Engineering Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

DevOps
Git
Cloud Computing
Containerization & Orchestration

Log Levels

Categories used to distinguish the importance and nature of logged messages, aiding in log analysis and troubleshooting.
DevOps

Log Management

Process of collecting, storing, analyzing, and disposing of log data generated by various IT systems and applications.
DevOps

Log Management Policy

Set of guidelines and procedures governing the collection, storage, analysis, and retention of log data within an organization.
DevOps

Log Management Process

Systematic approach to collecting, storing, analyzing, and disposing of log data.
DevOps

Log Rotation

Process of archiving filled log files and starting new ones to prevent excessive disk space usage.
DevOps

Log.io

Real-time log monitoring tool that allows users to view and search logs from multiple sources in a single web-based interface.
DevOps

LogShell Vulnerability

Critical security flaw in the Log4j library, allowing remote code execution and posing significant security risks.
DevOps

Loggly

Cloud-based log management and analytics service that helps organizations collect, analyze, and act on machine-generated data from various sources.
DevOps

Logstash

Open-source data processing pipeline that ingests data from multiple sources simultaneously.
DevOps

Logster

Utility for reading log files and generating metrics for monitoring systems like Graphite and Ganglia.
DevOps

Loom

Project aimed at adding lightweight concurrency and new programming models to Java.
DevOps

Low-code

Software development approach requiring little to no coding to build applications and processes.
DevOps

M Silicon

Apple's custom-designed ARM-based processors for Mac computers, offering improved performance and energy efficiency.
DevOps

MITRE ATT&CK

Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
DevOps

MLOps

Set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.
DevOps

MTTI

Mean Time to Identify; average time between the start of an incident and its discovery.
DevOps

MTTR (Mean Time To Recovery)

Average time required to repair a failed system and restore it to normal operation, a key metric for measuring system reliability.
DevOps

Machine Data

Digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
DevOps

Machine Learning (ML)

Field of study giving computers the ability to learn without being explicitly programmed.
DevOps

Magecart

Group of threat actors that specialize in stealing credit card data from online stores.
DevOps

Managed Detection and Response

Cybersecurity service that combines technology and human expertise to rapidly identify and respond to threats.
DevOps

Managed SIEM

Security Information and Event Management offered as a managed service, providing expert monitoring and threat detection.
DevOps

Managing Secrets

Process of securely storing and handling sensitive information like passwords and API keys.
DevOps

Mass Assignment

Vulnerability where an active record pattern in a web application is abused to modify data items that the user should not be allowed to access.
DevOps

Maturity Model

Structured representation of improvement across multiple dimensions of an organization or service.
DevOps

Mcollective

Framework for building server orchestration or parallel job execution systems, facilitating large-scale system management.
DevOps

Mean Time Between Failures (MTBF)

Average time between system failures, used to measure reliability and predict future failure occurrences.
DevOps

Mean Time to Recovery (MTTR)

Average time required to repair a failed system and restore it to normal operation.
DevOps

Mean Time to Resolution

Average time between the detection of an incident and its full resolution, a key metric in IT service management.
DevOps

Measure everything

Practice of collecting metrics on all aspects of software development and operations to enable data-driven decisions.
DevOps

Memcached

Distributed memory caching system designed to speed up dynamic web applications.
DevOps

Memory Bottleneck

Situation where system performance is limited by the amount or speed of available memory.
DevOps

Mezmo

Cloud-native observability platform for log management and analysis, helping organizations gain insights from their machine data.
DevOps

Micro Frontend

Architectural style where a frontend app is decomposed into individual, loosely coupled components.
DevOps

Microsegmentation

Security technique that creates secure zones in data centers and cloud deployments to isolate workloads from one another.
DevOps

Microservice-Architektur

Architectural style structuring an application as a collection of loosely coupled services.
DevOps

Microservice-Infrastruktur

Infrastructure designed to support the deployment and operation of microservices.
DevOps

Microservices

Software development technique that structures an application as a collection of loosely coupled services.
DevOps

Microservices Architecture

Architectural style that structures an application as a collection of small autonomous services.
DevOps

Microsoft Azure

Cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services.
DevOps

Mina

Network application framework which helps users develop high performance and high scalability network applications easily.
DevOps

Mobile Analytics

Tools and processes for measuring and analyzing mobile app usage and user behavior.
DevOps

Mobile App Automation

Tools and processes for measuring and analyzing mobile app usage and user behavior.
DevOps

Mobile App Testing

Process of testing mobile applications for functionality, usability, and consistency.
DevOps

Mobile Applications Security Testing (MAST)

Process of testing mobile applications for security vulnerabilities, ensuring protection of user data and app integrity.
DevOps

Mobile Artifacts

Data or files generated during mobile app development and testing, including binaries, logs, and test results.
DevOps

Mobile Testing

Process of testing mobile devices and applications to ensure proper functionality and user experience.
DevOps

Model-Based Testing (MBT)

Software testing technique in which test cases are derived from a model that describes the system under test.
DevOps

MongoDB

Popular open-source document-oriented database program classified as a NoSQL database, known for its flexibility and scalability.
DevOps

Monitoring

Continuous observation and checking of a system's performance, health, and security to ensure optimal operation and detect issues.
DevOps

Monitoring as Code (MaC)

Practice of defining and managing monitoring configurations using code and version control systems.
DevOps

Monolithic Architecture

Software design where all components of an application are interconnected and interdependent.
DevOps

Monorepo

Development approach where code for many projects is stored in the same repository.
DevOps

Muda

Japanese term for waste in lean methodologies, referring to any activity that doesn't add value to the final product or service.
DevOps

Multi-Cloud Strategy

Use of multiple cloud computing and storage services in a single heterogeneous architecture.
DevOps

Mura

Japanese term in lean methodologies referring to unevenness or irregularity in processes, which can lead to inefficiencies.
DevOps

Muri

Japanese term in lean methodologies referring to overburden or unreasonableness, which can lead to stress and inefficiencies.
DevOps

Mutable Infrastructure

Infrastructure that can be updated or modified after it is deployed, contrasting with immutable infrastructure approaches.
DevOps

NFRs

Non-Functional Requirements; requirements that specify criteria for judging the operation of a system, rather than specific behaviors.
DevOps

NIST SIEM Requirements and Standards

Guidelines set by the National Institute of Standards and Technology for Security Information and Event Management systems.
DevOps

NPM

Node Package Manager, the default package manager for Node.js, used for installing and managing JavaScript packages and dependencies.
DevOps

Nagios

Open source monitoring system for computer systems, networks and infrastructure.
DevOps

NestJS

Progressive Node.js framework for building efficient and scalable server-side applications.
DevOps

Network Bottleneck

Point in a network where bandwidth is limited, causing slowdowns in data transfer.
DevOps

Network as a Service (NaaS)

Cloud model where network services are delivered over the internet, offering flexibility and scalability.
DevOps

New Relic

Cloud-based observability platform that helps developers monitor, debug, and optimize their entire stack.
DevOps

Next Generation WAF (Web Application Firewall)

Advanced WAF that uses machine learning and behavioral analytics to protect web applications.
DevOps

Nexus

Repository manager that organizes, stores, and distributes software components, facilitating dependency management in development.
DevOps

Nexus Repository

Software repository manager for storing and distributing build artifacts, supporting various package formats and integrations.
DevOps

Nginx

Web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.
DevOps

NoOps

Concept where an IT environment becomes so automated that there's no need for a dedicated team to manage software in-house.
DevOps

NoSQLi

NoSQL Injection; security exploit targeting databases that use non-SQL query languages.
DevOps

Node Logging

Process of recording events and data from individual nodes in a distributed system.
DevOps

Node Pool

Group of nodes within a cluster, typically with the same configuration, used in container orchestration platforms like Kubernetes.
DevOps

Node.js

JavaScript runtime built on Chrome's V8 JavaScript engine for building scalable network applications.
DevOps

Nomad

Flexible workload orchestrator to deploy and manage containers and non-containerized applications.
DevOps

Non-Functional Testing

Testing of non-functional aspects of software like performance, usability, and reliability.
DevOps

OSV

Open Source Vulnerabilities; database of vulnerabilities affecting open source software.
DevOps

OWASP

Open Web Application Security Project; nonprofit foundation working to improve software security.
DevOps

OWASP API Top 10

List of the ten most critical API security risks, providing awareness and guidance for developers and security professionals.
DevOps

OWASP Top 10

Standard awareness document for developers about the most critical security risks to web applications.
DevOps

Observability

Measure of how well internal states of a system can be inferred from knowledge of its external outputs.
DevOps

Observability vs Monitoring

Observability provides insights into system behavior, while monitoring tracks predefined metrics.
DevOps

On Premise Infrastructure

Computing infrastructure physically located within an organization's facilities.
DevOps

One-Stop Shop

Single location or service providing multiple resources or capabilities, often used in IT service management.
DevOps

Open Authorization (OAuth)

Open standard for access delegation, commonly used for secure authorization in web applications.
DevOps

Open Integration Framework (OIF)

Set of standards and practices for integrating different software systems, promoting interoperability and flexibility.
DevOps

Open Source

Software with source code that anyone can inspect, modify, and enhance, promoting collaboration and transparency.
DevOps

Open Source Applications

Software applications whose source code is openly available for modification and distribution.
DevOps

OpenShift

Container application platform by Red Hat that brings Docker and Kubernetes to the enterprise.
DevOps

OpenStack

Free, open-standard cloud computing platform, primarily deployed as infrastructure-as-a-service.
DevOps

OpenTelemetry

Collection of tools, APIs, and SDKs used to instrument, generate, collect, and export telemetry data.
DevOps

Operational Intelligence

Real-time dynamic business analytics that delivers visibility and insight into data, streaming events, and business operations.
DevOps

Operations Engineering (Ops)

Discipline of designing and managing systems for maximum efficiency and reliability.
DevOps

Ops (from DevOps)

Operational aspect of DevOps, focusing on system administration, infrastructure management, and deployment.
DevOps

OpsGenie

Incident management and alert notification tool designed to help teams handle critical issues quickly and efficiently.
DevOps

Opsbot

Chatbot designed to assist with operational tasks and incident management, streamlining IT operations and support.
DevOps

Opskeleton

Basic structure or framework for operations in a software project, providing a starting point for implementing DevOps practices.
DevOps

Orchestration

Automated configuration, coordination, and management of computer systems and software.
DevOps

Otto

Holistic, single command developer tool for managing development environments across multiple platforms and languages.
DevOps
special ref

special ref

A Git reference with a specific meaning or function, such as HEAD or FETCH_HEAD.
staging instance

staging instance

A deployment environment used for testing changes before releasing to production in Git-based workflows.
star

star

A feature on Git hosting platforms allowing users to bookmark repositories of interest.
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Ceph RadosGW

Object storage gateway for Ceph, providing S3-compatible API for container storage needs in Kubernetes.

Cgroup (Control Group)

Linux kernel feature for limiting, prioritizing, and isolating resource usage of container groups.

Change Data Capture (CDC)

Technique for tracking and capturing changes in databases, useful in microservices architectures.

Chaos Engineering in CI/CD

Practice of intentionally injecting failures in CI/CD pipelines to improve system resilience.

Chaos Mesh for Reliability Testing

Platform for simulating various abnormal scenarios in Kubernetes environments to test reliability.

Checkov for IaC Security Scanning

Static code analysis tool for detecting misconfigurations in Infrastructure as Code deployments.

Cilium

Open-source networking, observability, and security solution for container workloads based on eBPF.

Cilium Service Mesh

eBPF-powered service mesh offering high-performance traffic management and security for microservices.

Cilium's Hubble for Network Observability

Observability platform for Kubernetes providing deep visibility into container network flows.

Cilium's eBPF Datapath

High-performance networking mode in Cilium using extended Berkeley Packet Filter for packet processing and security.

CircleCI

Continuous integration and delivery platform supporting containerized application testing and deployment.

Circuit Breaker Pattern

Fault tolerance pattern preventing cascading failures in distributed containerized systems.

Circuit Breaking

Technique to detect failures and prevent system overload in microservices architectures, enhancing resilience.

Claim Check Pattern for Large Messages

Design pattern for handling large payloads in microservices by storing data externally, improving efficiency.

Clair for Static Image Analysis

Open-source tool for static analysis of vulnerabilities in container images, enhancing security.

Cloud Controller Manager

Kubernetes component managing interactions between cluster and cloud provider APIs, enabling cloud integration.

Cloud Native Application Bundle (CNAB)

Specification for packaging and managing distributed applications across different environments.

Cloud-Native Buildpacks

Tooling for building container images from source code without Dockerfiles, adhering to best practices.

Cloud-Native Design Patterns

Architectural patterns specifically tailored for distributed, containerized applications in cloud environments.

CloudEvents

Specification for describing event data in common formats, facilitating event-driven architectures in cloud environments.

CloudEvents Specification

Isolation technique in containerized microservices to prevent failure propagation across the system.

Cluster

Group of servers or other resources that work together as a single system to provide high availability.

Cluster API

Kubernetes project for declarative management and provisioning of clusters using Kubernetes-style APIs.

Cluster API Provider

Implementation of Cluster API for specific infrastructure providers, enabling cluster lifecycle management.

Cluster Autoscaler

Kubernetes component that automatically adjusts the size of a cluster based on resource demands.

Cluster Capacity Planning

Process of estimating and allocating resources needed for container workloads in a cluster.

Cluster Federation

Mechanism for coordinating multiple Kubernetes clusters, enabling multi-cluster application deployment and management.

Cluster Mesh

Interconnected network of container clusters, enabling cross-cluster communication and resource sharing.

Cluster Networking

Network configuration and management within and between container clusters, enabling inter-container communication.

Cluster Upgrade Process

Procedure for updating the Kubernetes version and components of a cluster while minimizing disruptions.

Cluster-level Logging

Centralized logging solution capturing logs from all containers and nodes in a cluster, aiding in troubleshooting.

ClusterAutoscaler

Kubernetes component that automatically adjusts the number of nodes in a cluster based on resource utilization.

ClusterIP

Kubernetes service type that exposes the service on an internal IP within the cluster, facilitating internal communication.

ClusterIP Services

Kubernetes services accessible only within the cluster, used for internal communication between pods.

ClusterRole

Kubernetes RBAC resource defining permissions across an entire cluster, not limited to a single namespace.

ClusterRoleBinding

Kubernetes RBAC resource that binds a ClusterRole to users, groups, or service accounts across all namespaces.

ClusterServiceVersion (CSV)

Custom resource in Operator Lifecycle Manager describing a specific version of an Operator.

Codefresh GitOps

GitOps platform for managing and automating containerized application deployments, streamlining CD workflows.

Cold Start Optimization

Techniques to reduce initialization time of containers, particularly important in serverless environments.

Compensating Transaction Pattern

Design pattern for handling failures in distributed container-based systems by reversing or compensating actions.

ConfigMap

Kubernetes API object used to store non-confidential data in key-value pairs, accessible by pods.

Consul Connect

Service mesh feature of Consul providing secure service-to-service communication with automatic TLS encryption.

Container

Standardized unit of software that packages code and all its dependencies for quick, reliable deployment.

Container Breakout Techniques

Methods used by attackers to escape container isolation and access the host system, posing security risks.

Container Engine

Software responsible for managing container lifecycle, including creation, execution, and destruction.

Container Escape

Security vulnerability allowing a process to break out of container isolation and access the host system.

Container Escape Prevention

Security measures and best practices to prevent containers from breaking out of their isolation.

Container Escape Vulnerabilities

Weaknesses in container runtimes or configurations that could allow processes to escape isolation.

Container Health Checks

Mechanisms to verify the health and readiness of containerized applications, ensuring service availability.

Container Host

Physical or virtual machine running the container runtime and hosting containers, providing the execution environment.

Container Image Promotion

Process of moving container images through different environments (e.g., dev, test, prod) in a controlled manner.

Container Image Signing

Cryptographic process of digitally signing container images to ensure their integrity and authenticity during distribution.

Container Lifecycle

Stages a container goes through from creation to termination, including running, paused, and stopped states.

Container Lifecycle Management

Processes and tools for managing containers throughout their lifecycle, from creation to deletion.

Container Logging

Process of capturing and managing log output from containerized applications for monitoring and troubleshooting.

Container Manifest

Configuration file specifying how to build a container image, including base image, commands, and environment setup.

Container Metrics

Quantitative measures of container performance, resource usage, and health, used for monitoring and optimization.

Container Network Interface (CNI)

Specification and libraries for configuring network interfaces in Linux containers, standardizing networking.

Container Network Interface (CNI) Spec

Standard for developing plugins to configure network interfaces in Linux containers, ensuring interoperability.

Container Networking Model

Architecture and principles governing how containers communicate within and across hosts in orchestrated environments.

Container Orchestration

Automated arrangement, coordination, and management of software containers, crucial in large-scale deployments.

Container Probes (Liveness, Readiness, Startup)

Kubernetes mechanisms (liveness, readiness, startup) for checking container health and controlling lifecycle.

Container Real User Monitoring (RUM)

Technique for capturing and analyzing real user interactions with containerized applications.

Container Restart Policies

Rules defining how containers should be restarted in case of failures or exits, enhancing application resilience.

Container Runtime

Software responsible for running containers, managing their lifecycle from creation to deletion.

Container Runtime Security

Measures and tools to protect containers during execution, preventing unauthorized access or malicious activities.

Container Shims

Lightweight processes that manage the lifecycle of containers and provide abstraction between runtimes.

Container Storage Interface (CSI)

Standardized interface for container orchestration platforms to interact with storage systems.

Container Storage Interface (CSI) Spec

Standard for developing storage plugins for container orchestration platforms, enabling storage extensibility.

Container Vulnerability Scanning

Process of identifying security vulnerabilities in container images and their dependencies.

Content Trust

Mechanism for verifying the integrity and authenticity of container images before deployment.

Continuous Deployment

Automated process of releasing container images to production environments after passing tests.

Continuous Verification

Ongoing process of validating deployed containers against defined policies and expectations.

Contiv-VPP for High-performance Networking

Container networking solution using VPP (Vector Packet Processing) for optimized performance.

Contract-First API Development

Approach prioritizing API definition before implementation, crucial for microservices architecture.

Control Groups (cgroups)

Linux kernel feature for limiting, prioritizing, and isolating resource usage of container groups.

Control Plane

Components managing the overall state of a container cluster, including API server, scheduler, and controllers.

Control Plane Upgrade

Process of updating the core components of a container orchestration system while maintaining cluster stability.

Controller Manager

Kubernetes component running controller processes to regulate the state of the cluster, maintaining desired state.

Controller Runtime

Software framework for building Kubernetes controllers and operators, simplifying custom resource management.

Conversion Webhooks

Kubernetes feature allowing custom resource API version conversions via external webhooks.

Copy-on-Write (CoW)

Storage optimization technique used in container filesystems to reduce duplication and improve efficiency.

Cordon

Process of marking a node as unschedulable in Kubernetes, preventing new pods from being assigned to it.

CoreDNS

Flexible, extensible DNS server used for service discovery in Kubernetes clusters, replacing kube-dns.

Cortex

Horizontally scalable, multi-tenant, long-term storage for Prometheus metrics, enhancing monitoring capabilities.

Cortex for Multi-tenant Prometheus

Use of Cortex to provide isolated Prometheus monitoring for multiple users or teams in shared environments.

CronJob

Kubernetes object for creating time-based jobs, running containers on a schedule for automated tasks.

CronJob Patterns

Kubernetes patterns for running batch processes and scheduled tasks in containerized environments.

Cross-namespace Operators

Kubernetes operators capable of managing resources across multiple namespaces, enabling broader automation.

Custom Metrics API

Kubernetes API extension allowing pods to consume custom metrics for autoscaling and monitoring.

Custom Resource

Extension of the Kubernetes API that defines new, custom resource types specific to a cluster's needs.

Custom Resource Conversion

Process of converting custom resources between different API versions in Kubernetes, enabling API evolution.

Custom Resource Definition (CRD)

Kubernetes API extension allowing the definition of custom resources, enabling cluster customization.

Custom Resource Definitions (CRDs)

Kubernetes feature for extending the API with custom resources, enabling cluster customization.

Custom Resources

User-defined API objects in Kubernetes, extending the core functionality of the platform for specific use cases.

Custom Scheduler

Alternative or additional scheduler implementation for Kubernetes, allowing custom pod placement logic.

Custom Schedulers

Alternative scheduling implementations in Kubernetes for custom pod placement strategies, enabling specialized scheduling logic.

DNS for Services and Pods

Kubernetes feature providing DNS-based service discovery for containers within the cluster.

DPDK in Container Networks

Use of Data Plane Development Kit for high-performance packet processing in container networks.

DaemonSet

Kubernetes object ensuring that all (or some) nodes run a copy of a specific pod, useful for cluster-wide services.