Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

SLA (Service Level Agreement)

Contract between a service provider and customer defining expected service levels.
DevOps

SOAR

Security Orchestration, Automation and Response; platforms that enable organizations to collect security data and perform security operations.
DevOps

SOC

Security Operations Center; centralized unit dealing with security issues on an organizational and technical level.
DevOps

SQL Injection

Code injection technique used to attack data-driven applications by inserting malicious SQL statements into application queries.
DevOps

SQLi

Abbreviation for SQL Injection, a code injection technique used to attack data-driven applications by inserting malicious SQL statements.
DevOps

SSL Certificate

Digital document that authenticates a website's identity and enables encrypted connections between servers and browsers, ensuring secure data transmission.
DevOps

SSL Certificate Chain

Series of certificates needed to verify the authenticity of a website's SSL certificate.
DevOps

SSL Certificate Expiry

Date when an SSL certificate is no longer valid and needs to be renewed to maintain secure connections.
DevOps

SSL/TLS Handshake

Process by which a client and server establish a secure encrypted connection, crucial for secure data transmission over the internet.
DevOps

SaltStack

Python-based, open-source configuration management software and remote execution engine.
DevOps

Sanity Testing

Subset of regression testing to verify that code changes don't impact critical functionalities.
DevOps

Scalability

Ability of a system, network, or process to handle a growing amount of work or its potential to be enlarged.
DevOps

Scaled Agile Framework (SAFe)

Set of organization and workflow patterns for implementing agile practices at enterprise scale.
DevOps

Schatten-IT

German term for "Shadow IT"; IT systems deployed outside of the organization's formal IT department.
DevOps

Scrubbing Center

Facility used to filter malicious traffic from a network, often used in DDoS mitigation.
DevOps

Scrum

Agile framework for project management emphasizing iterative progress, team collaboration, and flexibility.
DevOps

SecOps

Practice of integrating security processes with IT operations, aiming to reduce vulnerabilities and improve overall system security.
DevOps

Secure SDLC

Software Development Life Cycle that integrates security at every stage of the development process.
DevOps

Security Analytics

Use of data collection, aggregation, and analysis tools for security monitoring and threat detection.
DevOps

Security Champions

Individuals within development teams who act as the first point of contact for security-related matters.
DevOps

Security Information and Event Management (SIEM)

System providing real-time analysis of security alerts generated by applications and network hardware.
DevOps

Security Intelligence

Evidence-based knowledge about existing or emerging threats to assets, crucial for effective cybersecurity strategies.
DevOps

Security Misconfiguration

Improper configuration of security controls, often leading to vulnerabilities and potential security breaches.
DevOps

Security Observability

Practice of gaining insight into the security posture of systems through the collection and analysis of security-relevant data.
DevOps

Security Operation Center (SOC)

Centralized unit dealing with security issues on an organizational and technical level.
DevOps

Security Posture

Overall security status of an organization's systems, networks, and data, reflecting its ability to protect from cyber threats.
DevOps

Security Remediation

Process of addressing and fixing identified security vulnerabilities or weaknesses in systems, applications, or networks.
DevOps

Security as Code

Practice of building and operating security controls as code to ensure consistent and repeatable security processes.
DevOps

Selbstheilende Systeme

German for "self-healing systems"; systems that can detect and recover from failures automatically.
DevOps

Selenium

Popular open-source tool for automating web browsers, primarily used for testing web applications across various platforms.
DevOps

Self-Healing Systems

Systems capable of detecting and recovering from failures without human intervention.
DevOps

Self-Service Deployment

Capability allowing users to deploy applications or services independently, without IT intervention.
DevOps

Semaphore

Lightweight, cloud-native continuous integration and delivery platform designed for speed and simplicity in software development workflows.
DevOps

Sensitive Data Exposure

Security vulnerability where an application does not adequately protect sensitive information from unauthorized access.
DevOps

Sensu

Open-source monitoring framework designed to empower organizations with flexible and scalable monitoring for their infrastructure and applications.
DevOps

Sequencer

Tool used in network security for analyzing and manipulating network protocols, often employed in penetration testing and vulnerability assessment.
DevOps

Serf

Decentralized solution for cluster membership, failure detection, and orchestration, designed for service discovery and orchestration.
DevOps

Server Monitoring

Process of reviewing and analyzing a server for availability, operations, performance, security and other operations-related processes.
DevOps

Serverless

Cloud computing execution model where the cloud provider manages server infrastructure.
DevOps

Serverless Computing

Cloud computing model where the cloud provider manages server infrastructure, allowing developers to focus solely on code.
DevOps

Serverless Framework

Open-source tool for building and deploying serverless applications across various cloud providers, simplifying serverless development.
DevOps

Serverless Monitoring

Process of observing and managing the performance, availability, and cost of serverless applications and functions.
DevOps

Service Level Agreement (SLA)

Contract between a service provider and the end user defining the expected level of service.
DevOps

Service Level Indicator (SLI)

Quantitative measure of the level of service provided, used to evaluate whether a Service Level Objective is being met.
DevOps

Service Level Indicators (SLIs)

Quantitative measures of the level of service provided, used to evaluate whether Service Level Objectives are being met.
DevOps

Service Level Objective (SLO)

Target value or range of values for a service level that is measured by one or more Service Level Indicators.
DevOps

Service Mesh

Infrastructure layer for facilitating service-to-service communications between microservices.
DevOps

Service Reliability

Measure of a service's ability to perform its intended function consistently and without failure.
DevOps

Service Virtualisation

Practice of simulating the behavior of system components to enable continuous testing.
DevOps

Shadow APIs

Undocumented or unofficial APIs within an organization that may pose security risks or lead to inefficiencies if not properly managed.
DevOps

Shadow CD

Unofficial or unapproved continuous delivery practices within an organization, potentially bypassing established processes.
DevOps

Shadow IT

IT systems and solutions built and used inside organizations without explicit approval.
DevOps

Shared Responsibility Model

Cloud security framework that delineates security obligations of a cloud provider and its users.
DevOps

Shift Left

Practice of moving testing, quality, and performance evaluation earlier in the development process.
DevOps

Shift Right

Practice of extending testing and quality assurance into production environments.
DevOps

Shift-Left Security

Practice of integrating security earlier in the software development lifecycle, improving overall application security.
DevOps

Shift-Left Testing

Practice of performing testing earlier in the software development lifecycle to catch and fix issues sooner.
DevOps

Shift-Right Testing

Approach that extends testing into production environments, allowing for real-world validation and continuous improvement.
DevOps

SignalFx

Cloud monitoring and observability platform for infrastructure, microservices, and applications, enabling real-time analytics.
DevOps

Siloed Security

Approach where security is treated as a separate concern, not integrated with development and operations.
DevOps

Simian Army

Suite of tools created by Netflix to test the resiliency of its AWS infrastructure.
DevOps

Single Branch Development

Development practice where all work is done on a single branch in version control.
DevOps

Site Reliability Engineer (SRE)

IT professional who combines software and systems engineering to create scalable and reliable software systems.
DevOps

Site Reliability Engineering (SRE)

Discipline that incorporates aspects of software engineering and applies them to infrastructure and operations problems.
DevOps

Sitex

Tool for automating the setup and teardown of temporary environments, useful for testing and development purposes.
DevOps

Six Nines

Explore the pinnacle of system reliability: "six nines" uptime. Discover what 99.9999% availability means, its rarity, and the extreme measures required to achieve this DevOps feat.
DevOps

Slaughter

System administration tool designed for automating repetitive tasks across multiple servers, improving efficiency and consistency in IT operations.
DevOps

Smoke Testing

Preliminary testing to reveal simple failures severe enough to reject a prospective software release.
DevOps

Snapshot

Capture of the state of a system at a particular point in time, often used for backups.
DevOps

Snort

Open-source network intrusion detection and prevention system, capable of real-time traffic analysis and packet logging on IP networks.
DevOps

Soak Testing

Testing to determine system performance over an extended period of continuous use.
DevOps

Software Composition Analysis (SCA)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Software Deployment

Process of making software available and ready for use in a specific environment, including installation and configuration.
DevOps

Software Development Lifecycle (SDLC)

Structured process for planning, creating, testing, deploying, and maintaining software applications.
DevOps

Software Lifecycle

Entire process of software development from inception to retirement, including planning, development, testing, deployment, and maintenance.
DevOps

Software Stack

Set of software subsystems or components needed to create a complete platform for developing and running applications.
DevOps

Software as a Service (SaaS)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Source Control

Management of changes to documents, programs, and other information stored as computer files.
DevOps

Spaghetti Code

Code that is hard to read, understand, or maintain due to its complex and tangled structure.
DevOps

Spike Testing

Testing to determine how a system behaves under a sudden large increase in load.
DevOps

Sprint

Time-boxed iteration in Agile methodologies, typically 1-4 weeks long, during which a potentially shippable product increment is created.
DevOps

StackStorm

Open-source automation platform that connects all your apps, services, and workflows, enabling auto-remediation and security responses.
DevOps

Staging Environment

Pre-production environment that closely mimics the production environment, used for final testing before deployment.
DevOps

Standard Operating Procedures (SOPs)

Established procedures to be followed in carrying out a given operation or situation.
DevOps

Static Application Security Testing (SAST)

Process of analyzing source code to identify security vulnerabilities without executing the program.
DevOps

Status Page

Webpage displaying the current state of system's services and any known issues, crucial for transparent communication.
DevOps

Step

Individual task or action within a larger process or workflow, often used in the context of CI/CD pipelines or automation scripts.
DevOps

Strangler Fig Pattern

Technique for gradually migrating a legacy system by replacing pieces of functionality with new applications and services.
DevOps

Stream-aligned Team

Team organized around the flow of work, capable of delivering value directly to customers or users.
DevOps

Streamline Releases

Process of optimizing and simplifying the software release cycle to increase efficiency and reduce time-to-market.
DevOps

Structured Logging

Practice of implementing a consistent, predetermined message format for application logs.
DevOps

Stubs

Pieces of code used to stand in for some other programming functionality, often used in testing to simulate complex objects or processes.
DevOps

Sublime Text

Sophisticated text editor for code, markup, and prose, known for its speed, cross-platform support, and powerful features.
DevOps

SumoLogic

Cloud-native, machine data analytics platform that helps organizations gain real-time insights from logs, metrics, and other machine data.
DevOps

Sunzi

Lightweight server provisioning tool that simplifies the process of setting up and configuring servers using simple YAML files.
DevOps

Support-Level

Degree of technical assistance provided for a product or service, often tiered based on response times and scope of support.
DevOps

Swagger

Set of tools for designing, building, documenting, and consuming RESTful web services.
DevOps

Swift

General-purpose, multi-paradigm, compiled programming language developed by Apple.
DevOps

Synthetic Monitoring

Monitoring technique that uses scripted recordings or transactions to simulate user activity.
DevOps

Sysdig

Open-source system-level exploration and troubleshooting tool for Linux systems, providing deep visibility into system behavior.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Blockchain Interoperability

Capability of different blockchain networks to exchange and use information across cloud platforms.

Blockchain as a Service

Cloud-based blockchain infrastructure and management tools offered as a service, simplifying blockchain adoption.

Blockchain as a Service (BaaS)

Cloud platforms offering blockchain infrastructure and tools as a managed service for easy deployment and scaling.

Blockchain-Based Audit Trails for Cloud Resources

Immutable, distributed ledgers recording all actions and changes to cloud resources for enhanced accountability.

Blockchain-Based Databases

Distributed databases using blockchain for data storage and validation in cloud environments.

Blockchain-Based Networking

Use of blockchain technology for secure, decentralized network management and routing in cloud infrastructures.

Blockchain-Based Security Audit Trails

Immutable records of security events and access logs in cloud systems using blockchain technology.

Blockchain-based Cloud Security

Use of blockchain technology to enhance security, integrity, and transparency of cloud services and data.

Blockchain-based Supply Chain

Cloud-hosted blockchain networks for tracking and verifying supply chain transactions and product provenance.

Blue-Green Deployment

Cloud deployment strategy using two identical environments to minimize downtime and risk during updates.

Blue-Green Deployments

Technique using two identical production environments to reduce downtime and risk when deploying new versions of cloud applications.

Border Gateway Protocol (BGP)

Internet routing protocol used in cloud networking to exchange routing information between autonomous systems.

Brain-Computer Interfaces (BCI) for Cloud Interaction

Experimental systems allowing direct neural control of cloud resources and services.

Budget Alerts

Notifications triggered when cloud spending reaches predefined thresholds to help control costs.

Budget Management

Tools and practices for setting, tracking, and controlling cloud service expenditures.

Business Intelligence Tools (e.g., Amazon QuickSight, Power BI)

Cloud-based platforms for data analysis and visualization, e.g., Amazon QuickSight, Power BI.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in cloud-based applications.

Calico

Open-source networking and security solution for containers and Kubernetes in cloud environments.

Canary Deployments

Technique of rolling out changes to a small subset of users before full deployment in cloud environments.

Carbon Footprint Calculation for Cloud Services

Tools and methods for estimating the environmental impact of cloud resource usage.

Carbon Usage Effectiveness (CUE)

Metric measuring the carbon emissions associated with data center energy consumption in cloud facilities.

Carbon-Aware Computing

Cloud computing practices that consider and optimize for carbon emissions in resource allocation and usage.

Carbon-Intelligent Computing

Cloud infrastructure and algorithms designed to minimize carbon footprint by optimizing energy use and sourcing.

Carbon-Intelligent Workload Scheduling

Cloud resource management that schedules tasks based on availability of low-carbon energy sources.

Centralized Logging

Consolidation of log data from various cloud services and applications into a single, searchable repository.

Chaos Engineering Platforms

Cloud-based systems for designing, running, and analyzing controlled experiments to test system resilience.

Chaos Engineering Tools

Software used to intentionally introduce failures in cloud systems to test and improve their resilience.

Chaos Engineering as a Service

Cloud-based platforms for designing and executing controlled experiments to test system resilience.

Chargeback Models

Frameworks for allocating and billing cloud service costs to different departments or projects within an organization.

Chargeback and Showback

Methods for allocating cloud costs to business units, showing actual charges or usage without billing.

Chatbot Services

Cloud-based platforms for building, deploying, and managing conversational AI agents.

Cilium

Open-source, eBPF-based networking, observability, and security solution for container and Kubernetes environments.

Circuit Breaker Pattern

Design pattern that prevents cascading failures in distributed cloud systems by temporarily disabling failing components.

Circular Economy in Cloud Hardware

Practices promoting reuse, refurbishment, and recycling of cloud infrastructure components.

Cloud Abstraction Layer

Software that provides a unified interface to multiple cloud providers, simplifying multi-cloud management.

Cloud Access Security Broker (CASB)

Service that mediates between cloud users and providers, enforcing security policies and monitoring usage.

Cloud Adoption Framework

Structured approach for planning and implementing cloud migration and optimization strategies.

Cloud Analytics

Tools and services for processing and analyzing large datasets using cloud-based resources.

Cloud Asset Intelligence

Systems for discovering, classifying, and managing cloud resources across an organization's infrastructure.

Cloud Asset Management

Processes and tools for tracking, optimizing, and governing cloud resources throughout their lifecycle.

Cloud Broker

Intermediary service that helps organizations select, integrate, and manage multiple cloud services.

Cloud Bursting

Technique of extending on-premises infrastructure into the cloud to handle peak workloads.

Cloud CDN

Content Delivery Network services that distribute data from cloud origins to global edge locations for faster access.

Cloud Carbon Footprint Monitoring

Tools and practices for measuring and reporting the environmental impact of cloud resource consumption.

Cloud Center of Excellence (CCoE)

Cross-functional team responsible for cloud strategy, governance, and best practices within an organization.

Cloud Configuration Optimization

Process of adjusting cloud resource settings to improve performance, security, and cost-efficiency.

Cloud Cost Anomaly Detection

Automated identification of unusual or unexpected changes in cloud spending patterns.

Cloud Cost Optimization

Strategies and tools for reducing cloud expenses while maintaining performance and meeting business needs.

Cloud Custodian

Open-source tool for managing and enforcing cloud security, compliance, and cost optimization policies.

Cloud DNS

Scalable, managed Domain Name System service for translating domain names to IP addresses in cloud environments.

Cloud Data Sovereignty Solutions

Services ensuring data storage and processing comply with regional data residency and privacy laws.

Cloud Development Kit (CDK)

Framework for defining cloud infrastructure using familiar programming languages instead of configuration files.

Cloud Financial Operations

Practices and tools for managing, optimizing, and reporting on cloud spending and resource utilization.

Cloud Functions (Google Cloud)

Serverless compute platform for running event-driven code without managing infrastructure.

Cloud Gaming

Service that streams video games from cloud servers to user devices, reducing hardware requirements.

Cloud Governance Framework

Set of policies, processes, and tools for managing and controlling cloud resource usage and compliance.

Cloud Infrastructure Entitlement Management (CIEM)

Tools for managing access rights and permissions across multi-cloud environments.

Cloud Interconnect (Google Cloud)

Service providing direct, private network connections between on-premises networks and Google Cloud.

Cloud License Optimization

Strategies and tools for managing software licenses in cloud environments to reduce costs and ensure compliance.

Cloud Management Platform

Integrated suite of tools for monitoring, managing, and optimizing multi-cloud and hybrid cloud environments.

Cloud Migration Assessment

Evaluation of on-premises IT assets to determine feasibility, strategy, and costs for moving to the cloud.

Cloud Monitoring

Tools and services for tracking performance, availability, and health of cloud resources and applications.

Cloud Native Application Performance Management (APM)

Tools for monitoring and optimizing performance of applications built for cloud environments.

Cloud Native Buildpacks

Standardized way to transform application source code into container images for cloud deployment.

Cloud Native CI/CD

Continuous integration and delivery practices optimized for cloud-native application development and deployment.

Cloud Native Databases

Database systems designed to leverage cloud infrastructure for scalability, resilience, and performance.

Cloud Native Networking

Network architectures and technologies optimized for cloud-native application environments.

Cloud Native Observability

Practices and tools for monitoring, logging, and tracing cloud-native applications and infrastructure.

Cloud Native Security

Security practices and tools designed specifically for protecting cloud-native applications and infrastructure.

Cloud Native Storage

Storage systems designed to integrate seamlessly with cloud-native applications and container orchestrators.

Cloud Network Automation

Tools and practices for automating the deployment, configuration, and management of cloud network resources.

Cloud Network Function Virtualization (NFV)

Virtualizing network functions like firewalls and load balancers in cloud environments.

Cloud Network Intelligence

AI-driven tools for optimizing and securing cloud network performance and operations.

Cloud Performance Benchmarking Tools

Services for measuring and comparing performance metrics across different cloud providers and configurations.

Cloud Rendering

Use of cloud computing resources for processing and generating complex graphics or animations.

Cloud Repatriation

Process of moving applications or data from public cloud environments back to on-premises or private cloud infrastructure.

Cloud Robotics

Integration of cloud computing with robotics, enabling robots to leverage cloud resources for processing and data storage.

Cloud Robotics Data Analytics

Cloud-based tools for processing and analyzing large datasets generated by robotic systems.

Cloud Robotics Security

Measures and tools to protect cloud-connected robotic systems from cyber threats and unauthorized access.

Cloud Robotics Simulation Environments

Cloud-based platforms for testing and training robotic systems in virtual environments.

Cloud Run (Google Cloud)

Fully managed platform for deploying and scaling containerized applications in a serverless environment.

Cloud Security

Comprehensive measures and tools to protect data, applications, and infrastructure in cloud computing environments.

Cloud Security Posture Management (CSPM)

Tools for continuously monitoring and improving security risks in cloud infrastructure configurations.

Cloud Service Catalog

Centralized repository of available cloud services and resources within an organization.

Cloud Spend Analysis

Tools and practices for analyzing and optimizing cloud expenditures across an organization.

Cloud Spend Anomaly Detection

Automated identification of unusual or unexpected patterns in cloud service usage and costs.

Cloud Spend Forecasting

Predictive analytics tools for estimating future cloud costs based on historical usage and trends.

Cloud WAN

Wide Area Network service that connects and manages global network resources using cloud infrastructure.

Cloud WAN (Wide Area Network)

Managed service for connecting and managing global network resources using cloud infrastructure.

Cloud Workload Protection Platform (CWPP)

Security solutions designed to protect cloud-native applications and workloads across multiple environments.

Cloud-Based 3D Asset Management

Services for storing, versioning, and collaborating on 3D models and assets in the cloud.

Cloud-Based Computer Vision for Robotics

Services providing image and video analysis capabilities for cloud-connected robotic systems.

Cloud-Based Data Labeling Services

Platforms offering human-powered or AI-assisted data annotation for machine learning models.

Cloud-Based Digital Twins

Virtual representations of physical objects or systems, powered by cloud computing and IoT data.

Cloud-Based Distributed Operating Systems

OS designed to manage resources across multiple cloud environments as a single system.

Cloud-Based Generative AI Services

Platforms offering pre-trained or customizable generative AI models as cloud services.

Cloud-Based Haptic Feedback

Services using cloud computing to generate and deliver tactile sensations for virtual or augmented reality experiences.

Cloud-Based Motion Capture

Services utilizing cloud resources to process and analyze motion capture data for animation or biomechanics.

Cloud-Based Reinforcement Learning

Platforms offering scalable environments and resources for training AI agents using reinforcement learning algorithms.

Cloud-Based Robot Learning

Services enabling robots to learn and improve their capabilities using cloud-based AI and machine learning resources.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.