Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

SLA (Service Level Agreement)

Contract between a service provider and customer defining expected service levels.
DevOps

SOAR

Security Orchestration, Automation and Response; platforms that enable organizations to collect security data and perform security operations.
DevOps

SOC

Security Operations Center; centralized unit dealing with security issues on an organizational and technical level.
DevOps

SQL Injection

Code injection technique used to attack data-driven applications by inserting malicious SQL statements into application queries.
DevOps

SQLi

Abbreviation for SQL Injection, a code injection technique used to attack data-driven applications by inserting malicious SQL statements.
DevOps

SSL Certificate

Digital document that authenticates a website's identity and enables encrypted connections between servers and browsers, ensuring secure data transmission.
DevOps

SSL Certificate Chain

Series of certificates needed to verify the authenticity of a website's SSL certificate.
DevOps

SSL Certificate Expiry

Date when an SSL certificate is no longer valid and needs to be renewed to maintain secure connections.
DevOps

SSL/TLS Handshake

Process by which a client and server establish a secure encrypted connection, crucial for secure data transmission over the internet.
DevOps

SaltStack

Python-based, open-source configuration management software and remote execution engine.
DevOps

Sanity Testing

Subset of regression testing to verify that code changes don't impact critical functionalities.
DevOps

Scalability

Ability of a system, network, or process to handle a growing amount of work or its potential to be enlarged.
DevOps

Scaled Agile Framework (SAFe)

Set of organization and workflow patterns for implementing agile practices at enterprise scale.
DevOps

Schatten-IT

German term for "Shadow IT"; IT systems deployed outside of the organization's formal IT department.
DevOps

Scrubbing Center

Facility used to filter malicious traffic from a network, often used in DDoS mitigation.
DevOps

Scrum

Agile framework for project management emphasizing iterative progress, team collaboration, and flexibility.
DevOps

SecOps

Practice of integrating security processes with IT operations, aiming to reduce vulnerabilities and improve overall system security.
DevOps

Secure SDLC

Software Development Life Cycle that integrates security at every stage of the development process.
DevOps

Security Analytics

Use of data collection, aggregation, and analysis tools for security monitoring and threat detection.
DevOps

Security Champions

Individuals within development teams who act as the first point of contact for security-related matters.
DevOps

Security Information and Event Management (SIEM)

System providing real-time analysis of security alerts generated by applications and network hardware.
DevOps

Security Intelligence

Evidence-based knowledge about existing or emerging threats to assets, crucial for effective cybersecurity strategies.
DevOps

Security Misconfiguration

Improper configuration of security controls, often leading to vulnerabilities and potential security breaches.
DevOps

Security Observability

Practice of gaining insight into the security posture of systems through the collection and analysis of security-relevant data.
DevOps

Security Operation Center (SOC)

Centralized unit dealing with security issues on an organizational and technical level.
DevOps

Security Posture

Overall security status of an organization's systems, networks, and data, reflecting its ability to protect from cyber threats.
DevOps

Security Remediation

Process of addressing and fixing identified security vulnerabilities or weaknesses in systems, applications, or networks.
DevOps

Security as Code

Practice of building and operating security controls as code to ensure consistent and repeatable security processes.
DevOps

Selbstheilende Systeme

German for "self-healing systems"; systems that can detect and recover from failures automatically.
DevOps

Selenium

Popular open-source tool for automating web browsers, primarily used for testing web applications across various platforms.
DevOps

Self-Healing Systems

Systems capable of detecting and recovering from failures without human intervention.
DevOps

Self-Service Deployment

Capability allowing users to deploy applications or services independently, without IT intervention.
DevOps

Semaphore

Lightweight, cloud-native continuous integration and delivery platform designed for speed and simplicity in software development workflows.
DevOps

Sensitive Data Exposure

Security vulnerability where an application does not adequately protect sensitive information from unauthorized access.
DevOps

Sensu

Open-source monitoring framework designed to empower organizations with flexible and scalable monitoring for their infrastructure and applications.
DevOps

Sequencer

Tool used in network security for analyzing and manipulating network protocols, often employed in penetration testing and vulnerability assessment.
DevOps

Serf

Decentralized solution for cluster membership, failure detection, and orchestration, designed for service discovery and orchestration.
DevOps

Server Monitoring

Process of reviewing and analyzing a server for availability, operations, performance, security and other operations-related processes.
DevOps

Serverless

Cloud computing execution model where the cloud provider manages server infrastructure.
DevOps

Serverless Computing

Cloud computing model where the cloud provider manages server infrastructure, allowing developers to focus solely on code.
DevOps

Serverless Framework

Open-source tool for building and deploying serverless applications across various cloud providers, simplifying serverless development.
DevOps

Serverless Monitoring

Process of observing and managing the performance, availability, and cost of serverless applications and functions.
DevOps

Service Level Agreement (SLA)

Contract between a service provider and the end user defining the expected level of service.
DevOps

Service Level Indicator (SLI)

Quantitative measure of the level of service provided, used to evaluate whether a Service Level Objective is being met.
DevOps

Service Level Indicators (SLIs)

Quantitative measures of the level of service provided, used to evaluate whether Service Level Objectives are being met.
DevOps

Service Level Objective (SLO)

Target value or range of values for a service level that is measured by one or more Service Level Indicators.
DevOps

Service Mesh

Infrastructure layer for facilitating service-to-service communications between microservices.
DevOps

Service Reliability

Measure of a service's ability to perform its intended function consistently and without failure.
DevOps

Service Virtualisation

Practice of simulating the behavior of system components to enable continuous testing.
DevOps

Shadow APIs

Undocumented or unofficial APIs within an organization that may pose security risks or lead to inefficiencies if not properly managed.
DevOps

Shadow CD

Unofficial or unapproved continuous delivery practices within an organization, potentially bypassing established processes.
DevOps

Shadow IT

IT systems and solutions built and used inside organizations without explicit approval.
DevOps

Shared Responsibility Model

Cloud security framework that delineates security obligations of a cloud provider and its users.
DevOps

Shift Left

Practice of moving testing, quality, and performance evaluation earlier in the development process.
DevOps

Shift Right

Practice of extending testing and quality assurance into production environments.
DevOps

Shift-Left Security

Practice of integrating security earlier in the software development lifecycle, improving overall application security.
DevOps

Shift-Left Testing

Practice of performing testing earlier in the software development lifecycle to catch and fix issues sooner.
DevOps

Shift-Right Testing

Approach that extends testing into production environments, allowing for real-world validation and continuous improvement.
DevOps

SignalFx

Cloud monitoring and observability platform for infrastructure, microservices, and applications, enabling real-time analytics.
DevOps

Siloed Security

Approach where security is treated as a separate concern, not integrated with development and operations.
DevOps

Simian Army

Suite of tools created by Netflix to test the resiliency of its AWS infrastructure.
DevOps

Single Branch Development

Development practice where all work is done on a single branch in version control.
DevOps

Site Reliability Engineer (SRE)

IT professional who combines software and systems engineering to create scalable and reliable software systems.
DevOps

Site Reliability Engineering (SRE)

Discipline that incorporates aspects of software engineering and applies them to infrastructure and operations problems.
DevOps

Sitex

Tool for automating the setup and teardown of temporary environments, useful for testing and development purposes.
DevOps

Six Nines

Explore the pinnacle of system reliability: "six nines" uptime. Discover what 99.9999% availability means, its rarity, and the extreme measures required to achieve this DevOps feat.
DevOps

Slaughter

System administration tool designed for automating repetitive tasks across multiple servers, improving efficiency and consistency in IT operations.
DevOps

Smoke Testing

Preliminary testing to reveal simple failures severe enough to reject a prospective software release.
DevOps

Snapshot

Capture of the state of a system at a particular point in time, often used for backups.
DevOps

Snort

Open-source network intrusion detection and prevention system, capable of real-time traffic analysis and packet logging on IP networks.
DevOps

Soak Testing

Testing to determine system performance over an extended period of continuous use.
DevOps

Software Composition Analysis (SCA)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Software Deployment

Process of making software available and ready for use in a specific environment, including installation and configuration.
DevOps

Software Development Lifecycle (SDLC)

Structured process for planning, creating, testing, deploying, and maintaining software applications.
DevOps

Software Lifecycle

Entire process of software development from inception to retirement, including planning, development, testing, deployment, and maintenance.
DevOps

Software Stack

Set of software subsystems or components needed to create a complete platform for developing and running applications.
DevOps

Software as a Service (SaaS)

Model of software delivery where software is licensed on a subscription basis and centrally hosted.
DevOps

Source Control

Management of changes to documents, programs, and other information stored as computer files.
DevOps

Spaghetti Code

Code that is hard to read, understand, or maintain due to its complex and tangled structure.
DevOps

Spike Testing

Testing to determine how a system behaves under a sudden large increase in load.
DevOps

Sprint

Time-boxed iteration in Agile methodologies, typically 1-4 weeks long, during which a potentially shippable product increment is created.
DevOps

StackStorm

Open-source automation platform that connects all your apps, services, and workflows, enabling auto-remediation and security responses.
DevOps

Staging Environment

Pre-production environment that closely mimics the production environment, used for final testing before deployment.
DevOps

Standard Operating Procedures (SOPs)

Established procedures to be followed in carrying out a given operation or situation.
DevOps

Static Application Security Testing (SAST)

Process of analyzing source code to identify security vulnerabilities without executing the program.
DevOps

Status Page

Webpage displaying the current state of system's services and any known issues, crucial for transparent communication.
DevOps

Step

Individual task or action within a larger process or workflow, often used in the context of CI/CD pipelines or automation scripts.
DevOps

Strangler Fig Pattern

Technique for gradually migrating a legacy system by replacing pieces of functionality with new applications and services.
DevOps

Stream-aligned Team

Team organized around the flow of work, capable of delivering value directly to customers or users.
DevOps

Streamline Releases

Process of optimizing and simplifying the software release cycle to increase efficiency and reduce time-to-market.
DevOps

Structured Logging

Practice of implementing a consistent, predetermined message format for application logs.
DevOps

Stubs

Pieces of code used to stand in for some other programming functionality, often used in testing to simulate complex objects or processes.
DevOps

Sublime Text

Sophisticated text editor for code, markup, and prose, known for its speed, cross-platform support, and powerful features.
DevOps

SumoLogic

Cloud-native, machine data analytics platform that helps organizations gain real-time insights from logs, metrics, and other machine data.
DevOps

Sunzi

Lightweight server provisioning tool that simplifies the process of setting up and configuring servers using simple YAML files.
DevOps

Support-Level

Degree of technical assistance provided for a product or service, often tiered based on response times and scope of support.
DevOps

Swagger

Set of tools for designing, building, documenting, and consuming RESTful web services.
DevOps

Swift

General-purpose, multi-paradigm, compiled programming language developed by Apple.
DevOps

Synthetic Monitoring

Monitoring technique that uses scripted recordings or transactions to simulate user activity.
DevOps

Sysdig

Open-source system-level exploration and troubleshooting tool for Linux systems, providing deep visibility into system behavior.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Serverless Containers

Container-based applications run on serverless platforms, combining containerization with auto-scaling.

Serverless Cost Optimization

Strategies to minimize expenses in serverless architectures while maintaining performance.

Serverless Data Analytics

Processing and analyzing data using serverless compute resources in the cloud, providing scalable and cost-effective insights.

Serverless Data Processing

Handling and transforming data using auto-scaling, event-driven cloud services, eliminating infrastructure management overhead.

Serverless Databases

Fully managed database services that scale automatically based on demand, eliminating the need for manual provisioning and management.

Serverless DevOps

Practices combining serverless architectures with DevOps principles for efficient cloud development.

Serverless ETL

Extract, Transform, Load processes using serverless compute for data integration in the cloud.

Serverless Integration

Connecting applications and data sources using serverless compute in cloud environments.

Serverless Microservices

Building application components as independent, auto-scaling functions in the cloud.

Serverless Networking

Network management and routing tailored for serverless architectures in cloud environments.

Serverless Resource Optimization

Techniques for efficient use of compute, storage, and network resources in serverless systems.

Serverless Security

Protecting serverless applications from vulnerabilities and attacks in cloud environments.

Serverless Security Frameworks

Tools and practices for implementing security in serverless cloud architectures.

Serverless Security Platforms

Comprehensive solutions for protecting serverless applications and data in the cloud.

Serverless Web Applications

Websites built and hosted using serverless cloud services for automatic scaling.

Serverless Workflows

Orchestrating sequences of serverless functions to create complex, scalable processes.

Service Control Policies (AWS)

Rules for managing permissions in AWS Organizations across multiple accounts, enforcing security and compliance standards.

Service Discovery

Automated detection of services and their network locations in cloud environments.

Service Level Objectives (SLOs)

Targets for service performance and availability in cloud environments, defining quality standards for cloud services.

Service Mesh Control Plane

Central component managing configuration and policies in a service mesh architecture.

Service Mesh Data Plane

Component handling inter-service communication in a service mesh architecture, managing traffic flow and security.

Service Mesh Interface

Standardized APIs for interacting with service mesh technologies in cloud environments.

Service Mesh Observability

Monitoring and analyzing traffic and behavior within a service mesh architecture.

Service Mesh Security

Protecting inter-service communication within a service mesh in cloud environments.

Sharding

Distributing data across multiple database instances to improve performance and scalability in cloud environments.

Showback and Chargeback

Systems for tracking and allocating cloud resource costs within an organization.

Sidecar Pattern

Deploying components of an application as separate containers alongside the main container in cloud environments.

Sidecars

Helper containers deployed alongside main application containers to provide additional functionality in cloud environments.

Silicon Photonics in Cloud Networking

Using light-based chips for high-speed data transmission in cloud data centers, improving network performance and efficiency.

Site Reliability Engineering (SRE) Platforms

Tools for implementing SRE practices in cloud environments, focusing on automation and reliability.

Smart Contract Platforms

Cloud-based systems for creating, deploying, and managing self-executing digital contracts.

Software-Defined Networking (SDN)

Approach to cloud network management using software-based controllers instead of hardware.

Software-Defined Power Distribution

Managing and optimizing power allocation in cloud data centers through software control.

Software-Defined Storage (SDS)

Abstracting storage services from underlying hardware in cloud environments for flexible management.

Software-Defined Wide Area Network (SD-WAN)

Technology for efficiently routing traffic between cloud and on-premises resources.

Spatial Computing

Integrating digital information with the physical world in cloud-based augmented and virtual reality systems.

Spatial Databases

Cloud databases optimized for storing and querying location-based data, essential for geospatial applications and analytics.

Speech Recognition

Cloud-based service for converting spoken language into text, enabling voice-controlled interfaces and transcription.

Spot Instance Management

Strategies for efficiently using and monitoring discounted, interruptible cloud compute resources.

Spot Instance Management Platforms

Tools for optimizing the use of discounted, interruptible cloud compute resources.

Spot Instance Optimization

Techniques for maximizing cost savings and availability when using discounted, interruptible cloud resources.

Spot Instances

Discounted, interruptible cloud compute resources available for bidding, offering cost savings for flexible workloads.

State Management

Techniques for maintaining application data consistency in distributed cloud environments.

Stateful Serverless Computing

Serverless architectures that maintain state between function invocations in the cloud.

Stateless Functions

Cloud-based functions that don't retain state between invocations, enhancing scalability.

Step Functions (AWS)

AWS service for coordinating multiple Lambda functions into serverless workflows.

Storage Class Memory (SCM)

High-performance, low-latency memory technology bridging DRAM and SSDs in cloud infrastructure.

Storage QoS (Quality of Service)

Mechanisms to ensure consistent performance levels for storage resources in cloud environments.

Storage Tiering Optimization

Automatically moving data between storage tiers based on access patterns to balance cost and performance.

Stream Processing (e.g., Amazon Kinesis, Azure Stream Analytics)

Real-time analysis of continuously flowing data in cloud environments, enabling instant insights and rapid decision-making.

Stream Processing at Scale

Handling and analyzing large volumes of real-time data streams in cloud environments.

Streaming SQL Engines

Cloud-based systems for querying continuous data streams using SQL-like syntax, enabling real-time data analysis.

Subnet

Segmented portion of a cloud network with its own IP address range, allowing for improved security and traffic management.

Sustainability Reporting Platforms

Tools for tracking and reporting environmental metrics of cloud resource usage, promoting eco-friendly cloud computing.

Sustainability Reporting for Cloud Services

Documenting environmental impact and energy efficiency of cloud operations, promoting transparency and accountability.

Sustainability-Aware Resource Scheduling

Allocating cloud resources with consideration for environmental impact, optimizing for energy efficiency.

Sustainability-Driven Optimization

Improving cloud resource efficiency to minimize environmental impact while maintaining performance and reliability.

Sustainable Cloud Computing

Practices and technologies minimizing the environmental impact of cloud operations.

Sustainable Cloud Migration

Moving to the cloud with strategies to minimize environmental impact, optimizing resource usage and energy efficiency.

Sustainable Data Center Design

Creating cloud facilities with minimal environmental impact and maximum energy efficiency.

Swarm Intelligence for Cloud Optimization

Using collective behavior algorithms to optimize cloud resource allocation, improving efficiency and performance.

Swarm Robotics in the Cloud

Coordinating multiple robots using cloud-based swarm intelligence algorithms, enabling scalable and adaptive robotic systems.

Synthetic Data Generation

Creating artificial datasets for testing and development in cloud environments, preserving privacy and expanding data availability.

Synthetic Media Generation Platforms

Cloud services for creating AI-generated images, videos, and audio, enabling content creation at scale.

Tactile Internet Interfaces

Ultra-low latency network interfaces for real-time tactile feedback in cloud applications.

Tagging Strategies

Methods for labeling cloud resources to improve organization, management, and cost allocation.

Telco Cloud

Cloud infrastructure specifically designed for telecommunications service providers.

Telepresence Robotics Control Systems

Cloud-based platforms for remotely operating robots with real-time feedback, enabling distant manipulation and interaction.

Text-to-Speech

Cloud service converting written text into spoken words, often used in accessibility and voice interface applications.

Time Series Forecasting as a Service

Cloud-based predictive analytics for time-dependent data, used for trend analysis and future projections.

Time-Series Databases

Cloud databases optimized for storing and querying time-stamped data, essential for IoT and monitoring applications.

TinyML

Deploying machine learning models on resource-constrained IoT devices connected to the cloud.

Tokenization Services

Cloud-based tools for replacing sensitive data with non-sensitive tokens to enhance security.

Total Cost of Ownership (TCO)

Comprehensive assessment of direct and indirect costs associated with cloud adoption and usage.

Transfer Learning

Technique of using pre-trained AI models for new tasks, reducing training time and data requirements in the cloud.

Transit Gateway

Cloud networking service that connects VPCs, on-premises networks, and other cloud services.

Twelve-Factor App Methodology

Set of best practices for building scalable, maintainable cloud-native applications.

Unikernels

Lightweight, single-purpose machine images for running cloud applications with minimal overhead.

Unit Economics in the Cloud

Analysis of costs and revenues associated with individual cloud service units or transactions.

Universal Cloud API Standards

Efforts to create standardized interfaces for interacting with various cloud services.

VPN Connection

Secure, encrypted link between a local network and cloud resources, enabling private access to cloud services over public networks.

VR Streaming

Cloud-based delivery of virtual reality content to end-user devices, enabling immersive experiences without local processing.

Vector Databases

Cloud databases optimized for storing and querying high-dimensional vector data, often used in AI applications.

Version Control in the Cloud

Managing and tracking changes to code and configurations in cloud-based repositories.

Vertical Scaling (Scale Up)

Increasing the capacity of a single cloud resource by adding more power (CPU, RAM, etc.).

Virtual Cloud Network (VCN)

Software-defined network providing connectivity for cloud resources, enabling secure and flexible communication.

Virtual Environments as a Service

Cloud-based platforms offering customizable, isolated development and testing environments.

Virtual Machines (e.g., Amazon EC2, Azure Virtual Machines)

Emulations of computer systems providing scalable, isolated environments in the cloud.

Virtual Network Appliances

Software-based network devices deployed in cloud environments for various networking functions.

Virtual Network Functions (VNF)

Software implementations of network functions running on cloud infrastructure, replacing traditional hardware appliances.

Virtual Reality (VR) Cloud

Cloud-based services for creating, rendering, and delivering virtual reality experiences.

Virtual Reality Cloud Workspaces

Cloud-hosted VR environments for collaborative work and data visualization, enabling immersive remote collaboration.

Voice User Interfaces (VUI) for Cloud Services

Speech-based interfaces for interacting with cloud applications and services, enhancing accessibility and user experience.

Volumetric Display Computation Services

Cloud-based processing for generating 3D holographic or volumetric images, enabling immersive visualization applications.

Volumetric Video Streaming

Cloud services for delivering 3D video content for immersive viewing experiences.

Water Usage Effectiveness (WUE)

Metric measuring water consumption efficiency in cloud data centers, promoting sustainable resource management.

Water Usage Effectiveness (WUE) Monitoring

Tracking water consumption and efficiency in cloud data center operations, promoting sustainable resource management.

Web Application Firewall (WAF)

Cloud-based security service that filters and monitors HTTP traffic between web applications and the Internet.

WebAssembly (Wasm) in the Cloud

Low-level language for running high-performance applications in cloud-based web browsers.

WebAssembly in the Cloud

Binary instruction format enabling high-performance execution of code in cloud-based web environments.

5G MEC Integration

Integration of 5G mobile edge computing with container platforms for low-latency applications and services at network edges.

AIOps for Container Environments

Application of AI and machine learning for automated operations, monitoring, and management of containerized environments.

API Deprecation Policy

Guidelines for phasing out older API versions in Kubernetes, ensuring smooth transitions for users.

API Extensions

Mechanisms to extend the Kubernetes API with custom resources and functionalities, enhancing platform capabilities.

API Gateway Pattern

Containerized service that acts as a single entry point for all client requests to a microservices architecture.

API Server

Core component of Kubernetes that exposes the cluster's API and handles all administrative operations.

API Server Aggregation

Kubernetes feature allowing the API server to be extended with additional APIs without modifying core Kubernetes code.

API-First Development

Approach prioritizing API design before implementation, crucial for developing scalable containerized microservices.

AWS Fargate

Serverless compute engine for containers, allowing you to run containers without managing the underlying infrastructure.

Adapter Pattern

Design pattern in containerized microservices that wraps a service's interface to make it compatible with other services.

Admission Controllers

Plugins that intercept requests to the Kubernetes API server before object persistence, enforcing policies or modifying objects.

Admission Controllers for Security

Admission controllers specifically focused on enforcing security policies and validating security-related configurations.

Admission Webhooks

HTTP callbacks that receive admission requests and can modify or validate objects before they are persisted.

Admission Webhooks in Operators

Use of admission webhooks within Kubernetes operators to enforce custom policies or modify resources.

Advanced Audit

Kubernetes feature providing detailed logging of all requests processed by the API server for security and compliance.

Aggregated API Servers

Extension of the Kubernetes API server to include custom resources and functionalities without modifying core Kubernetes.

Aggregated ClusterRoles

Combination of multiple ClusterRoles into a single role, simplifying RBAC management in Kubernetes.

Air-gapped Registries

Container registries isolated from public networks, used in secure or restricted environments.

Akri

Open-source project for exposing heterogeneous leaf devices as resources in Kubernetes clusters.

Alertmanager Configuration

Setup and management of Prometheus Alertmanager for handling alerts from monitoring systems.

Amazon Elastic Container Registry (ECR)

Fully managed Docker container registry provided by AWS for storing, managing, and deploying container images.

Ambassador Pattern

Microservices design pattern where a dedicated service acts as an API gateway for other services.

Ambient Mesh

Service mesh implementation that doesn't require sidecars, reducing resource overhead and simplifying deployment.

Anchore Engine for Image Scanning

Open-source tool for deep inspection of container images, including vulnerability scanning and policy enforcement.

Ansible-based Operators

Kubernetes operators implemented using Ansible for automating application lifecycle management.

Antrea Network Policies

Network policies specific to the Antrea CNI plugin, offering fine-grained control over pod-to-pod communication.

Antrea for Open vSwitch-based Networking

Kubernetes networking solution using Open vSwitch for improved performance and advanced networking features.

Apache OpenWhisk

Open-source serverless platform that executes functions in response to events or direct invocations.

AppArmor Profiles

Security profiles for Linux that restrict program capabilities, enhancing container isolation and security.

Application-level Logging

Logging implemented within applications, providing detailed insights into application behavior and performance.

Aqua Security

Platform providing security and compliance for container-based and cloud-native applications throughout their lifecycle.

Aqua Security Platform

Comprehensive security solution for containerized and cloud-native environments, offering vulnerability management and runtime protection.

Argo CD

GitOps continuous delivery tool for Kubernetes, automating application deployment and lifecycle management.

Argo Rollouts

Kubernetes controller for advanced deployment strategies like canary and blue-green deployments.

ArgoCD

Declarative GitOps tool for Kubernetes, automating application deployment and synchronization with Git repositories.

Artifact Management

Process of storing, organizing, and managing container images and related artifacts in container registries.

Athenz for Fine-grained Access Control

Open-source platform for fine-grained access control and authentication in distributed systems.

Attribute-Based Access Control (ABAC)

Access control paradigm where authorization decisions are based on attributes of users, resources, and environment.

Audit Annotations

Additional metadata added to Kubernetes audit events for enhanced context and analysis, improving audit trails.

Audit Backends

Components responsible for processing and storing Kubernetes audit logs, supporting various storage and analysis options.

Audit Events

Records of requests and activities within a Kubernetes cluster, used for security monitoring and compliance.

Audit Levels

Configurable detail levels for Kubernetes audit logs, ranging from metadata-only to full request and response details.

Audit Logging

Process of recording API server requests and responses for security, troubleshooting, and compliance purposes.

Audit Logs

Detailed records of activities and operations within a Kubernetes cluster, used for security and compliance monitoring.

Audit Policy

Configuration defining which events should be recorded in Kubernetes audit logs and at what level of detail.

Audit Profile

Predefined set of audit policy rules for common use cases in Kubernetes, simplifying audit configuration.

Audit Stages

Different phases of request processing where audit events can be generated in Kubernetes, providing comprehensive auditing.

Audit Webhook Configuration

Setup for sending Kubernetes audit events to external webhook endpoints for processing or analysis.

Auditing

Process of systematically recording and examining activities within a Kubernetes cluster for security and compliance purposes.

Authenticating Proxy

Intermediary service that handles authentication before forwarding requests to the Kubernetes API server.

Authentication Modules

Pluggable components in container orchestration platforms for verifying user identities using various methods.

Authorization Policies

Rules defining access permissions for users and services in container orchestration platforms.

Azure Container Instances

Serverless container hosting service in Azure, offering rapid deployment of containers without cluster management.

Azure Container Registry

Managed Docker registry service for storing and managing container images in Azure cloud environments.

BGP (Border Gateway Protocol) in Containers

Implementation of Border Gateway Protocol within containerized network environments for advanced routing.

BGP in Container Networks

In container networks, BGP (Border Gateway Protocol) manages routing information between containers and external networks for efficient traffic routing.

Backend for Frontend (BFF) Pattern

Microservices design pattern where a dedicated service acts as an API gateway for specific frontend needs.

Backup and Restore

Processes for preserving and recovering container data and configurations in orchestration platforms.

Base Image

Foundation Docker image upon which other images are built, containing core OS and runtime components.

Base Image Selection

Process of choosing appropriate foundation images for container builds, balancing size, security, and functionality.

Best Effort QoS

Kubernetes quality of service class for pods with no resource guarantees, scheduled when resources are available.

Blue-Green Deployments

Deployment strategy using two identical environments to minimize downtime and risk during updates.

Bootstrap Tokens

Temporary tokens used for secure cluster initialization and node joining in Kubernetes, simplifying cluster setup.

Bottlerocket OS

Minimalist Linux-based operating system optimized for running containers in cloud environments.

BuildKit

Advanced container image building toolkit offering improved performance and caching capabilities.

BuildKit for Advanced Image Building

Use of BuildKit for efficient, concurrent, and cache-optimized container image creation, improving build performance.

Bulkhead Pattern

Isolation technique in microservices to contain failures and prevent system-wide cascading failures.

Bulkhead Pattern in Microservices

The Bulkhead Pattern in microservices isolates failures by dividing services into separate compartments, preventing issues in one from affecting others.

Burstable QoS

Kubernetes quality of service class for pods that can use more resources than requested when available.

CIS Benchmarks for Containers

Security configuration guidelines for deploying containers securely in various environments.

CNI Plugin Chaining

Technique of using multiple Container Network Interface plugins together for advanced networking capabilities.

CPU Manager

Kubernetes feature for fine-grained CPU resource management and allocation to containers, optimizing performance.

CPU Throttling

Technique to limit CPU usage of containers to prevent resource monopolization and ensure fair allocation.

CQRS (Command Query Responsibility Segregation)

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CQRS (Command Query Responsibility Segregation) Pattern

Architectural pattern separating read and write operations in distributed systems, often used in microservices.

CRI (Container Runtime Interface) Specification

Standard interface between container runtimes and Kubernetes, allowing pluggable runtime implementations.

CRI Image Management

Functionality within CRI for pulling, inspecting, and removing container images, standardizing image operations.

CRI Logging

Standardized logging interface for container runtimes implementing the Container Runtime Interface.

CRI Metrics

Performance and resource usage data exposed by container runtimes adhering to the CRI specification.

CRI Runtime Class

Kubernetes feature allowing selection of different runtime configurations for containers, enabling specialized runtimes.

CRI Socket

Unix domain socket used for communication between Kubelet and the CRI-compatible container runtime.

CRI Validation Testing

Process of verifying that a container runtime correctly implements the CRI specification, ensuring compatibility.

CRI-O

Lightweight container runtime specifically designed for Kubernetes, implementing the CRI specification.

CRI-O Internals

Core components and architecture of the CRI-O container runtime, including its interaction with Kubernetes.

CRI-O as Container Runtime

Use of CRI-O, a lightweight container runtime, as the primary runtime in a Kubernetes cluster.

CSI Controller Plugin

Component of CSI responsible for volume provisioning and attachment operations in container orchestration systems.

CSI Drivers

Plugins implementing the Container Storage Interface for various storage systems in Kubernetes.

CSI Ephemeral Volumes

Short-lived volumes in Kubernetes, created and deleted alongside a pod using CSI drivers, for temporary storage.

CSI Migration

Process of transitioning from in-tree volume plugins to CSI drivers in Kubernetes, improving storage extensibility.

CSI Node Plugin

Component of CSI responsible for mounting volumes and making them available to containers.

CSI Topology

Feature allowing storage provisioning based on topology constraints in Kubernetes, optimizing data locality.

Cache-Aside Pattern

Caching strategy where the application checks the cache before retrieving data from the main data store.

Caching Strategies for Containers

Techniques for implementing and managing caches in containerized applications for improved performance.

Calico

Open-source networking and network security solution for containers, providing a rich set of security policies.

Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Canary Deployments

Technique of releasing new versions to a subset of users or servers to minimize risk and gather feedback.

Capabilities

Fine-grained privileges that can be assigned to containers, enhancing security by limiting root-level access.

Capability Controls

Mechanisms for managing and restricting Linux capabilities assigned to containers for improved security.

Categories

Groupings or classifications of container-related resources or components for easier management and discovery.

Ceph RBD

Ceph's block storage system, often used for persistent volumes in container orchestration platforms.