Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

"As code"

Defining and managing infrastructure, configurations, or processes using code, enabling version control, automation, and reproducibility.
DevOps

"Nines"

Measure of system availability, expressed as a percentage. E.g., "five nines" means 99.999% uptime, allowing for minimal downtime.
DevOps

"Single Pane of Glass"

Unified display or interface that integrates data from multiple sources, providing a comprehensive view of system status or operations.
DevOps

A/B Testing

Comparing two versions of a webpage or app to determine which performs better, based on user interaction and conversion rates.
DevOps

AIOps (Artificial Intelligence Operations)

Using AI and machine learning to enhance IT operations, automating tasks and providing insights for better decision-making.
DevOps

ALB (Application Load Balancing)

Distributes incoming application traffic across multiple targets to improve availability and fault tolerance.
DevOps

API

Application Programming Interface; set of protocols and tools for building software applications and enabling communication between systems.
DevOps

API Discovery

Process of identifying and documenting available APIs within an organization or from external sources.
DevOps

API Endpoint

Specific URL where an API can be accessed and where requests are sent to interact with a server or service.
DevOps

API Gateway

Manages, secures, and routes API requests, acting as a single entry point for multiple microservices or backend systems.
DevOps

API Management

Process of creating, publishing, documenting, and analyzing APIs in a secure environment.
DevOps

API Monitoring

Tracking API performance, availability, and usage to ensure optimal functionality and identify issues.
DevOps

API Response Time

The duration between sending a request to an API and receiving the response, crucial for performance evaluation.
DevOps

API Security

Measures and practices to protect APIs from unauthorized access, attacks, and data breaches.
DevOps

API Versioning

Managing different versions of an API to maintain compatibility while allowing updates and improvements.
DevOps

ASG (Auto Scaling Group)

Feature in cloud computing that automatically adjusts the number of instances based on defined conditions.
DevOps

ASP.Net Core Monitoring

Observing and analyzing the performance and behavior of applications built with ASP.Net Core framework.
DevOps

ATO (Account Takeover)

Type of identity theft where an attacker gains unauthorized access to a user's account.
DevOps

AWS (Amazon Web Services)

Cloud computing platform offering a wide range of services for computing, storage, networking, and more.
DevOps

AWS App Development Tools

Suite of tools provided by AWS for building, testing, and deploying applications on their cloud platform.
DevOps

AWS CLI

Command-line interface for interacting with AWS services, allowing users to manage resources and automate tasks.
DevOps

AWS CloudWatch

Monitoring and observability service for AWS resources and applications, providing metrics, logs, and alarms.
DevOps

AWS CodeDeploy

Fully managed deployment service that automates software deployments to various compute services.
DevOps

AWS CodePipeline

Continuous delivery service for fast and reliable application and infrastructure updates.
DevOps

AWS EC2

Elastic Compute Cloud; scalable computing capacity in the AWS cloud for running virtual servers.
DevOps

AWS ELB

Elastic Load Balancing; automatically distributes incoming application traffic across multiple targets.
DevOps

AWS Lambda

Serverless compute service that runs code in response to events and automatically manages the underlying resources.
DevOps

AWS Managed Services

Ongoing management of AWS infrastructure, allowing customers to focus on their applications and business.
DevOps

AWS Monitoring

Process of tracking and analyzing the performance, health, and usage of AWS resources and applications.
DevOps

AWS RDS

Relational Database Service; managed service for setting up, operating, and scaling relational databases in the cloud.
DevOps

AWS RDS Postgres Monitoring

Tracking and analyzing the performance and health of PostgreSQL databases running on AWS RDS.
DevOps

AWS S3

Simple Storage Service; object storage service offering industry-leading scalability, data availability, and performance.
DevOps

AWS S3 Cost Optimization

Strategies and practices to reduce costs associated with storing and accessing data in AWS S3.
DevOps

AWS Security

Set of tools, services, and best practices for protecting data, applications, and infrastructure in the AWS cloud.
DevOps

Acceptance Test-Driven Development (ATDD)

Software development approach where acceptance tests are written before the code, guiding implementation.
DevOps

Active Directory

Microsoft's directory service for Windows domain networks, managing users, computers, groups, and other objects.
DevOps

Advanced Rate Limiting

Technique to control the rate of incoming requests to an API or service, preventing overload and ensuring fair usage.
DevOps

Agent

Software component that performs automated tasks, often used in monitoring, data collection, or system management.
DevOps

Agile

Iterative approach to software development emphasizing flexibility, collaboration, and rapid delivery of working software.
DevOps

Agile Manifesto

Document outlining values and principles of Agile software development, prioritizing individuals, working software, and adaptability.
DevOps

Agile Methodology

Set of practices based on Agile principles, focusing on iterative development, team collaboration, and customer feedback.
DevOps

Agile Organization

Company structure that emphasizes adaptability, quick response to change, and continuous improvement.
DevOps

Agile Project Management

Applying Agile principles to project management, focusing on iterative planning, frequent delivery, and team empowerment.
DevOps

Agile Software Development

Iterative approach to building software, emphasizing flexibility, collaboration, and rapid delivery of working features.
DevOps

Ajax Requests

Technique for creating fast, dynamic web pages by exchanging small amounts of data with the server behind the scenes.
DevOps

Alerting

System for notifying relevant personnel about critical events or issues in IT infrastructure or applications.
DevOps

Amazon Aurora

Fully managed relational database engine compatible with MySQL and PostgreSQL, designed for the cloud.
DevOps

Amazon Web Services (AWS)

A cloud platform offering a wide range of services like computing power, storage, and databases, enabling scalable, flexible solutions.
DevOps

Android Deployment

Process of distributing and installing Android applications on devices or making them available through app stores.
DevOps

Android Emulator

Software tool that simulates Android devices on a computer for testing and development purposes.
DevOps

Android Studio

Official integrated development environment (IDE) for Android app development, offering a comprehensive set of tools and features.
DevOps

Anomaly Detection

Process of identifying unusual patterns or behaviors that deviate from expected norms in data or system behavior.
DevOps

Ansible

Open-source automation tool for configuration management, application deployment, and task automation.
DevOps

Antifragile

Quality of systems that gain strength from disorder or stress, becoming more resilient in the face of challenges.
DevOps

Apache

Popular open-source web server software that can run on various platforms, known for its reliability and extensive feature set.
DevOps

App Store Connect

Apple's platform for managing apps, viewing analytics, and submitting to the App Store.
DevOps

AppDynamics

Application performance management and IT operations analytics platform for monitoring and optimizing application performance.
DevOps

Application Containerization

Packaging software code and dependencies into lightweight, portable containers for consistent deployment across environments.
DevOps

Application Firewall

Security system that monitors, filters, and blocks HTTP/HTTPS traffic to and from web applications.
DevOps

Application Infrastructure

The hardware, software, and networking components required to run and support an application.
DevOps

Application Lifecycle Management

Process of managing an application from ideation through retirement, including development, testing, and maintenance.
DevOps

Application Migration

Process of moving an application from one environment to another, often involving cloud or platform transitions.
DevOps

Application Performance Monitoring (APM)

Tools and practices for monitoring and managing the performance and availability of software applications.
DevOps

Application Platform

Software framework that provides a foundation for developing and running applications, often including runtime services and APIs.
DevOps

Application Program Interface (API)

Set of protocols, routines, and tools for building software applications and enabling communication between different software systems.
DevOps

Application Release Automation (ARA)

Process of packaging and deploying applications automatically across various environments and platforms.
DevOps

Application Security

Measures taken to improve the security of an application by finding, fixing, and preventing vulnerabilities.
DevOps

Application Team

Group responsible for developing, maintaining, and improving a specific application or set of applications.
DevOps

Application Whitelisting

Security practice that specifies which applications are permitted to run on a system, blocking all others.
DevOps

Application Workflow

Sequence of tasks or processes within an application, often automated to improve efficiency and consistency.
DevOps

Aptly

Debian repository management tool that makes it easy to mirror existing repositories and create new ones.
DevOps

Artifact

Any file or object produced during the software development process, such as compiled code, documentation, or test results.
DevOps

Artifactory

Repository manager for storing and managing software packages, artifacts, and dependencies.
DevOps

Artifacts

Byproducts of software development, including executables, libraries, documentation, and other files created during the process.
DevOps

Artificial Intelligence (AI)

Computer systems capable of performing tasks that typically require human intelligence, such as learning and problem-solving.
DevOps

Asgard

Open-source web-based tool for cloud management and application deployment, primarily used with Amazon Web Services.
DevOps

Asterisk

Open-source framework for building communications applications, particularly used for creating custom telephone systems.
DevOps

Atom

Open-source text and source code editor developed by GitHub, known for its customizability.
DevOps

Attack Surface

Total sum of vulnerabilities in a given system that are accessible to an attacker.
DevOps

Attack Vector

Method or pathway used by a malicious actor to gain unauthorized access to a computer or network.
DevOps

Audit Log

Chronological record of system activities, providing a trail for tracking user actions and system events.
DevOps

Auditd

Linux daemon that monitors and logs system activities to detect security violations.
DevOps

Authentication Factor

Piece of information or process used to verify a user's identity, such as passwords, biometrics, or security tokens.
DevOps

Automated Builds

Process of compiling source code into executable software without manual intervention, often part of CI/CD pipelines.
DevOps

Automation

Use of technology to perform tasks with minimal human intervention, improving efficiency and reducing errors.
DevOps

Autonomy

Degree of independence and self-governance given to teams or systems in making decisions and performing tasks.
DevOps

Awsbox

Tool for deploying node.js apps to Amazon Web Services, simplifying the process of setting up and managing instances.
DevOps

Azure

Microsoft's cloud computing platform providing a wide range of services for building, testing, deploying, and managing applications.
DevOps

Back-end

Server-side of a website or application, responsible for data storage, security, and business logic.
DevOps

Backup

Copy of data created to protect against loss or damage, often stored separately from the original for recovery purposes.
DevOps

Bad/Threat Actor

Individual or entity that attempts to exploit vulnerabilities in systems or networks for malicious purposes.
DevOps

Baklava code

Term describing code that has too many layers, making it overly complex and difficult to understand or maintain.
DevOps

Bamboo

Continuous integration and deployment server by Atlassian, automating the building, testing, and deployment of software.
DevOps

Bare-metal

Physical computer server dedicated to a single tenant, not virtualized or shared among multiple users.
DevOps

Barkeep

Open-source web-based code review system that facilitates collaborative code reviews and discussions.
DevOps

Bash

Unix shell and command language, widely used for scripting and automating tasks in Unix-like operating systems.
DevOps

Bastion host

Specially designed system on a network specifically intended to withstand attacks, usually placed at the edge of a network.
DevOps

Bazel

Open-source build and test tool that enables fast, reproducible builds across multiple platforms and languages.
DevOps

Beats

Lightweight data shippers for various types of data, part of the Elastic Stack for log and metrics collection.
DevOps

Behavior-Driven Development (BDD)

Software development approach that focuses on defining the behavior of an application based on user stories.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

Data Governance

Policies and processes for ensuring data quality, security, and compliance in cloud environments.

Data Integration as a Service

Cloud-based tools for combining data from various sources into a unified view, enabling comprehensive data analysis.

Data Lake

Centralized repository storing structured and unstructured data at scale in its native format.

Data Lake (e.g., AWS Lake Formation, Azure Data Lake)

Large-scale storage repository for raw data in various formats in cloud environments.

Data Lake Houses

Hybrid architecture combining data lake storage with data warehouse query capabilities in cloud environments.

Data Lineage

Tracking the origin, movement, and transformations of data throughout its lifecycle in cloud systems.

Data Lineage and Provenance Tracking

Monitoring data origins, transformations, and usage across cloud environments for compliance and analysis.

Data Mart

Subset of a data warehouse focused on specific business functions or departments in cloud environments.

Data Masking and Anonymization

Techniques to protect sensitive information by obscuring or replacing identifiable data in cloud storage.

Data Mesh Architecture

Decentralized approach to data management, treating data as a product owned by domain teams in cloud environments.

Data Mesh Platforms

Tools supporting implementation of data mesh principles in cloud-based data architectures.

Data Migration

Process of transferring data between storage types, formats, or systems in cloud environments.

Data Pipeline (e.g., AWS Data Pipeline, Azure Data Factory)

Automated process for extracting, transforming, and loading data between cloud systems or services.

Data Protection Impact Assessment (DPIA)

Systematic analysis of how data processing activities affect privacy in cloud environments.

Data Quality as a Service

Cloud-based tools for assessing, improving, and maintaining the quality of data assets.

Data Residency

Specifying the physical location where cloud-stored data resides for compliance with regulations.

Data Rights Management

Controls for protecting intellectual property and sensitive information in cloud-based data sharing.

Data Science Marketplaces

Platforms for sharing and monetizing data science models and algorithms in the cloud.

Data Science Version Control

Tools for tracking changes and collaborating on data science projects in cloud environments.

Data Skew Handling in Distributed Systems

Techniques for managing uneven data distribution in cloud-based parallel processing.

Data Sovereignty

Concept that data is subject to the laws of the country in which it is stored in cloud environments.

Data Tokenization Services

Cloud-based tools for replacing sensitive data with non-sensitive equivalents for security purposes.

Data Versioning and Time Travel

Capability to access and restore previous versions of data in cloud storage systems.

Data Virtualization

Technology that provides a unified view of data from multiple cloud and on-premises sources without moving it.

Data Visualization

Tools and techniques for creating visual representations of data stored in cloud environments.

Data Warehouse (e.g., Amazon Redshift, Azure Synapse Analytics)

Centralized repository optimized for analytics and business intelligence in cloud environments.

Data Warehousing

Process of collecting, storing, and managing data from varied sources in a central cloud repository for analysis.

Database Auditing

Monitoring and recording database activities in cloud environments for security and compliance purposes.

Database Backup and Restore

Process of creating copies of databases and recovering them in cloud environments for data protection.

Database Caching

Technique to store frequently accessed data in memory for faster retrieval in cloud databases.

Database Encryption

Process of encoding data to protect sensitive information in cloud-based databases.

Database Failover

Automatic switching to a redundant database when the primary system fails in cloud environments.

Database High Availability

Techniques ensuring continuous database operation in cloud environments, minimizing downtime.

Database Migration

Process of moving databases from on-premises or other cloud environments to a target cloud platform.

Database Migration Service

Managed service for migrating databases to cloud platforms with minimal downtime.

Database Performance Tuning

Optimizing database operations for improved speed and efficiency in cloud environments.

Database Proxy

Intermediary service managing connections between applications and cloud databases for improved security and performance.

Database Scaling (Vertical and Horizontal)

Adjusting database resources vertically (more powerful hardware) or horizontally (more instances) in cloud environments.

Database Sharding

Distributing data across multiple database instances for improved performance and scalability in the cloud.

Database Version Upgrades

Process of updating database software to newer versions in cloud environments, improving performance and security.

Database as a Service (DBaaS)

Managed cloud service providing database functionality without the need for infrastructure management.

Dead Letter Queues

Storage for messages that can't be processed successfully in cloud-based message queuing systems.

Decentralized Cloud (Web3)

Distributed cloud computing model leveraging blockchain technology for increased security and user control.

Decentralized Cloud Resource Markets

Blockchain-based platforms for trading compute resources across distributed cloud networks.

Decentralized Identity

Self-sovereign identity management using blockchain technology in cloud environments.

Decentralized Identity Management

Systems for user authentication and authorization using blockchain in cloud environments.

Decentralized Storage

Distributed file storage systems using peer-to-peer networks in cloud computing environments.

Deception Technology in the Cloud

Security approach using decoys to detect, deceive, and deflect attackers in cloud environments.

Deep Learning

Subset of machine learning using neural networks with multiple layers for complex pattern recognition in cloud environments.

Deployment Automation

Tools and practices for automatically releasing and updating applications in cloud environments.

Deployment Manager (Google Cloud)

Service for declaratively managing and deploying cloud resources on Google Cloud Platform.

DevOps Assembly Lines

Automated, end-to-end pipelines for software delivery in cloud environments, streamlining development and deployment processes.

DevOps Culture and Practices

Collaborative approach integrating development and operations teams for efficient cloud-based software delivery.

DevOps Metrics and KPIs

Measurements for assessing the performance and efficiency of DevOps processes in cloud environments.

DevSecOps Automation

Integration of security practices into DevOps processes using automated tools in cloud environments.

DevSecOps Automation Platforms

Integrated tools for implementing security throughout the DevOps lifecycle in cloud environments.

Device Management

Tools and practices for configuring, monitoring, and securing IoT devices connected to cloud platforms.

Device Provisioning

Process of setting up and configuring IoT devices for secure connection to cloud platforms.

Differential Privacy as a Service

Cloud-based tools for adding noise to data to protect individual privacy while maintaining overall accuracy.

Digital Experience Monitoring (DEM)

Tools for tracking and optimizing user interactions with cloud-based applications and services.

Digital Twin Technology

Virtual representations of physical objects or systems, often leveraging cloud resources for simulation and analysis.

Digital Twins

Virtual models of physical assets or processes, often using cloud computing for data processing and simulation.

Digital Twins in the Cloud

Cloud-based virtual representations of physical entities for monitoring, simulation, and optimization.

Direct Connect

Dedicated network connection between on-premises infrastructure and cloud service providers.

Disaggregated Server Architectures

Cloud infrastructure designs separating compute, storage, and networking for flexible resource allocation.

Disaggregated Storage

Cloud storage architecture separating storage management functions from physical storage devices.

Disaster Recovery

Strategies and tools for recovering data and systems after a catastrophic event in cloud environments.

Distributed AI Training

Process of training machine learning models across multiple cloud nodes for improved speed and efficiency.

Distributed Cloud

Cloud services distributed across multiple physical locations but managed centrally.

Distributed Constraint Optimization

Techniques for solving complex problems across multiple cloud nodes while satisfying various constraints.

Distributed Data Science Workflows

Cloud-based systems for running data analysis and machine learning tasks across multiple nodes.

Distributed Deception Platforms

Cloud-based security systems deploying decoys across multiple points to detect and mislead attackers.

Distributed Edge AI Training

Process of training AI models across multiple edge devices and cloud resources, enabling decentralized learning at scale.

Distributed Hyperparameter Optimization

Technique for tuning machine learning models across multiple cloud nodes for improved performance.

Distributed Ledger Orchestration

Managing and coordinating blockchain networks across multiple cloud environments.

Distributed Tracing for Microservices

Tracking and analyzing requests as they flow through cloud-based microservices architectures.

Domain-Specific Languages (DSLs) for Cloud

Specialized programming languages designed for efficient cloud resource management and deployment.

Drift Detection

Monitoring and identifying unauthorized or unintended changes in cloud infrastructure configurations.

Durable Functions (Azure)

Extension of Azure Functions that enables stateful operations in serverless compute environments.

Dynamic Access Control

Adaptive security measures that adjust permissions based on context in cloud environments.

E-Waste Management for Cloud Infrastructure

Responsible disposal and recycling of outdated or decommissioned cloud hardware.

E-Waste Management in Cloud Computing

Strategies for sustainably disposing of and recycling obsolete cloud computing hardware.

ETL (Extract, Transform, Load)

Process of moving data from source systems into a data warehouse in cloud environments.

Eco-Friendly Cloud Migration Strategies

Approaches to moving to the cloud that minimize environmental impact and energy consumption.

Edge AI

Artificial intelligence algorithms running on devices at the network edge, often integrated with cloud backends.

Edge AI Model Compression Techniques

Methods for reducing the size of AI models to run efficiently on edge devices with cloud support.

Edge AI Model Versioning

Managing and updating AI model versions across distributed edge devices and cloud systems.

Edge AI Security

Measures to protect AI models and data on edge devices connected to cloud networks.

Edge AI/ML

Artificial intelligence and machine learning capabilities deployed on edge devices, often with cloud integration.

Edge Analytics

Processing and analyzing data near its source on edge devices before sending insights to the cloud.

Edge Analytics Frameworks

Software platforms for developing and deploying analytics applications on edge devices with cloud connectivity.

Edge Anomaly Detection

Identifying unusual patterns or behaviors in data at the network edge before sending alerts to the cloud.

Edge Caching

Storing frequently accessed data on edge devices or servers to reduce latency and cloud bandwidth usage.

Edge Compute Networking

Network architectures optimized for connecting edge computing devices to cloud resources.

Edge Computer Vision

Processing and analyzing visual data on edge devices before sending results to the cloud.

Edge Content Delivery

Distributing and caching content on edge servers to reduce latency and cloud bandwidth consumption.

Edge Databases

Database systems designed to run on edge devices with intermittent connectivity to cloud backends.

Edge Generative AI

Creating AI-generated content on edge devices with potential cloud-based model updates and synchronization.

Edge Inference Optimization

Techniques to improve AI model performance on edge devices, reducing latency and cloud dependence.

Edge Locations

Distributed sites hosting cloud services closer to end-users for reduced latency and improved performance.

Vertical Pod Autoscaler with Custom Metrics

Extended VPA functionality allowing scaling decisions based on application-specific metrics.

VerticalPodAutoscaler

Kubernetes resource defining the behavior for automatically adjusting pod resource requests and limits.

Virtual Clusters

Isolated environments within a physical Kubernetes cluster, providing multi-tenancy and resource isolation.

Virtual IP (VIP)

Single IP address representing a service, used for load balancing in container networking.

Virtual Kubelet

Kubernetes kubelet implementation that masquerades as a node and schedules pods on non-Kubernetes platforms.

Volume Access Modes (ReadWriteOnce, ReadOnlyMany, ReadWriteMany)

Kubernetes volume properties (ReadWriteOnce, ReadOnlyMany, ReadWriteMany) defining how a volume can be mounted.

Volume Cloning

Process of creating a new volume populated with the contents of an existing volume in Kubernetes.

Volume Expansion

Feature allowing the size of a persistent volume to be increased without recreating the volume.

Volume Health Monitoring

Kubernetes feature for detecting and reporting issues with persistent volumes to ensure data integrity.

Volume Modes (Block, Filesystem)

Kubernetes volume properties (Block, Filesystem) defining how the storage is presented to the container.

Volume Mounting

Process of making a storage volume accessible within a container's filesystem, enabling data persistence.

Volume Mounts

Specifications in Kubernetes pod definitions declaring how volumes should be mounted into containers.

Volume Plugins

Kubernetes components enabling integration with various storage systems for persistent storage.

Volume Snapshots

Point-in-time copies of volumes in Kubernetes, used for backup, restoration, or cloning of persistent data.

Vulnerability Scanning Integration

Incorporation of security scanning tools into the container build and deployment pipeline.

Weave GitOps

Set of tools for implementing GitOps workflows in Kubernetes environments, automating deployment and management.

Weave Net

Software-defined networking solution for containerized applications, providing a virtual network across hosts.

Weave Net for Multi-host Docker Networking

Use of Weave Net to create a virtual network connecting Docker containers across multiple hosts.

WebAssembly (Wasm) in Containers

Use of WebAssembly runtimes in containers for portable, secure, and high-performance applications.

WebAssembly in Service Mesh

Integration of WebAssembly modules in service mesh proxies for customizable traffic management.

Webhook Admission Controllers

External services invoked during the Kubernetes admission process to validate or mutate API requests.

Webhook Authorization

Kubernetes authorization mode delegating access decisions to an external REST service, enabling custom auth logic.

Webhook Token Authentication

Kubernetes authentication method verifying bearer tokens against an external webhook service.

Whereabouts for IP Address Management

CNI IPAM plugin for dynamically allocating IP addresses across multiple nodes in Kubernetes.

Wireguard for Container Networks

Use of the Wireguard VPN protocol to secure container-to-container communication across hosts.

X.509 Client Certs

Digital certificates used for authenticating clients in Kubernetes API server communications.

XDP (eXpress Data Path)

Linux kernel technology for high-performance packet processing, useful in container networking scenarios.

cAdvisor

Container advisor that collects, aggregates, and exports resource usage and performance data from running containers.

cgroups v2

Second version of control groups, offering a unified hierarchy and improved resource management for containers.

containerd

Industry-standard container runtime used by many container and orchestration platforms, providing core container operations.

containerd Internals

Core components and architecture of the containerd container runtime, including its image management and execution features.

containerd Shim

Intermediary process between containerd and runc, managing container lifecycle and I/O, enhancing isolation.

eBPF for Container Networking

Use of extended Berkeley Packet Filter for advanced container networking capabilities, enhancing performance and security.

eBPF for Container Observability

Use of extended Berkeley Packet Filter for deep insights into container behavior and performance.

eBPF in Service Mesh

Integration of eBPF technology in service mesh implementations for improved performance and observability.

eBPF-based Monitoring

Use of eBPF for efficient and detailed monitoring of containerized applications and infrastructure.

etcd Encryption

Feature ensuring at-rest encryption of data stored in etcd, Kubernetes' distributed key-value store.

etcd Performance Tuning

Optimization techniques for improving etcd performance in large-scale container orchestration.

etcd Snapshots

Point-in-time copies of etcd's state, used for backup and recovery in Kubernetes clusters.

etcd Upgrade

Process of updating the etcd cluster to a newer version in a Kubernetes environment, ensuring cluster data store reliability.

gRPC Protocol

High-performance, open-source RPC framework used for efficient communication between containerized microservices.

gRPC in Microservices

Use of gRPC, a high-performance RPC framework, for communication between containerized microservices.

gVisor

Container runtime sandbox that provides an additional layer of isolation between containerized applications and the host kernel.

gVisor for Container Isolation

Use of gVisor to enhance security in multi-tenant container environments by isolating containers from the host kernel.

in-toto for Supply Chain Integrity

Framework for securing software supply chains, applicable to container image build and distribution processes.

kube-hunter for Penetration Testing

Open-source tool for discovering security weaknesses in Kubernetes clusters through simulated attacks.

kube-proxy

Kubernetes network proxy maintaining network rules on nodes, implementing part of the Kubernetes Service concept.

kube-proxy Modes (iptables, IPVS)

Different implementations of kube-proxy for managing service networking, each with unique performance characteristics.

kube-scheduler

Kubernetes component responsible for assigning newly created pods to nodes based on resource requirements and constraints.

kubelet

Primary node agent running on each node in a Kubernetes cluster, ensuring containers are running in a pod as expected.

lxc

Linux Containers, a userspace interface for the Linux kernel containment features, providing operating system-level virtualization.

rkt

Container runtime focusing on security and composability, offering an alternative to Docker (now deprecated).