Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

Syslog

Standard for message logging, often used in Unix and Unix-like systems for system management and security auditing.
DevOps

System Team

Team responsible for building and maintaining the platforms used by stream-aligned teams.
DevOps

TLS Certificate: DevOps Explained

Digital certificate that authenticates a website's identity and enables an encrypted connection.
DevOps

Tactics Techniques and Procedures (TTPs)

Patterns of activities or methods associated with a specific threat actor or group of threat actors.
DevOps

Taint Analysis

Technique used to identify and track data in a program that has been tainted with user input.
DevOps

Team Topologies

Organizational design approach focused on optimizing team interactions and boundaries for effective software delivery.
DevOps

TeamCity

Powerful and user-friendly continuous integration server by JetBrains, supporting various version control systems and build tools.
DevOps

Technical Debt

Implied cost of future rework caused by choosing quick, easy solutions now instead of better, more time-consuming approaches.
DevOps

Technology Stack

Set of technologies used to build and run a single application, including programming languages, frameworks, and tools.
DevOps

Telemetry

Automated process of collecting data at remote points and transmitting it to receiving equipment for monitoring.
DevOps

Tenants

In multi-tenant architecture, distinct groups of users who share a common access with specific privileges to the software instance.
DevOps

Terraform

Open-source infrastructure as code software tool that enables defining and provisioning data center infrastructure using a declarative language.
DevOps

Terraform Cloud

Managed service offering of Terraform for teams and organizations, providing collaboration features and workflow management.
DevOps

Test Automation

Use of software to execute tests and compare actual outcomes with predicted outcomes.
DevOps

Test Automation for Everything

Approach of automating all possible tests in the software development process to improve quality and efficiency.
DevOps

Test Data Management

Process of creating, managing, and maintaining test data for software testing, ensuring data quality and relevance.
DevOps

Test Environment

Setup of software and hardware on which the testing team performs testing of a new build.
DevOps

Test Environment Management

Process of planning, creating, maintaining, and managing environments for software testing, ensuring consistency and reliability.
DevOps

Test Kitchen

Tool for testing infrastructure code and software on isolated target platforms, supporting multiple providers and test frameworks.
DevOps

Test-doubles

Generic term for any object used in place of a real object for testing purposes.
DevOps

Test-driven Development (TDD)

Software development process relying on software requirements being converted to test cases before software is fully developed.
DevOps

TestFlight

Apple's platform for over-the-air installation and beta testing of mobile applications before they are submitted to the App Store.
DevOps

Testdatenmanagement

Process of creating, managing, and maintaining test data for software testing, ensuring data quality and relevance for various test scenarios.
DevOps

Testenvironment Self-Service

Ability for testers to provision and manage their own test environments, increasing efficiency and autonomy.
DevOps

Testing-as-a-Service (TaaS)

Outsourcing of testing activities to a third-party service provider, offering specialized expertise and tools for comprehensive testing.
DevOps

The Three Pillars of Observability

Logs, metrics, and traces; key components for understanding the behavior of distributed systems.
DevOps

The Three Ways

Principles underpinning DevOps movements: Flow, Feedback, Continual Learning and Experimentation.
DevOps

Theory of Constraints

Management paradigm that views any manageable system as being limited in achieving its goals by a small number of constraints.
DevOps

Threat Detection and Response (TDR)

Cybersecurity process of identifying, analyzing, and mitigating threats to an organization's IT infrastructure in real-time.
DevOps

Threat Hunting

Proactive cybersecurity technique to detect hidden threats that have evaded existing security solutions.
DevOps

Threat Intelligence

Information about potential or current threats to an organization's security, used to inform better decision-making.
DevOps

Threat Landscape

Comprehensive view of potential security threats facing an organization or industry, crucial for effective risk management.
DevOps

Threat Modeling

Process of identifying, understanding, and categorizing potential security threats.
DevOps

Time to First Byte

Measure of responsiveness that indicates the time between a user making an HTTP request and the first byte of the page being received by the browser.
DevOps

Time to Restore Service

Metric measuring how long it takes to restore a service after an incident, important for assessing system reliability.
DevOps

Time to Value

Duration between the initiation of a process and the realization of its benefits, crucial for measuring efficiency and ROI.
DevOps

Toggle by Geo-location

Feature flag technique that enables or disables features based on geographical location.
DevOps

Toggle by User Rights

Feature flag technique that enables or disables features based on user permissions.
DevOps

Toil

Manual, repetitive, automatable work in running production services that lacks long-term value and scales linearly with service growth.
DevOps

Tool Sprawl

Proliferation of tools within an organization, often leading to inefficiency and integration challenges.
DevOps

Toolchain

Set of programming tools used to perform a complex software development task or to create a software product.
DevOps

Traffic Management

Process of monitoring, controlling, and optimizing network traffic to ensure efficient data flow and prevent congestion.
DevOps

Travis CI

Distributed continuous integration service used to build and test software projects hosted on GitHub.
DevOps

Trunk-Based Development

Source control branching model where developers collaborate on code in a single branch.
DevOps

Tsuru

Open-source Platform as a Service (PaaS) that makes it easy to deploy and manage applications.
DevOps

TypeScript

Typed superset of JavaScript that compiles to plain JavaScript, offering enhanced tooling and error detection in large-scale applications.
DevOps

TypeScript First

Development approach prioritizing TypeScript over JavaScript for enhanced type safety and tooling support.
DevOps

UEBA

User and Entity Behavior Analytics; process of tracking, collecting and analyzing user and machine data to detect anomalies.
DevOps

UI Testing

Process of testing a product's graphical user interface to ensure it meets its specifications.
DevOps

Ubuntu

Popular, user-friendly Linux distribution based on Debian, known for its ease of use, regular release cycle, and strong community support.
DevOps

Unit Testing

Software testing method where individual units or components of a program are tested in isolation.
DevOps

Uptime

Measure of system reliability, expressed as the percentage of time a machine has been working and available.
DevOps

Uptime Robot

Service for monitoring websites and alerting users when their sites go down, providing 24/7 uptime monitoring.
DevOps

Uptrends

Website and server monitoring service that helps businesses ensure their online presence is always available and performing optimally.
DevOps

Use Mockups

Practice of creating simplified versions of system components for testing purposes.
DevOps

User Acceptance Test

Final phase of software testing where intended users test the software to ensure it can handle required tasks in real-world scenarios.
DevOps

User Acceptance Testing (UAT)

Final phase of software testing where actual users test the software to ensure it meets business requirements and is fit for purpose.
DevOps

Using Components with Known Vulnerabilities

Security risk of utilizing software components with documented security issues in applications.
DevOps

VMFest

Clojure library for managing virtual machines on various virtualization platforms, simplifying VM lifecycle management.
DevOps

VPC Flow Logging

Feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC.
DevOps

VPC Peering

Networking connection between two VPCs that enables you to route traffic between them using private IP addresses.
DevOps

Vagrant

Tool for building and managing virtual machine environments, streamlining the setup process for development environments.
DevOps

Vagrant-lxc

Vagrant plugin that allows the use of LXC (Linux Containers) as a provider, enabling lightweight, OS-level virtualization for development environments.
DevOps

Validate Compliance

Process of ensuring that systems and practices meet specified standards or regulations.
DevOps

Value Stream Management

Practice of optimizing the flow of value through the software delivery lifecycle.
DevOps

Value Stream Mapping

Lean technique for analyzing current state and designing future state of events that deliver a product or service to the customer.
DevOps

Vault

Secure secret management tool for storing and controlling access to tokens, passwords, certificates, and other sensitive data.
DevOps

Vaurien

Chaos Monkey-style tool for introducing delays and errors into TCP connections, useful for testing system resilience.
DevOps

Veewee

Tool for easily building custom Vagrant base boxes, KVMs, and virtual machine images.
DevOps

Velocity

Measure of the amount of work a team completes during a sprint or iteration, used in agile project management.
DevOps

Version Control

System that records changes to a file or set of files over time so that you can recall specific versions later.
DevOps

Version Control System (VCS)

Software tools that help software teams manage changes to source code over time.
DevOps

Vieraugenprinzip

German term for the "four-eyes principle", requiring two individuals to approve an action before it can be taken.
DevOps

Virtual Machine (VM)

Emulation of a computer system, providing the functionality of a physical computer.
DevOps

Virtual Private Cloud (VPC)

On-demand configurable pool of shared computing resources allocated within a public cloud environment.
DevOps

Virtualization

Creation of a virtual version of something, such as a server, storage device, network or operating system.
DevOps

Vulnerability Assessments (VA)

Systematic review of security weaknesses in an information system, often involving scanning and analysis of potential vulnerabilities.
DevOps

Vulnerability Scanning

Automated process of proactively identifying security vulnerabilities of computing systems in a network.
DevOps

WAAP (Web Application & API Protection)

Security solution that protects web applications and APIs from various types of attacks.
DevOps

WAF (Web Application Firewall)

Application firewall for HTTP applications that applies a set of rules to an HTTP conversation.
DevOps

Waste

Any activity in a process that does not add value to the customer, a key concept in lean methodologies for process improvement.
DevOps

Waterfall

Traditional, linear approach to software development with distinct phases, often contrasted with more iterative methodologies like Agile.
DevOps

Weave

Network plugin for Kubernetes that creates a virtual network for connecting containers across multiple hosts.
DevOps

Web API Security

Set of practices and measures taken to protect web APIs from various security threats and unauthorized access.
DevOps

Web Application Development

Process of creating web applications, including design, coding, testing, and deployment, often using various web technologies.
DevOps

Web Application Security

Discipline of protecting websites and web applications against security threats.
DevOps

Web Scraping

Automated process of extracting data from websites, often used for data mining, price monitoring, or content aggregation.
DevOps

WebSockets

Protocol providing full-duplex communication channels over a single TCP connection.
DevOps

Webhooks

Automated messages sent from apps when something happens, allowing real-time data transfer and integration between different systems.
DevOps

White Box Testing

Method of testing where the internal structure/design/implementation of the item being tested is known to the tester.
DevOps

Wildcard Certificate

SSL certificate that secures a domain and its subdomains, allowing for flexible and cost-effective implementation of HTTPS.
DevOps

Windows Event

Record of an occurrence in a Windows operating system or application, crucial for system monitoring and troubleshooting.
DevOps

Windows Event Log

Detailed record of system, security, and application notifications stored by Windows.
DevOps

Windows Performance Counters

Measurement tools built into Windows that provide information about system operation.
DevOps

Windows Services

Programs that operate in the background on Windows systems, similar to daemons in Unix-like operating systems.
DevOps

Work in Progress (WIP)

Partially completed work or any task that has been started but is not yet finished.
DevOps

Workflow

Sequence of processes through which a piece of work passes from initiation to completion.
DevOps

XDR

Extended Detection and Response; security technology that provides holistic protection against cyber threats.
DevOps

XML External Entities (XXE)

Web security vulnerability that allows an attacker to interfere with an application's processing of XML data.
DevOps

Xcode

Integrated development environment (IDE) for macOS containing a suite of software development tools.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Metrics Pipeline

System for collecting, processing, and storing performance metrics from containerized applications and infrastructure.

Metrics Server

Kubernetes add-on that collects resource metrics from kubelets for use in autoscaling and monitoring.

Metrics Server Optimization

Techniques for improving the performance and efficiency of the Kubernetes Metrics Server for better monitoring.

MicroK8s

Lightweight, CNCF-certified Kubernetes distribution designed for developer workstations, IoT devices, and CI/CD.

Microservices Chassis Pattern

Reusable base structure for building microservices, providing common functionalities like logging and monitoring.

MinIO Object Storage

High-performance, S3-compatible object storage system, often used for persistent storage in container environments.

Mount Propagation

Feature allowing containers to share mounted volumes, enabling advanced storage scenarios in Kubernetes.

Multi-Container Pod Patterns

Design patterns for deploying multiple containers within a single pod, such as sidecar, ambassador, or adapter patterns.

Multi-architecture Images

Container images supporting multiple CPU architectures, enabling deployment flexibility across diverse hardware.

Multi-cluster Management

Tools and practices for administering and orchestrating multiple Kubernetes clusters as a unified system.

Multi-cluster Networking

Technologies and configurations enabling network connectivity and service discovery across multiple Kubernetes clusters.

Multi-cluster Orchestration

Coordinated management and deployment of containerized applications across multiple Kubernetes clusters.

Multi-cluster Service Discovery

Mechanisms for locating and accessing services deployed across multiple Kubernetes clusters.

Multi-cluster Service Mesh

Implementation of service mesh functionalities spanning multiple Kubernetes clusters for unified traffic management.

Multi-stage Builds

Dockerfile technique using multiple stages to create optimized, smaller container images by separating build and runtime environments.

Multitenancy Benchmarks

Performance and isolation tests for evaluating the effectiveness of multi-tenant Kubernetes cluster configurations.

Multus

CNI plugin enabling attachment of multiple network interfaces to pods in Kubernetes, supporting advanced networking scenarios.

Multus CNI

Container Network Interface plugin allowing multiple CNI plugins to be used simultaneously, enabling multi-network support for pods.

Multus CNI for Multiple Networks

Use of Multus to attach pods to multiple networks, enabling complex networking scenarios in Kubernetes.

Mutating Webhooks

Admission controller webhooks that can modify resource requests before they are persisted, enabling dynamic resource manipulation.

Mutual TLS (mTLS)

Security protocol ensuring both client and server authenticate each other, commonly used in service mesh implementations.

NIST SP 800-190

Observability platform offering performance monitoring and analytics for containerized applications and infrastructure.

NSM (Network Service Mesh)

Cloud-native approach to solving L2/L3 use cases and service chain provisioning in Kubernetes.

NUMA-aware Scheduling

Kubernetes feature considering Non-Uniform Memory Access topology for optimal pod placement.

Namespace

Kubernetes abstraction for creating multiple virtual clusters within a physical cluster, providing a scope for names and resources.

Namespaces

Kubernetes feature for partitioning clusters into virtual sub-clusters, enabling resource isolation and access control.

Network Address Translation (NAT)

Process of modifying network address information in packet headers for routing in container networks.

Network Function Virtualization (NFV)

Concept of replacing dedicated network appliances with virtualized functions, often containerized.

Network Microsegmentation

Security technique dividing networks into isolated zones, enhancing container and microservices security.

Network Policies

Kubernetes resources specifying how groups of pods are allowed to communicate with each other and other network endpoints.

Network Policy

Specification of how groups of pods are allowed to communicate with each other and other network endpoints.

Network Policy Logging

Feature enabling logging of allowed and denied network connections based on Kubernetes Network Policies.

Network Segmentation

Practice of dividing a network into smaller segments or subnets, improving security and performance in container environments.

Network Service Mesh (NSM)

Cloud-native solution providing layer 2/3 network services to Kubernetes workloads, enhancing networking capabilities.

NetworkPolicy

Kubernetes resource defining rules for pod-to-pod and pod-to-external communication, implementing network segmentation.

NeuVector for Container Firewall

Security platform providing real-time container firewall, vulnerability management, and compliance for Kubernetes.

New Relic Container Monitoring

Observability platform offering performance monitoring and analytics for containerized applications and infrastructure.

Node

Basic unit of a distributed application in many systems, often referring to individual machines or processes.

Node Affinity

Kubernetes feature allowing pods to be scheduled on nodes with specific characteristics based on labels.

Node Authorization

Kubernetes authorization mode controlling kubelet access to the API server, enhancing cluster security.

Node Auto-provisioning

Feature automatically adjusting the number of nodes in a Kubernetes cluster based on workload demands.

Node Exporter

Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, used for node-level monitoring in Kubernetes.

Node Feature Discovery

Kubernetes add-on detecting hardware features and system configuration, facilitating hardware-aware scheduling.

Node Name

Unique identifier for a node in a Kubernetes cluster, used in various operations and configurations.

Node Pressure Eviction

Process of removing pods from a node when it experiences resource pressure, ensuring stability.

Node Problem Detector

Kubernetes add-on monitoring and reporting node health issues, enhancing cluster reliability.

Node Restriction Admission Plugin

Kubernetes plugin limiting node and pod modifications to increase security and prevent privilege escalation.

Node Selector

Kubernetes feature for constraining pods to nodes with specific labels, enabling basic scheduling control.

Node Upgrade Process

Procedure for updating the software stack on Kubernetes nodes while minimizing disruption to running workloads.

Node-level Logging

Capture and management of system and container logs at the node level in a Kubernetes cluster.

NodeLifecycleController

Kubernetes controller managing the lifecycle of nodes, handling node registration and decommissioning.

NodeLocal DNSCache

Kubernetes add-on running a dns caching agent on cluster nodes to improve DNS performance.

NodePort

Kubernetes service type exposing the service on each node's IP at a static port, enabling external access.

NodePort Services

Kubernetes services that expose applications on a static port on each node, facilitating external access.

Non-root User Containers

Security practice of running containers with non-privileged users to reduce potential attack surface.

North-South Traffic

Network communication between external clients and services within a Kubernetes cluster, typically through ingress.

Notary

Open-source project providing secure content distribution and verification for container registries.

Notary for Content Trust

Implementation of Notary to ensure the integrity and authenticity of container images, enhancing supply chain security.

OCI Distribution Spec

Open Container Initiative specification defining an API protocol for distributing container images.

OCI Image Spec

Open Container Initiative specification defining the format of container images, ensuring interoperability.

OCI Image Specification

Detailed standard for container image format, ensuring interoperability between different container technologies.

OCI Runtime Specification

Standard defining the configuration, execution environment, and lifecycle of containers, ensuring compatibility.

OOM Killer

Linux kernel mechanism for terminating processes when the system runs out of memory, affecting container reliability.

OVN-Kubernetes for Open Virtual Networking

Integration of Open Virtual Network with Kubernetes for advanced software-defined networking.

Octant Dashboard

Open-source developer-centric web interface for visualizing Kubernetes cluster state and workloads.

Open Container Initiative (OCI) Runtime Spec

Industry standard for container runtime implementations, ensuring compatibility across platforms.

Open Policy Agent (OPA)

General-purpose policy engine for cloud-native environments, often used for Kubernetes admission control.

Open Policy Agent (OPA) Constraint Framework

OPA-based system for declaring, managing, and enforcing policies in Kubernetes environments.

OpenEBS

Container-attached storage solution providing persistent storage for stateful workloads in Kubernetes.

OpenEBS Local PV

OpenEBS feature for provisioning local persistent volumes, optimizing performance for I/O intensive workloads.

OpenFaaS

Framework for building serverless functions with Docker and Kubernetes, simplifying the deployment of event-driven workloads.

OpenID Connect Tokens

JSON Web Tokens used for authentication in Kubernetes, often integrated with external identity providers.

OpenTelemetry Collector

Vendor-agnostic way to receive, process, and export telemetry data in various formats for observability.

OpenTracing

Vendor-neutral API for distributed tracing, facilitating the instrumentation of microservices for observability.

OpenYurt

Kubernetes extension designed for edge computing scenarios, enabling efficient management of edge nodes.

Operator Lifecycle Manager (OLM)

Kubernetes extension that oversees installation, upgrades, and management of Operators in a cluster.

Operator Metering

Feature for usage reporting and billing in Kubernetes clusters, often used with Operators.

Operator Metrics

Performance and health indicators exposed by Kubernetes Operators for monitoring and alerting.

Operator Pattern

Kubernetes extension pattern for automating application-specific operational knowledge and tasks.

Operator SDK

Framework for building Kubernetes Operators, simplifying the development process with high-level APIs.

Operator Scorecard

Tool for validating Operators against best practices and providing suggestions for improvements.

OperatorHub

Public registry for finding and sharing Kubernetes Operators, facilitating discovery and distribution.

Out-of-Tree Plugins

Kubernetes plugins developed and maintained outside the main Kubernetes repository, enabling extensibility.

Outbox Pattern for Reliable Messaging

Design pattern ensuring consistency between database and message broker in distributed systems.

Outlier Detection

Process of identifying abnormal behavior in containerized applications or infrastructure for troubleshooting.

Overhead

Additional resource consumption introduced by container runtimes and orchestration systems.

Overlay Filesystems

Layered filesystem used by container runtimes to efficiently manage image layers and container writes.

Overlay Networks

Virtual networks created on top of existing networks, enabling container-to-container communication across hosts.

Parent Image

Base container image upon which other images are built, providing foundational layers for child images.

Peer Authentication

Service mesh feature ensuring mutual authentication between services using mTLS, enhancing security.

Persistent Volume Claims (PVC)

Kubernetes resource representing a request for storage by a user, abstracting storage implementation details.

Persistent Volumes (PV)

Kubernetes abstraction for a piece of storage in the cluster, managed independently of individual pods.

PersistentVolume

Kubernetes resource representing a piece of storage in the cluster that has been provisioned by an administrator.

PersistentVolumeClaim

Kubernetes resource representing a request for storage by a user, abstracting the details of the underlying storage implementation.

Pipeline as Code

Practice of defining CI/CD pipelines using code, often stored alongside application code for version control and review.

Pixie

Open-source observability tool for Kubernetes, providing automatic data collection and real-time debugging capabilities.

Pixie for Kubernetes Observability

Use of Pixie to gain deep insights into Kubernetes cluster performance and application behavior without code changes.

Pod

Smallest deployable unit in Kubernetes, consisting of one or more containers sharing storage and network resources.

Pod Affinity

Kubernetes scheduling constraint that allows pods to be co-located with other pods based on labels.

Pod Affinity/Anti-Affinity

Kubernetes features for influencing pod scheduling based on the topology of the cluster and other pods.