Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

"As code"

Defining and managing infrastructure, configurations, or processes using code, enabling version control, automation, and reproducibility.
DevOps

"Nines"

Measure of system availability, expressed as a percentage. E.g., "five nines" means 99.999% uptime, allowing for minimal downtime.
DevOps

"Single Pane of Glass"

Unified display or interface that integrates data from multiple sources, providing a comprehensive view of system status or operations.
DevOps

A/B Testing

Comparing two versions of a webpage or app to determine which performs better, based on user interaction and conversion rates.
DevOps

AIOps (Artificial Intelligence Operations)

Using AI and machine learning to enhance IT operations, automating tasks and providing insights for better decision-making.
DevOps

ALB (Application Load Balancing)

Distributes incoming application traffic across multiple targets to improve availability and fault tolerance.
DevOps

API

Application Programming Interface; set of protocols and tools for building software applications and enabling communication between systems.
DevOps

API Discovery

Process of identifying and documenting available APIs within an organization or from external sources.
DevOps

API Endpoint

Specific URL where an API can be accessed and where requests are sent to interact with a server or service.
DevOps

API Gateway

Manages, secures, and routes API requests, acting as a single entry point for multiple microservices or backend systems.
DevOps

API Management

Process of creating, publishing, documenting, and analyzing APIs in a secure environment.
DevOps

API Monitoring

Tracking API performance, availability, and usage to ensure optimal functionality and identify issues.
DevOps

API Response Time

The duration between sending a request to an API and receiving the response, crucial for performance evaluation.
DevOps

API Security

Measures and practices to protect APIs from unauthorized access, attacks, and data breaches.
DevOps

API Versioning

Managing different versions of an API to maintain compatibility while allowing updates and improvements.
DevOps

ASG (Auto Scaling Group)

Feature in cloud computing that automatically adjusts the number of instances based on defined conditions.
DevOps

ASP.Net Core Monitoring

Observing and analyzing the performance and behavior of applications built with ASP.Net Core framework.
DevOps

ATO (Account Takeover)

Type of identity theft where an attacker gains unauthorized access to a user's account.
DevOps

AWS (Amazon Web Services)

Cloud computing platform offering a wide range of services for computing, storage, networking, and more.
DevOps

AWS App Development Tools

Suite of tools provided by AWS for building, testing, and deploying applications on their cloud platform.
DevOps

AWS CLI

Command-line interface for interacting with AWS services, allowing users to manage resources and automate tasks.
DevOps

AWS CloudWatch

Monitoring and observability service for AWS resources and applications, providing metrics, logs, and alarms.
DevOps

AWS CodeDeploy

Fully managed deployment service that automates software deployments to various compute services.
DevOps

AWS CodePipeline

Continuous delivery service for fast and reliable application and infrastructure updates.
DevOps

AWS EC2

Elastic Compute Cloud; scalable computing capacity in the AWS cloud for running virtual servers.
DevOps

AWS ELB

Elastic Load Balancing; automatically distributes incoming application traffic across multiple targets.
DevOps

AWS Lambda

Serverless compute service that runs code in response to events and automatically manages the underlying resources.
DevOps

AWS Managed Services

Ongoing management of AWS infrastructure, allowing customers to focus on their applications and business.
DevOps

AWS Monitoring

Process of tracking and analyzing the performance, health, and usage of AWS resources and applications.
DevOps

AWS RDS

Relational Database Service; managed service for setting up, operating, and scaling relational databases in the cloud.
DevOps

AWS RDS Postgres Monitoring

Tracking and analyzing the performance and health of PostgreSQL databases running on AWS RDS.
DevOps

AWS S3

Simple Storage Service; object storage service offering industry-leading scalability, data availability, and performance.
DevOps

AWS S3 Cost Optimization

Strategies and practices to reduce costs associated with storing and accessing data in AWS S3.
DevOps

AWS Security

Set of tools, services, and best practices for protecting data, applications, and infrastructure in the AWS cloud.
DevOps

Acceptance Test-Driven Development (ATDD)

Software development approach where acceptance tests are written before the code, guiding implementation.
DevOps

Active Directory

Microsoft's directory service for Windows domain networks, managing users, computers, groups, and other objects.
DevOps

Advanced Rate Limiting

Technique to control the rate of incoming requests to an API or service, preventing overload and ensuring fair usage.
DevOps

Agent

Software component that performs automated tasks, often used in monitoring, data collection, or system management.
DevOps

Agile

Iterative approach to software development emphasizing flexibility, collaboration, and rapid delivery of working software.
DevOps

Agile Manifesto

Document outlining values and principles of Agile software development, prioritizing individuals, working software, and adaptability.
DevOps

Agile Methodology

Set of practices based on Agile principles, focusing on iterative development, team collaboration, and customer feedback.
DevOps

Agile Organization

Company structure that emphasizes adaptability, quick response to change, and continuous improvement.
DevOps

Agile Project Management

Applying Agile principles to project management, focusing on iterative planning, frequent delivery, and team empowerment.
DevOps

Agile Software Development

Iterative approach to building software, emphasizing flexibility, collaboration, and rapid delivery of working features.
DevOps

Ajax Requests

Technique for creating fast, dynamic web pages by exchanging small amounts of data with the server behind the scenes.
DevOps

Alerting

System for notifying relevant personnel about critical events or issues in IT infrastructure or applications.
DevOps

Amazon Aurora

Fully managed relational database engine compatible with MySQL and PostgreSQL, designed for the cloud.
DevOps

Amazon Web Services (AWS)

A cloud platform offering a wide range of services like computing power, storage, and databases, enabling scalable, flexible solutions.
DevOps

Android Deployment

Process of distributing and installing Android applications on devices or making them available through app stores.
DevOps

Android Emulator

Software tool that simulates Android devices on a computer for testing and development purposes.
DevOps

Android Studio

Official integrated development environment (IDE) for Android app development, offering a comprehensive set of tools and features.
DevOps

Anomaly Detection

Process of identifying unusual patterns or behaviors that deviate from expected norms in data or system behavior.
DevOps

Ansible

Open-source automation tool for configuration management, application deployment, and task automation.
DevOps

Antifragile

Quality of systems that gain strength from disorder or stress, becoming more resilient in the face of challenges.
DevOps

Apache

Popular open-source web server software that can run on various platforms, known for its reliability and extensive feature set.
DevOps

App Store Connect

Apple's platform for managing apps, viewing analytics, and submitting to the App Store.
DevOps

AppDynamics

Application performance management and IT operations analytics platform for monitoring and optimizing application performance.
DevOps

Application Containerization

Packaging software code and dependencies into lightweight, portable containers for consistent deployment across environments.
DevOps

Application Firewall

Security system that monitors, filters, and blocks HTTP/HTTPS traffic to and from web applications.
DevOps

Application Infrastructure

The hardware, software, and networking components required to run and support an application.
DevOps

Application Lifecycle Management

Process of managing an application from ideation through retirement, including development, testing, and maintenance.
DevOps

Application Migration

Process of moving an application from one environment to another, often involving cloud or platform transitions.
DevOps

Application Performance Monitoring (APM)

Tools and practices for monitoring and managing the performance and availability of software applications.
DevOps

Application Platform

Software framework that provides a foundation for developing and running applications, often including runtime services and APIs.
DevOps

Application Program Interface (API)

Set of protocols, routines, and tools for building software applications and enabling communication between different software systems.
DevOps

Application Release Automation (ARA)

Process of packaging and deploying applications automatically across various environments and platforms.
DevOps

Application Security

Measures taken to improve the security of an application by finding, fixing, and preventing vulnerabilities.
DevOps

Application Team

Group responsible for developing, maintaining, and improving a specific application or set of applications.
DevOps

Application Whitelisting

Security practice that specifies which applications are permitted to run on a system, blocking all others.
DevOps

Application Workflow

Sequence of tasks or processes within an application, often automated to improve efficiency and consistency.
DevOps

Aptly

Debian repository management tool that makes it easy to mirror existing repositories and create new ones.
DevOps

Artifact

Any file or object produced during the software development process, such as compiled code, documentation, or test results.
DevOps

Artifactory

Repository manager for storing and managing software packages, artifacts, and dependencies.
DevOps

Artifacts

Byproducts of software development, including executables, libraries, documentation, and other files created during the process.
DevOps

Artificial Intelligence (AI)

Computer systems capable of performing tasks that typically require human intelligence, such as learning and problem-solving.
DevOps

Asgard

Open-source web-based tool for cloud management and application deployment, primarily used with Amazon Web Services.
DevOps

Asterisk

Open-source framework for building communications applications, particularly used for creating custom telephone systems.
DevOps

Atom

Open-source text and source code editor developed by GitHub, known for its customizability.
DevOps

Attack Surface

Total sum of vulnerabilities in a given system that are accessible to an attacker.
DevOps

Attack Vector

Method or pathway used by a malicious actor to gain unauthorized access to a computer or network.
DevOps

Audit Log

Chronological record of system activities, providing a trail for tracking user actions and system events.
DevOps

Auditd

Linux daemon that monitors and logs system activities to detect security violations.
DevOps

Authentication Factor

Piece of information or process used to verify a user's identity, such as passwords, biometrics, or security tokens.
DevOps

Automated Builds

Process of compiling source code into executable software without manual intervention, often part of CI/CD pipelines.
DevOps

Automation

Use of technology to perform tasks with minimal human intervention, improving efficiency and reducing errors.
DevOps

Autonomy

Degree of independence and self-governance given to teams or systems in making decisions and performing tasks.
DevOps

Awsbox

Tool for deploying node.js apps to Amazon Web Services, simplifying the process of setting up and managing instances.
DevOps

Azure

Microsoft's cloud computing platform providing a wide range of services for building, testing, deploying, and managing applications.
DevOps

Back-end

Server-side of a website or application, responsible for data storage, security, and business logic.
DevOps

Backup

Copy of data created to protect against loss or damage, often stored separately from the original for recovery purposes.
DevOps

Bad/Threat Actor

Individual or entity that attempts to exploit vulnerabilities in systems or networks for malicious purposes.
DevOps

Baklava code

Term describing code that has too many layers, making it overly complex and difficult to understand or maintain.
DevOps

Bamboo

Continuous integration and deployment server by Atlassian, automating the building, testing, and deployment of software.
DevOps

Bare-metal

Physical computer server dedicated to a single tenant, not virtualized or shared among multiple users.
DevOps

Barkeep

Open-source web-based code review system that facilitates collaborative code reviews and discussions.
DevOps

Bash

Unix shell and command language, widely used for scripting and automating tasks in Unix-like operating systems.
DevOps

Bastion host

Specially designed system on a network specifically intended to withstand attacks, usually placed at the edge of a network.
DevOps

Bazel

Open-source build and test tool that enables fast, reproducible builds across multiple platforms and languages.
DevOps

Beats

Lightweight data shippers for various types of data, part of the Elastic Stack for log and metrics collection.
DevOps

Behavior-Driven Development (BDD)

Software development approach that focuses on defining the behavior of an application based on user stories.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Data Governance

Policies and processes for ensuring data quality, security, and compliance in cloud environments.

Data Integration as a Service

Cloud-based tools for combining data from various sources into a unified view, enabling comprehensive data analysis.

Data Lake

Centralized repository storing structured and unstructured data at scale in its native format.

Data Lake (e.g., AWS Lake Formation, Azure Data Lake)

Large-scale storage repository for raw data in various formats in cloud environments.

Data Lake Houses

Hybrid architecture combining data lake storage with data warehouse query capabilities in cloud environments.

Data Lineage

Tracking the origin, movement, and transformations of data throughout its lifecycle in cloud systems.

Data Lineage and Provenance Tracking

Monitoring data origins, transformations, and usage across cloud environments for compliance and analysis.

Data Mart

Subset of a data warehouse focused on specific business functions or departments in cloud environments.

Data Masking and Anonymization

Techniques to protect sensitive information by obscuring or replacing identifiable data in cloud storage.

Data Mesh Architecture

Decentralized approach to data management, treating data as a product owned by domain teams in cloud environments.

Data Mesh Platforms

Tools supporting implementation of data mesh principles in cloud-based data architectures.

Data Migration

Process of transferring data between storage types, formats, or systems in cloud environments.

Data Pipeline (e.g., AWS Data Pipeline, Azure Data Factory)

Automated process for extracting, transforming, and loading data between cloud systems or services.

Data Protection Impact Assessment (DPIA)

Systematic analysis of how data processing activities affect privacy in cloud environments.

Data Quality as a Service

Cloud-based tools for assessing, improving, and maintaining the quality of data assets.

Data Residency

Specifying the physical location where cloud-stored data resides for compliance with regulations.

Data Rights Management

Controls for protecting intellectual property and sensitive information in cloud-based data sharing.

Data Science Marketplaces

Platforms for sharing and monetizing data science models and algorithms in the cloud.

Data Science Version Control

Tools for tracking changes and collaborating on data science projects in cloud environments.

Data Skew Handling in Distributed Systems

Techniques for managing uneven data distribution in cloud-based parallel processing.

Data Sovereignty

Concept that data is subject to the laws of the country in which it is stored in cloud environments.

Data Tokenization Services

Cloud-based tools for replacing sensitive data with non-sensitive equivalents for security purposes.

Data Versioning and Time Travel

Capability to access and restore previous versions of data in cloud storage systems.

Data Virtualization

Technology that provides a unified view of data from multiple cloud and on-premises sources without moving it.

Data Visualization

Tools and techniques for creating visual representations of data stored in cloud environments.

Data Warehouse (e.g., Amazon Redshift, Azure Synapse Analytics)

Centralized repository optimized for analytics and business intelligence in cloud environments.

Data Warehousing

Process of collecting, storing, and managing data from varied sources in a central cloud repository for analysis.

Database Auditing

Monitoring and recording database activities in cloud environments for security and compliance purposes.

Database Backup and Restore

Process of creating copies of databases and recovering them in cloud environments for data protection.

Database Caching

Technique to store frequently accessed data in memory for faster retrieval in cloud databases.

Database Encryption

Process of encoding data to protect sensitive information in cloud-based databases.

Database Failover

Automatic switching to a redundant database when the primary system fails in cloud environments.

Database High Availability

Techniques ensuring continuous database operation in cloud environments, minimizing downtime.

Database Migration

Process of moving databases from on-premises or other cloud environments to a target cloud platform.

Database Migration Service

Managed service for migrating databases to cloud platforms with minimal downtime.

Database Performance Tuning

Optimizing database operations for improved speed and efficiency in cloud environments.

Database Proxy

Intermediary service managing connections between applications and cloud databases for improved security and performance.

Database Scaling (Vertical and Horizontal)

Adjusting database resources vertically (more powerful hardware) or horizontally (more instances) in cloud environments.

Database Sharding

Distributing data across multiple database instances for improved performance and scalability in the cloud.

Database Version Upgrades

Process of updating database software to newer versions in cloud environments, improving performance and security.

Database as a Service (DBaaS)

Managed cloud service providing database functionality without the need for infrastructure management.

Dead Letter Queues

Storage for messages that can't be processed successfully in cloud-based message queuing systems.

Decentralized Cloud (Web3)

Distributed cloud computing model leveraging blockchain technology for increased security and user control.

Decentralized Cloud Resource Markets

Blockchain-based platforms for trading compute resources across distributed cloud networks.

Decentralized Identity

Self-sovereign identity management using blockchain technology in cloud environments.

Decentralized Identity Management

Systems for user authentication and authorization using blockchain in cloud environments.

Decentralized Storage

Distributed file storage systems using peer-to-peer networks in cloud computing environments.

Deception Technology in the Cloud

Security approach using decoys to detect, deceive, and deflect attackers in cloud environments.

Deep Learning

Subset of machine learning using neural networks with multiple layers for complex pattern recognition in cloud environments.

Deployment Automation

Tools and practices for automatically releasing and updating applications in cloud environments.

Deployment Manager (Google Cloud)

Service for declaratively managing and deploying cloud resources on Google Cloud Platform.

DevOps Assembly Lines

Automated, end-to-end pipelines for software delivery in cloud environments, streamlining development and deployment processes.

DevOps Culture and Practices

Collaborative approach integrating development and operations teams for efficient cloud-based software delivery.

DevOps Metrics and KPIs

Measurements for assessing the performance and efficiency of DevOps processes in cloud environments.

DevSecOps Automation

Integration of security practices into DevOps processes using automated tools in cloud environments.

DevSecOps Automation Platforms

Integrated tools for implementing security throughout the DevOps lifecycle in cloud environments.

Device Management

Tools and practices for configuring, monitoring, and securing IoT devices connected to cloud platforms.

Device Provisioning

Process of setting up and configuring IoT devices for secure connection to cloud platforms.

Differential Privacy as a Service

Cloud-based tools for adding noise to data to protect individual privacy while maintaining overall accuracy.

Digital Experience Monitoring (DEM)

Tools for tracking and optimizing user interactions with cloud-based applications and services.

Digital Twin Technology

Virtual representations of physical objects or systems, often leveraging cloud resources for simulation and analysis.

Digital Twins

Virtual models of physical assets or processes, often using cloud computing for data processing and simulation.

Digital Twins in the Cloud

Cloud-based virtual representations of physical entities for monitoring, simulation, and optimization.

Direct Connect

Dedicated network connection between on-premises infrastructure and cloud service providers.

Disaggregated Server Architectures

Cloud infrastructure designs separating compute, storage, and networking for flexible resource allocation.

Disaggregated Storage

Cloud storage architecture separating storage management functions from physical storage devices.

Disaster Recovery

Strategies and tools for recovering data and systems after a catastrophic event in cloud environments.

Distributed AI Training

Process of training machine learning models across multiple cloud nodes for improved speed and efficiency.

Distributed Cloud

Cloud services distributed across multiple physical locations but managed centrally.

Distributed Constraint Optimization

Techniques for solving complex problems across multiple cloud nodes while satisfying various constraints.

Distributed Data Science Workflows

Cloud-based systems for running data analysis and machine learning tasks across multiple nodes.

Distributed Deception Platforms

Cloud-based security systems deploying decoys across multiple points to detect and mislead attackers.

Distributed Edge AI Training

Process of training AI models across multiple edge devices and cloud resources, enabling decentralized learning at scale.

Distributed Hyperparameter Optimization

Technique for tuning machine learning models across multiple cloud nodes for improved performance.

Distributed Ledger Orchestration

Managing and coordinating blockchain networks across multiple cloud environments.

Distributed Tracing for Microservices

Tracking and analyzing requests as they flow through cloud-based microservices architectures.

Domain-Specific Languages (DSLs) for Cloud

Specialized programming languages designed for efficient cloud resource management and deployment.

Drift Detection

Monitoring and identifying unauthorized or unintended changes in cloud infrastructure configurations.

Durable Functions (Azure)

Extension of Azure Functions that enables stateful operations in serverless compute environments.

Dynamic Access Control

Adaptive security measures that adjust permissions based on context in cloud environments.

E-Waste Management for Cloud Infrastructure

Responsible disposal and recycling of outdated or decommissioned cloud hardware.

E-Waste Management in Cloud Computing

Strategies for sustainably disposing of and recycling obsolete cloud computing hardware.

ETL (Extract, Transform, Load)

Process of moving data from source systems into a data warehouse in cloud environments.

Eco-Friendly Cloud Migration Strategies

Approaches to moving to the cloud that minimize environmental impact and energy consumption.

Edge AI

Artificial intelligence algorithms running on devices at the network edge, often integrated with cloud backends.

Edge AI Model Compression Techniques

Methods for reducing the size of AI models to run efficiently on edge devices with cloud support.

Edge AI Model Versioning

Managing and updating AI model versions across distributed edge devices and cloud systems.

Edge AI Security

Measures to protect AI models and data on edge devices connected to cloud networks.

Edge AI/ML

Artificial intelligence and machine learning capabilities deployed on edge devices, often with cloud integration.

Edge Analytics

Processing and analyzing data near its source on edge devices before sending insights to the cloud.

Edge Analytics Frameworks

Software platforms for developing and deploying analytics applications on edge devices with cloud connectivity.

Edge Anomaly Detection

Identifying unusual patterns or behaviors in data at the network edge before sending alerts to the cloud.

Edge Caching

Storing frequently accessed data on edge devices or servers to reduce latency and cloud bandwidth usage.

Edge Compute Networking

Network architectures optimized for connecting edge computing devices to cloud resources.

Edge Computer Vision

Processing and analyzing visual data on edge devices before sending results to the cloud.

Edge Content Delivery

Distributing and caching content on edge servers to reduce latency and cloud bandwidth consumption.

Edge Databases

Database systems designed to run on edge devices with intermittent connectivity to cloud backends.

Edge Generative AI

Creating AI-generated content on edge devices with potential cloud-based model updates and synchronization.

Edge Inference Optimization

Techniques to improve AI model performance on edge devices, reducing latency and cloud dependence.

Edge Locations

Distributed sites hosting cloud services closer to end-users for reduced latency and improved performance.

Metrics Pipeline

System for collecting, processing, and storing performance metrics from containerized applications and infrastructure.

Metrics Server

Kubernetes add-on that collects resource metrics from kubelets for use in autoscaling and monitoring.

Metrics Server Optimization

Techniques for improving the performance and efficiency of the Kubernetes Metrics Server for better monitoring.

MicroK8s

Lightweight, CNCF-certified Kubernetes distribution designed for developer workstations, IoT devices, and CI/CD.

Microservices Chassis Pattern

Reusable base structure for building microservices, providing common functionalities like logging and monitoring.

MinIO Object Storage

High-performance, S3-compatible object storage system, often used for persistent storage in container environments.

Mount Propagation

Feature allowing containers to share mounted volumes, enabling advanced storage scenarios in Kubernetes.

Multi-Container Pod Patterns

Design patterns for deploying multiple containers within a single pod, such as sidecar, ambassador, or adapter patterns.

Multi-architecture Images

Container images supporting multiple CPU architectures, enabling deployment flexibility across diverse hardware.

Multi-cluster Management

Tools and practices for administering and orchestrating multiple Kubernetes clusters as a unified system.

Multi-cluster Networking

Technologies and configurations enabling network connectivity and service discovery across multiple Kubernetes clusters.

Multi-cluster Orchestration

Coordinated management and deployment of containerized applications across multiple Kubernetes clusters.

Multi-cluster Service Discovery

Mechanisms for locating and accessing services deployed across multiple Kubernetes clusters.

Multi-cluster Service Mesh

Implementation of service mesh functionalities spanning multiple Kubernetes clusters for unified traffic management.

Multi-stage Builds

Dockerfile technique using multiple stages to create optimized, smaller container images by separating build and runtime environments.

Multitenancy Benchmarks

Performance and isolation tests for evaluating the effectiveness of multi-tenant Kubernetes cluster configurations.

Multus

CNI plugin enabling attachment of multiple network interfaces to pods in Kubernetes, supporting advanced networking scenarios.

Multus CNI

Container Network Interface plugin allowing multiple CNI plugins to be used simultaneously, enabling multi-network support for pods.

Multus CNI for Multiple Networks

Use of Multus to attach pods to multiple networks, enabling complex networking scenarios in Kubernetes.

Mutating Webhooks

Admission controller webhooks that can modify resource requests before they are persisted, enabling dynamic resource manipulation.

Mutual TLS (mTLS)

Security protocol ensuring both client and server authenticate each other, commonly used in service mesh implementations.

NIST SP 800-190

Observability platform offering performance monitoring and analytics for containerized applications and infrastructure.

NSM (Network Service Mesh)

Cloud-native approach to solving L2/L3 use cases and service chain provisioning in Kubernetes.

NUMA-aware Scheduling

Kubernetes feature considering Non-Uniform Memory Access topology for optimal pod placement.

Namespace

Kubernetes abstraction for creating multiple virtual clusters within a physical cluster, providing a scope for names and resources.

Namespaces

Kubernetes feature for partitioning clusters into virtual sub-clusters, enabling resource isolation and access control.

Network Address Translation (NAT)

Process of modifying network address information in packet headers for routing in container networks.

Network Function Virtualization (NFV)

Concept of replacing dedicated network appliances with virtualized functions, often containerized.

Network Microsegmentation

Security technique dividing networks into isolated zones, enhancing container and microservices security.

Network Policies

Kubernetes resources specifying how groups of pods are allowed to communicate with each other and other network endpoints.

Network Policy

Specification of how groups of pods are allowed to communicate with each other and other network endpoints.

Network Policy Logging

Feature enabling logging of allowed and denied network connections based on Kubernetes Network Policies.

Network Segmentation

Practice of dividing a network into smaller segments or subnets, improving security and performance in container environments.

Network Service Mesh (NSM)

Cloud-native solution providing layer 2/3 network services to Kubernetes workloads, enhancing networking capabilities.

NetworkPolicy

Kubernetes resource defining rules for pod-to-pod and pod-to-external communication, implementing network segmentation.

NeuVector for Container Firewall

Security platform providing real-time container firewall, vulnerability management, and compliance for Kubernetes.

New Relic Container Monitoring

Observability platform offering performance monitoring and analytics for containerized applications and infrastructure.

Node

Basic unit of a distributed application in many systems, often referring to individual machines or processes.

Node Affinity

Kubernetes feature allowing pods to be scheduled on nodes with specific characteristics based on labels.

Node Authorization

Kubernetes authorization mode controlling kubelet access to the API server, enhancing cluster security.

Node Auto-provisioning

Feature automatically adjusting the number of nodes in a Kubernetes cluster based on workload demands.

Node Exporter

Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, used for node-level monitoring in Kubernetes.

Node Feature Discovery

Kubernetes add-on detecting hardware features and system configuration, facilitating hardware-aware scheduling.

Node Name

Unique identifier for a node in a Kubernetes cluster, used in various operations and configurations.

Node Pressure Eviction

Process of removing pods from a node when it experiences resource pressure, ensuring stability.

Node Problem Detector

Kubernetes add-on monitoring and reporting node health issues, enhancing cluster reliability.

Node Restriction Admission Plugin

Kubernetes plugin limiting node and pod modifications to increase security and prevent privilege escalation.

Node Selector

Kubernetes feature for constraining pods to nodes with specific labels, enabling basic scheduling control.

Node Upgrade Process

Procedure for updating the software stack on Kubernetes nodes while minimizing disruption to running workloads.

Node-level Logging

Capture and management of system and container logs at the node level in a Kubernetes cluster.

NodeLifecycleController

Kubernetes controller managing the lifecycle of nodes, handling node registration and decommissioning.

NodeLocal DNSCache

Kubernetes add-on running a dns caching agent on cluster nodes to improve DNS performance.

NodePort

Kubernetes service type exposing the service on each node's IP at a static port, enabling external access.

NodePort Services

Kubernetes services that expose applications on a static port on each node, facilitating external access.

Non-root User Containers

Security practice of running containers with non-privileged users to reduce potential attack surface.

North-South Traffic

Network communication between external clients and services within a Kubernetes cluster, typically through ingress.

Notary

Open-source project providing secure content distribution and verification for container registries.

Notary for Content Trust

Implementation of Notary to ensure the integrity and authenticity of container images, enhancing supply chain security.

OCI Distribution Spec

Open Container Initiative specification defining an API protocol for distributing container images.

OCI Image Spec

Open Container Initiative specification defining the format of container images, ensuring interoperability.

OCI Image Specification

Detailed standard for container image format, ensuring interoperability between different container technologies.

OCI Runtime Specification

Standard defining the configuration, execution environment, and lifecycle of containers, ensuring compatibility.

OOM Killer

Linux kernel mechanism for terminating processes when the system runs out of memory, affecting container reliability.

OVN-Kubernetes for Open Virtual Networking

Integration of Open Virtual Network with Kubernetes for advanced software-defined networking.

Octant Dashboard

Open-source developer-centric web interface for visualizing Kubernetes cluster state and workloads.

Open Container Initiative (OCI) Runtime Spec

Industry standard for container runtime implementations, ensuring compatibility across platforms.

Open Policy Agent (OPA)

General-purpose policy engine for cloud-native environments, often used for Kubernetes admission control.

Open Policy Agent (OPA) Constraint Framework

OPA-based system for declaring, managing, and enforcing policies in Kubernetes environments.

OpenEBS

Container-attached storage solution providing persistent storage for stateful workloads in Kubernetes.

OpenEBS Local PV

OpenEBS feature for provisioning local persistent volumes, optimizing performance for I/O intensive workloads.

OpenFaaS

Framework for building serverless functions with Docker and Kubernetes, simplifying the deployment of event-driven workloads.

OpenID Connect Tokens

JSON Web Tokens used for authentication in Kubernetes, often integrated with external identity providers.

OpenTelemetry Collector

Vendor-agnostic way to receive, process, and export telemetry data in various formats for observability.

OpenTracing

Vendor-neutral API for distributed tracing, facilitating the instrumentation of microservices for observability.

OpenYurt

Kubernetes extension designed for edge computing scenarios, enabling efficient management of edge nodes.

Operator Lifecycle Manager (OLM)

Kubernetes extension that oversees installation, upgrades, and management of Operators in a cluster.

Operator Metering

Feature for usage reporting and billing in Kubernetes clusters, often used with Operators.

Operator Metrics

Performance and health indicators exposed by Kubernetes Operators for monitoring and alerting.

Operator Pattern

Kubernetes extension pattern for automating application-specific operational knowledge and tasks.

Operator SDK

Framework for building Kubernetes Operators, simplifying the development process with high-level APIs.

Operator Scorecard

Tool for validating Operators against best practices and providing suggestions for improvements.

OperatorHub

Public registry for finding and sharing Kubernetes Operators, facilitating discovery and distribution.

Out-of-Tree Plugins

Kubernetes plugins developed and maintained outside the main Kubernetes repository, enabling extensibility.

Outbox Pattern for Reliable Messaging

Design pattern ensuring consistency between database and message broker in distributed systems.

Outlier Detection

Process of identifying abnormal behavior in containerized applications or infrastructure for troubleshooting.

Overhead

Additional resource consumption introduced by container runtimes and orchestration systems.

Overlay Filesystems

Layered filesystem used by container runtimes to efficiently manage image layers and container writes.

Overlay Networks

Virtual networks created on top of existing networks, enabling container-to-container communication across hosts.

Parent Image

Base container image upon which other images are built, providing foundational layers for child images.

Peer Authentication

Service mesh feature ensuring mutual authentication between services using mTLS, enhancing security.

Persistent Volume Claims (PVC)

Kubernetes resource representing a request for storage by a user, abstracting storage implementation details.

Persistent Volumes (PV)

Kubernetes abstraction for a piece of storage in the cluster, managed independently of individual pods.

PersistentVolume

Kubernetes resource representing a piece of storage in the cluster that has been provisioned by an administrator.

PersistentVolumeClaim

Kubernetes resource representing a request for storage by a user, abstracting the details of the underlying storage implementation.

Pipeline as Code

Practice of defining CI/CD pipelines using code, often stored alongside application code for version control and review.

Pixie

Open-source observability tool for Kubernetes, providing automatic data collection and real-time debugging capabilities.

Pixie for Kubernetes Observability

Use of Pixie to gain deep insights into Kubernetes cluster performance and application behavior without code changes.

Pod

Smallest deployable unit in Kubernetes, consisting of one or more containers sharing storage and network resources.

Pod Affinity

Kubernetes scheduling constraint that allows pods to be co-located with other pods based on labels.

Pod Affinity/Anti-Affinity

Kubernetes features for influencing pod scheduling based on the topology of the cluster and other pods.