Controller

Kubernetes resource managing external access to services in a cluster, typically HTTP.
DevOps

Injection

Security vulnerability where untrusted data is sent to an interpreter as part of a command or query.
DevOps

Insecure Deserialization

Security vulnerability occurring when untrusted data is used to abuse the logic of an application.
DevOps

Insecure Direct Object Reference (IDOR)

Security flaw allowing attackers to bypass authorization and access resources directly by modifying the value of a parameter.
DevOps

Instance

Single copy of a running computer program, often referring to a virtual server in cloud computing.
DevOps

Insufficient Logging & Monitoring

Security weakness where systems lack adequate logging and real-time monitoring, hindering threat detection and forensics.
DevOps

Integration Testing

Phase in software testing where individual modules are combined and tested as a group.
DevOps

Intelligent Automation

Use of AI and machine learning to automate complex business processes and decisions.
DevOps

Interactive Application Security Testing (IAST)

Security testing tool that combines static and dynamic testing methods to detect vulnerabilities in running applications.
DevOps

Internal Developer Platform (IDP)

Set of tools and practices that improve developer experience and productivity within an organization.
DevOps

Internal Threat Intelligence

Process of gathering, analyzing, and disseminating information about potential internal security threats.
DevOps

Inventory Hoarding

Excessive accumulation of IT resources, often in cloud environments, leading to waste and inefficiency.
DevOps

Ionic

Open-source SDK for developing hybrid mobile applications using web technologies.
DevOps

Issue Tracking

Process of recording and following the progress of problems or tasks in a project.
DevOps

Iterations

Fixed time periods in Agile development during which a team completes a set amount of work.
DevOps

JVM Heap

Portion of memory where the Java Virtual Machine stores objects, crucial for application performance and garbage collection processes.
DevOps

JVM Threads

Lightweight processes within the Java Virtual Machine that allow concurrent execution of tasks in Java applications.
DevOps

Jamstack

Web development architecture based on client-side JavaScript, reusable APIs, and prebuilt Markup.
DevOps

Jcloud

Java library providing a multi-cloud abstraction layer, simplifying cloud platform interactions.
DevOps

Jenkins

Open-source automation server that enables developers to build, test, and deploy their software reliably.
DevOps

Jenkins Job

Runnable task configured in Jenkins, defining a series of related steps to be executed.
DevOps

Jenkins Pipeline

Suite of plugins supporting implementation and integration of continuous delivery pipelines into Jenkins.
DevOps

Jest

JavaScript testing framework designed to ensure correctness of any JavaScript codebase.
DevOps

Jetpack Compose

Modern toolkit for building native Android UI, using a declarative and composable approach.
DevOps

Jira

Project management tool used for issue tracking, bug tracking, and agile project management.
DevOps

Juju

Open-source application modeling tool for deploying, configuring, scaling, and operating software.
DevOps

KISS (Keep it simple, stupid)

Design principle stating that systems perform best when kept simple rather than made complicated.
DevOps

Kafka

Distributed event streaming platform capable of handling trillions of events a day.
DevOps

Kaizen

Japanese business philosophy of continuous improvement of working practices and personal efficiency.
DevOps

Kanban

Visual system for managing work as it moves through a process, emphasizing continuous delivery.
DevOps

Kanban Board

Visual representation of work items as they progress through different stages of a process.
DevOps

Kata

Programming exercise aimed at honing coding skills through practice and repetition, often used in coding dojos and training sessions.
DevOps

Keystroke Loggers

Software or hardware that records keyboard inputs, often used maliciously to capture sensitive information.
DevOps

Kibana

Data visualization and exploration tool for Elasticsearch, allowing users to create interactive dashboards and analyze large volumes of data.
DevOps

Kickstart

Method of performing automatic installation and configuration of operating systems, particularly in Linux.
DevOps

Kubernetes

Open-source system for automating deployment, scaling, and management of containerized applications.
DevOps

Kubernetes (K8s)

Alternative abbreviation for Kubernetes, where 8 replaces the eight letters between K and s.
DevOps

Kubernetes (Ks)

Alternate abbreviation for Kubernetes, the open-source container orchestration platform for automating application deployment and scaling.
DevOps

Kubernetes Cronjobs

Kubernetes object for creating recurring scheduled tasks, allowing automated execution of jobs at specified intervals.
DevOps

Kubernetes Monitoring

Observing and tracking the health, performance, and resource usage of Kubernetes clusters and applications.
DevOps

Kubernetes Operator

Method of packaging, deploying, and managing a Kubernetes application using custom resources and controllers.
DevOps

Kubernetes Pod

Smallest deployable unit in Kubernetes, consisting of one or more containers sharing storage and network resources.
DevOps

Kubernetes QoS

Quality of Service classes in Kubernetes that determine how pods are scheduled and evicted based on resource requirements.
DevOps

Kubernetes Replica

Identical copy of a pod, used to ensure specified number of pod instances are running at any given time.
DevOps

Kubernetes Workloads

Objects in Kubernetes that manage a set of pods, such as Deployments, StatefulSets, and DaemonSets.
DevOps

Lack of Resources

Insufficient tools, infrastructure, skills, or personnel needed to implement and maintain efficient CI/CD pipelines and automation processes.
DevOps

Largest Contentful Paint (LCP)

Metric measuring the render time of the largest image or text block visible within the viewport.
DevOps

Lead Time

Time between the initiation and completion of a process, often used in software development to measure efficiency.
DevOps

Lead Time for Changes

Metric measuring the time it takes for a commit to be deployed to production, indicating the efficiency of the development process.
DevOps

Leaking API

API that unintentionally exposes sensitive data or functionality, potentially leading to security vulnerabilities and data breaches.
DevOps

Lean

Methodology aimed at maximizing customer value while minimizing waste, applicable to various industries including software development.
DevOps

Lean IT

Application of lean manufacturing principles to IT operations, focusing on eliminating waste and improving efficiency in IT processes.
DevOps

Legacy Application

Outdated computer system, programming language or application software that is still in use.
DevOps

Linux

Open-source, Unix-like operating system kernel that forms the basis of many popular distributions, known for its stability and flexibility.
DevOps

Linux Out of Memory Killer (OOM Killer)

Linux kernel process that terminates applications in low memory situations to prevent system crashes.
DevOps

Load Balancer

Device that distributes network or application traffic across multiple servers to ensure no single server bears too much demand.
DevOps

Load Balancing

Process of distributing network traffic across multiple servers to ensure no single server bears too much demand.
DevOps

Local File Inclusion (LFI)

Vulnerability allowing an attacker to include files on a server through the web browser.
DevOps

Log Aggregation

Process of collecting and centralizing log data from multiple sources into a single, searchable repository for analysis and monitoring.
DevOps

Log Analysis

Process of examining log files to identify events, patterns, or anomalies, crucial for troubleshooting and security monitoring.
DevOps

Log Drain

Process of forwarding log data from its origin to a centralized log management system.
DevOps

Log Every Change

Practice of recording all modifications made to a system or application, crucial for auditing and troubleshooting.
DevOps

Log File

Record of events occurring within an organization's systems and networks, crucial for troubleshooting and security analysis.
DevOps

Log Levels

Categories used to distinguish the importance and nature of logged messages, aiding in log analysis and troubleshooting.
DevOps

Log Management

Process of collecting, storing, analyzing, and disposing of log data generated by various IT systems and applications.
DevOps

Log Management Policy

Set of guidelines and procedures governing the collection, storage, analysis, and retention of log data within an organization.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Hybrid Blockchain-Cloud Solutions

Systems integrating blockchain technology with traditional cloud services for enhanced security and transparency.

Hybrid Cloud Management

Tools and practices for managing resources across public and private cloud environments.

Hybrid Cloud Monitoring

Tracking performance and health of resources spanning both public and private cloud environments.

Hybrid Cloud Orchestration

Coordinating and automating workflows across multiple cloud environments and on-premises infrastructure.

Hybrid Cloud Storage

Data storage solutions that span both on-premises and cloud environments, offering flexible and scalable data management.

Hybrid Connectivity

Network solutions that connect on-premises infrastructure with cloud services, enabling seamless integration and data flow.

Hybrid Identity Management

Managing user identities and access across both on-premises systems and cloud services.

Hybrid Integration Platforms

Tools for connecting applications, data, and processes across on-premises and cloud environments.

Hybrid Quantum-Classical Algorithms

Computational methods combining quantum and classical processing in cloud environments.

Hybrid Quantum-Classical Computing

Using both quantum and classical computing resources in tandem for cloud-based problem-solving.

Hybrid Transactional/Analytical Processing (HTAP)

Database systems supporting both real-time transactions and analytics in cloud environments.

Hyperconverged Infrastructure (HCI)

Integrated compute, storage, and networking in a single cloud-managed system, simplifying data center architecture.

Hyperparameter Tuning

Process of optimizing machine learning model parameters in cloud-based environments.

Hypervisor

Software layer that manages virtual machines in cloud computing environments, enabling efficient resource utilization and isolation.

IAM Roles and Policies

Defined permissions and access controls for users and services in cloud environments.

ISO 27001 Certification

International standard for information security management in cloud environments.

Identity-Aware Proxies

Security tools that verify user identity before granting access to cloud applications.

Image Scanning

Automated process of examining container images for vulnerabilities in cloud environments.

Immutable Infrastructure Security

Security approach based on replacing rather than modifying cloud infrastructure components.

Immutable Storage

Cloud storage that prevents data modification after writing, ensuring data integrity and compliance.

In-Memory Database (e.g., Amazon ElastiCache, Azure Cache for Redis)

Database system that primarily uses main memory for data storage in cloud environments.

In-Memory Grid Computing

Distributed computing using the collective memory of networked computers in the cloud.

In-Network Computing

Processing data within network devices to reduce latency and bandwidth use in cloud architectures.

Incremental Computing Frameworks

Systems for efficiently updating computation results when input data changes in cloud environments.

Indexing

Process of organizing data to optimize query performance in cloud databases, enhancing search and retrieval efficiency.

Infrastructure as Code (IaC) Security Scanning

Automated tools for identifying security issues in infrastructure definition files.

Infrastructure as Code (IaC) Testing

Validating infrastructure definitions before deployment in cloud environments, ensuring reliability and consistency.

Infrastructure as a Service (IaaS)

Cloud-based provision of virtualized computing resources over the internet, including servers, storage, and networking.

Infrastructure-from-Code

Generating cloud infrastructure configurations directly from application code, streamlining development and deployment processes.

Instance Types (e.g., General Purpose, Compute Optimized, Memory Optimized)

Predefined virtual server configurations optimized for different use cases in cloud environments.

Integration Flow Designer

Visual tool for creating and managing data integration processes in cloud environments.

Integration Monitoring and Analytics

Tools for tracking and analyzing the performance of integrated cloud systems and processes.

Intelligent Tiering

Automated data storage class selection based on access patterns in cloud environments.

Intelligent Tiering for Storage

Automatic movement of data between storage tiers based on usage patterns in the cloud.

Intent-Based Networking

Network management approach using AI to automate configuration based on business intent.

Internet Gateway

Network node that connects cloud VPCs to the internet, enabling communication with external resources.

Interplanetary File System (IPFS) Cloud Storage

Decentralized storage system for distributing and accessing files in the cloud, enhancing data availability and resilience.

Intrusion Detection System (IDS)

Security tool that monitors network traffic for suspicious activity in cloud environments.

Intrusion Prevention System (IPS)

Security system that not only detects but also blocks potential threats in cloud networks.

IoT Analytics

Processing and analyzing data from Internet of Things devices in cloud environments.

IoT Anomaly Detection

Identifying unusual patterns in data from IoT devices using cloud-based analytics.

IoT Central (Azure)

Fully managed IoT application platform in the Azure cloud for connecting, monitoring, and managing IoT devices at scale.

IoT Data Ingestion

Process of collecting and importing data from IoT devices into cloud systems for storage, analysis, and processing.

IoT Data Lake

Centralized repository in the cloud for storing large volumes of IoT device data.

IoT Device Management

Cloud-based systems for monitoring, updating, and controlling IoT devices, ensuring efficient operation and security at scale.

IoT Device Provisioning

Process of setting up and configuring IoT devices for secure cloud connectivity.

IoT Device SDK

Software development kit for building applications that connect IoT devices to cloud services.

IoT Edge

Deploying cloud intelligence directly to IoT devices for local processing and analytics.

IoT Edge Computing

Processing data from IoT devices locally before sending to the cloud, reducing latency and bandwidth usage.

IoT Greengrass (AWS)

AWS service for running local compute, messaging, and data caching for connected IoT devices.

IoT Hub

Central message hub for bi-directional communication between IoT applications and devices.

IoT Integration Frameworks

Tools for connecting and managing diverse IoT devices and data streams in cloud environments.

IoT Lifecycle Management

Cloud-based tools for managing IoT devices from deployment through retirement, ensuring efficient device administration.

IoT Over-the-Air (OTA) Updates

Remote software updates for IoT devices managed through cloud platforms, ensuring device security and functionality.

IoT Platform as a Service (PaaS)

Cloud-based platform for developing, managing, and integrating IoT applications and devices.

IoT Protocols (MQTT, CoAP)

Lightweight communication protocols designed for IoT devices in cloud environments.

IoT Rules Engine

Cloud service for processing and acting on data from IoT devices based on predefined conditions.

IoT Security

Measures to protect IoT devices, data, and infrastructure in cloud-connected environments.

IoT Streaming Analytics

Real-time processing and analysis of data streams from IoT devices in the cloud.

Key Management Service (KMS)

Cloud service for creating and managing cryptographic keys for data encryption, ensuring secure data protection.

Knative

Kubernetes-based platform for building, deploying, and managing serverless workloads.

Kubeless

Kubernetes-native serverless framework enabling function deployment without managing underlying infrastructure.

Kubernetes Network Policies

Rules for controlling network traffic between pods in Kubernetes clusters, enhancing security in cloud-native environments.

Kubernetes Security Posture Management (KSPM)

Tools for assessing and improving security configurations in Kubernetes environments.

Kubernetes Services (e.g., Amazon EKS, Azure AKS, Google GKE)

Managed Kubernetes platforms offered by major cloud providers for container orchestration.

Kustomize

Kubernetes native configuration management tool for customizing application configurations.

Lambda@Edge (AWS)

AWS service for running Lambda functions at edge locations to customize content delivery.

Launch Configuration

Template for EC2 instance settings used in Auto Scaling groups, defining instance type, AMI, and other parameters.

Least Privilege Principle

Security concept of granting only the minimum permissions necessary in cloud environments.

License Optimization for Cloud

Managing software licenses efficiently to reduce costs in cloud environments, ensuring compliance and cost-effectiveness.

Lift and Shift

Migration strategy of moving applications to the cloud without significant modifications.

Lightweight VMs (like Firecracker)

Minimalist virtual machines designed for fast startup and low resource usage in cloud environments.

Linkerd

Lightweight service mesh for Kubernetes, providing observability, reliability, and security for microservices.

Liquid Cooling for High-Density Compute

Using liquid to dissipate heat in densely packed cloud data centers for improved efficiency.

Load Balancer (Application, Network, Classic)

Service that distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed.

Log Analytics

Process of collecting, analyzing, and visualizing log data from cloud resources for insights and troubleshooting.

Log Intelligence

AI-driven analysis of log data to identify patterns, anomalies, and insights in cloud environments.

Low-Code Integration Platforms

Tools for building application integrations with minimal hand-coding in cloud environments.

Low-Code/No-Code Development Platforms

Cloud-based tools for creating applications with little to no traditional programming.

Low-Code/No-Code Platforms

Cloud services enabling app development with minimal coding, using visual interfaces and pre-built components.

MQTT Protocol

Lightweight messaging protocol designed for IoT devices and low-bandwidth networks in cloud ecosystems.

Machine Learning Platforms (e.g., Amazon SageMaker, Azure Machine Learning)

Cloud-based services for building, training, and deploying machine learning models at scale.

Master Data Management (MDM) in the Cloud

Centralized management of critical business data entities in cloud environments.

Meta-Learning Frameworks

Tools for developing AI models that can learn how to learn, improving adaptability in cloud environments.

Metadata Management Services

Cloud tools for organizing, integrating, and governing metadata across various data sources.

Metamaterial Antennas for Cloud Connectivity

Advanced antenna designs using engineered materials to enhance cloud network performance.

Metric Collection

Gathering and storing quantitative data about cloud resource performance and usage.

Micro-Frontends

Architectural style where frontend apps are composed from independently deployable components in the cloud.

Microsegmentation Orchestration

Automating the process of dividing cloud networks into secure zones for enhanced protection.

Microservices Integration

Connecting and coordinating interactions between independent microservices in cloud architectures.

Migration Planning

Strategic process of preparing and scheduling the move of applications and data to cloud environments.

Mixed Reality as a Service

Cloud-based platforms for developing and deploying mixed reality applications, combining virtual and physical environments.

Mobile Edge Computing

Bringing cloud computing capabilities closer to mobile users to reduce latency and improve performance.

Mobile Edge Computing (MEC)

Extending cloud computing capabilities to the edge of mobile networks for lower latency.

Model Deployment

Process of making machine learning models available for use in cloud production environments.

Model Explainability

Techniques for understanding and interpreting decisions made by AI models in cloud environments.

Model Monitoring

Tracking the performance and behavior of deployed machine learning models in cloud environments.

Model Registry

Centralized repository for storing and managing machine learning models in cloud environments.

Model Serving

Process of making trained machine learning models available for real-time predictions in cloud environments.

Model Training

Process of teaching machine learning algorithms to make predictions using data in cloud environments.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.