Engineering Glossary

From fundamental principles to cutting-edge practices, this glossary covers the full spectrum of software engineering terminology.

DevOps
Cloud Computing
Git
Containerization & Orchestration

"As code"

Defining and managing infrastructure, configurations, or processes using code, enabling version control, automation, and reproducibility.
DevOps

"Nines"

Measure of system availability, expressed as a percentage. E.g., "five nines" means 99.999% uptime, allowing for minimal downtime.
DevOps

"Single Pane of Glass"

Unified display or interface that integrates data from multiple sources, providing a comprehensive view of system status or operations.
DevOps

A/B Testing

Comparing two versions of a webpage or app to determine which performs better, based on user interaction and conversion rates.
DevOps

AIOps (Artificial Intelligence Operations)

Using AI and machine learning to enhance IT operations, automating tasks and providing insights for better decision-making.
DevOps

ALB (Application Load Balancing)

Distributes incoming application traffic across multiple targets to improve availability and fault tolerance.
DevOps

API

Application Programming Interface; set of protocols and tools for building software applications and enabling communication between systems.
DevOps

API Discovery

Process of identifying and documenting available APIs within an organization or from external sources.
DevOps

API Endpoint

Specific URL where an API can be accessed and where requests are sent to interact with a server or service.
DevOps

API Gateway

Manages, secures, and routes API requests, acting as a single entry point for multiple microservices or backend systems.
DevOps

API Management

Process of creating, publishing, documenting, and analyzing APIs in a secure environment.
DevOps

API Monitoring

Tracking API performance, availability, and usage to ensure optimal functionality and identify issues.
DevOps

API Response Time

The duration between sending a request to an API and receiving the response, crucial for performance evaluation.
DevOps

API Security

Measures and practices to protect APIs from unauthorized access, attacks, and data breaches.
DevOps

API Versioning

Managing different versions of an API to maintain compatibility while allowing updates and improvements.
DevOps

ASG (Auto Scaling Group)

Feature in cloud computing that automatically adjusts the number of instances based on defined conditions.
DevOps

ASP.Net Core Monitoring

Observing and analyzing the performance and behavior of applications built with ASP.Net Core framework.
DevOps

ATO (Account Takeover)

Type of identity theft where an attacker gains unauthorized access to a user's account.
DevOps

AWS (Amazon Web Services)

Cloud computing platform offering a wide range of services for computing, storage, networking, and more.
DevOps

AWS App Development Tools

Suite of tools provided by AWS for building, testing, and deploying applications on their cloud platform.
DevOps

AWS CLI

Command-line interface for interacting with AWS services, allowing users to manage resources and automate tasks.
DevOps

AWS CloudWatch

Monitoring and observability service for AWS resources and applications, providing metrics, logs, and alarms.
DevOps

AWS CodeDeploy

Fully managed deployment service that automates software deployments to various compute services.
DevOps

AWS CodePipeline

Continuous delivery service for fast and reliable application and infrastructure updates.
DevOps

AWS EC2

Elastic Compute Cloud; scalable computing capacity in the AWS cloud for running virtual servers.
DevOps

AWS ELB

Elastic Load Balancing; automatically distributes incoming application traffic across multiple targets.
DevOps

AWS Lambda

Serverless compute service that runs code in response to events and automatically manages the underlying resources.
DevOps

AWS Managed Services

Ongoing management of AWS infrastructure, allowing customers to focus on their applications and business.
DevOps

AWS Monitoring

Process of tracking and analyzing the performance, health, and usage of AWS resources and applications.
DevOps

AWS RDS

Relational Database Service; managed service for setting up, operating, and scaling relational databases in the cloud.
DevOps

AWS RDS Postgres Monitoring

Tracking and analyzing the performance and health of PostgreSQL databases running on AWS RDS.
DevOps

AWS S3

Simple Storage Service; object storage service offering industry-leading scalability, data availability, and performance.
DevOps

AWS S3 Cost Optimization

Strategies and practices to reduce costs associated with storing and accessing data in AWS S3.
DevOps

AWS Security

Set of tools, services, and best practices for protecting data, applications, and infrastructure in the AWS cloud.
DevOps

Acceptance Test-Driven Development (ATDD)

Software development approach where acceptance tests are written before the code, guiding implementation.
DevOps

Active Directory

Microsoft's directory service for Windows domain networks, managing users, computers, groups, and other objects.
DevOps

Advanced Rate Limiting

Technique to control the rate of incoming requests to an API or service, preventing overload and ensuring fair usage.
DevOps

Agent

Software component that performs automated tasks, often used in monitoring, data collection, or system management.
DevOps

Agile

Iterative approach to software development emphasizing flexibility, collaboration, and rapid delivery of working software.
DevOps

Agile Manifesto

Document outlining values and principles of Agile software development, prioritizing individuals, working software, and adaptability.
DevOps

Agile Methodology

Set of practices based on Agile principles, focusing on iterative development, team collaboration, and customer feedback.
DevOps

Agile Organization

Company structure that emphasizes adaptability, quick response to change, and continuous improvement.
DevOps

Agile Project Management

Applying Agile principles to project management, focusing on iterative planning, frequent delivery, and team empowerment.
DevOps

Agile Software Development

Iterative approach to building software, emphasizing flexibility, collaboration, and rapid delivery of working features.
DevOps

Ajax Requests

Technique for creating fast, dynamic web pages by exchanging small amounts of data with the server behind the scenes.
DevOps

Alerting

System for notifying relevant personnel about critical events or issues in IT infrastructure or applications.
DevOps

Amazon Aurora

Fully managed relational database engine compatible with MySQL and PostgreSQL, designed for the cloud.
DevOps

Amazon Web Services (AWS)

A cloud platform offering a wide range of services like computing power, storage, and databases, enabling scalable, flexible solutions.
DevOps

Android Deployment

Process of distributing and installing Android applications on devices or making them available through app stores.
DevOps

Android Emulator

Software tool that simulates Android devices on a computer for testing and development purposes.
DevOps

Android Studio

Official integrated development environment (IDE) for Android app development, offering a comprehensive set of tools and features.
DevOps

Anomaly Detection

Process of identifying unusual patterns or behaviors that deviate from expected norms in data or system behavior.
DevOps

Ansible

Open-source automation tool for configuration management, application deployment, and task automation.
DevOps

Antifragile

Quality of systems that gain strength from disorder or stress, becoming more resilient in the face of challenges.
DevOps

Apache

Popular open-source web server software that can run on various platforms, known for its reliability and extensive feature set.
DevOps

App Store Connect

Apple's platform for managing apps, viewing analytics, and submitting to the App Store.
DevOps

AppDynamics

Application performance management and IT operations analytics platform for monitoring and optimizing application performance.
DevOps

Application Containerization

Packaging software code and dependencies into lightweight, portable containers for consistent deployment across environments.
DevOps

Application Firewall

Security system that monitors, filters, and blocks HTTP/HTTPS traffic to and from web applications.
DevOps

Application Infrastructure

The hardware, software, and networking components required to run and support an application.
DevOps

Application Lifecycle Management

Process of managing an application from ideation through retirement, including development, testing, and maintenance.
DevOps

Application Migration

Process of moving an application from one environment to another, often involving cloud or platform transitions.
DevOps

Application Performance Monitoring (APM)

Tools and practices for monitoring and managing the performance and availability of software applications.
DevOps

Application Platform

Software framework that provides a foundation for developing and running applications, often including runtime services and APIs.
DevOps

Application Program Interface (API)

Set of protocols, routines, and tools for building software applications and enabling communication between different software systems.
DevOps

Application Release Automation (ARA)

Process of packaging and deploying applications automatically across various environments and platforms.
DevOps

Application Security

Measures taken to improve the security of an application by finding, fixing, and preventing vulnerabilities.
DevOps

Application Team

Group responsible for developing, maintaining, and improving a specific application or set of applications.
DevOps

Application Whitelisting

Security practice that specifies which applications are permitted to run on a system, blocking all others.
DevOps

Application Workflow

Sequence of tasks or processes within an application, often automated to improve efficiency and consistency.
DevOps

Aptly

Debian repository management tool that makes it easy to mirror existing repositories and create new ones.
DevOps

Artifact

Any file or object produced during the software development process, such as compiled code, documentation, or test results.
DevOps

Artifactory

Repository manager for storing and managing software packages, artifacts, and dependencies.
DevOps

Artifacts

Byproducts of software development, including executables, libraries, documentation, and other files created during the process.
DevOps

Artificial Intelligence (AI)

Computer systems capable of performing tasks that typically require human intelligence, such as learning and problem-solving.
DevOps

Asgard

Open-source web-based tool for cloud management and application deployment, primarily used with Amazon Web Services.
DevOps

Asterisk

Open-source framework for building communications applications, particularly used for creating custom telephone systems.
DevOps

Atom

Open-source text and source code editor developed by GitHub, known for its customizability.
DevOps

Attack Surface

Total sum of vulnerabilities in a given system that are accessible to an attacker.
DevOps

Attack Vector

Method or pathway used by a malicious actor to gain unauthorized access to a computer or network.
DevOps

Audit Log

Chronological record of system activities, providing a trail for tracking user actions and system events.
DevOps

Auditd

Linux daemon that monitors and logs system activities to detect security violations.
DevOps

Authentication Factor

Piece of information or process used to verify a user's identity, such as passwords, biometrics, or security tokens.
DevOps

Automated Builds

Process of compiling source code into executable software without manual intervention, often part of CI/CD pipelines.
DevOps

Automation

Use of technology to perform tasks with minimal human intervention, improving efficiency and reducing errors.
DevOps

Autonomy

Degree of independence and self-governance given to teams or systems in making decisions and performing tasks.
DevOps

Awsbox

Tool for deploying node.js apps to Amazon Web Services, simplifying the process of setting up and managing instances.
DevOps

Azure

Microsoft's cloud computing platform providing a wide range of services for building, testing, deploying, and managing applications.
DevOps

Back-end

Server-side of a website or application, responsible for data storage, security, and business logic.
DevOps

Backup

Copy of data created to protect against loss or damage, often stored separately from the original for recovery purposes.
DevOps

Bad/Threat Actor

Individual or entity that attempts to exploit vulnerabilities in systems or networks for malicious purposes.
DevOps

Baklava code

Term describing code that has too many layers, making it overly complex and difficult to understand or maintain.
DevOps

Bamboo

Continuous integration and deployment server by Atlassian, automating the building, testing, and deployment of software.
DevOps

Bare-metal

Physical computer server dedicated to a single tenant, not virtualized or shared among multiple users.
DevOps

Barkeep

Open-source web-based code review system that facilitates collaborative code reviews and discussions.
DevOps

Bash

Unix shell and command language, widely used for scripting and automating tasks in Unix-like operating systems.
DevOps

Bastion host

Specially designed system on a network specifically intended to withstand attacks, usually placed at the edge of a network.
DevOps

Bazel

Open-source build and test tool that enables fast, reproducible builds across multiple platforms and languages.
DevOps

Beats

Lightweight data shippers for various types of data, part of the Elastic Stack for log and metrics collection.
DevOps

Behavior-Driven Development (BDD)

Software development approach that focuses on defining the behavior of an application based on user stories.
DevOps
stash entry

stash entry

A single set of stashed changes in Git, which can be reapplied later to the working directory.
status checks

status checks

Automated tests or processes that run when changes are proposed in a Git repository, ensuring code quality and compatibility.
subscription

subscription

Notifications or updates a user receives about activity in Git repositories they're interested in or contributing to.
superproject

superproject

The main Git repository that contains submodules, managing references to specific versions of nested repositories.
symref

symref

A symbolic reference in Git that points to another reference, most commonly used for HEAD pointing to the current branch.
tag object

tag object

A Git object containing metadata about a tag, including the tagger, date, and optional message.
team

team

A group of users on a Git platform with shared access permissions to repositories within an organization.
team maintainer

team maintainer

A user with administrative privileges for managing a team's membership and access rights in a Git organization.
timeline

timeline

A chronological display of events and activities in a Git repository or user profile on hosting platforms.
topic branch

topic branch

A short-lived Git branch created to develop a specific feature or fix a particular issue.
topics

topics

Keywords or categories assigned to Git repositories to help users discover related projects on hosting platforms.
traffic graph

traffic graph

A visual representation of visitor activity and clone statistics for a Git repository on hosting platforms.
transfer

transfer

The process of moving Git objects between repositories during push, fetch, or clone operations.
tree

tree

A Git object representing a directory structure, containing references to blobs (files) and other trees (subdirectories).
tree object

tree object

A Git object that stores the hierarchy of files and directories in a repository at a specific point in time.
tree-ish (also treeish)

tree-ish (also treeish)

A Git term referring to an object that resolves to a tree, such as a commit, tag, or tree.
unborn

unborn

A state of a Git branch that has no commits yet, typically seen when initializing a new repository.
unmerged index

unmerged index

The state of the Git index containing conflicting changes from different branches during a merge operation.
unreachable object

unreachable object

A Git object not accessible from any reference, potentially subject to garbage collection if not recovered.
upstream branch

upstream branch

The remote branch that a local branch is set to track, used as a reference for pull and push operations.
user

user

An individual account on a Git platform, associated with personal repositories and contributions.
user-to-server request

user-to-server request

An authenticated request from a Git client to a server, typically for operations like push or fetch.
username

username

The unique identifier for a user account on Git platforms, used for authentication and mention notifications.
visible team

visible team

A team in a Git organization that is visible to all members of the organization, as opposed to secret teams.
watch

watch

A feature allowing users to receive notifications about activity in Git repositories they're interested in.
watching notifications

watching notifications

Alerts received for all notable events in a watched Git repository, including issues, pull requests, and releases.
web notifications

web notifications

Alerts displayed on Git platforms' web interfaces, notifying users of relevant activity or mentions.
working area

working area

The directory on your local machine where you modify files before staging and committing them in Git.
working tree

working tree

The set of files and directories in your project that are currently checked out and available for editing.
worktree

worktree

A Git feature allowing multiple working directories to be associated with a single repository.
write access

write access

Permission to make changes to a Git repository, including pushing commits and modifying branches.

3D Stacked Memory for Cloud Servers

High-density memory architecture using vertically stacked chips, enhancing performance and capacity in cloud server hardware.

5G Cloud

Cloud infrastructure optimized for 5G networks, supporting high-speed, low-latency services and applications.

5G Network Slicing

Technique to create multiple virtual networks on a shared physical 5G infrastructure, each optimized for specific use cases.

5G and Edge Computing

Integration of 5G networks with edge computing to enable low-latency, high-bandwidth applications closer to end-users.

6G Cloud Integration

Future convergence of 6G networks with cloud computing, promising ultra-high speeds and advanced capabilities.

ACID Compliance

Database transaction properties (Atomicity, Consistency, Isolation, Durability) ensuring data integrity in cloud environments.

AI Ethics Compliance Tools

Software ensuring AI systems adhere to ethical guidelines and regulations in cloud deployments.

AI Ethics and Bias Detection Tools

Software for identifying and mitigating ethical issues and biases in AI models deployed in cloud environments.

AI Ethics and Governance Tools

Solutions for managing ethical considerations and regulatory compliance in cloud-based AI systems.

AI Governance Frameworks

Structured approaches for managing AI development, deployment, and use in cloud environments.

AI Model Governance Platforms

Comprehensive solutions for managing, monitoring, and controlling AI models in cloud-based systems.

AI Model Interpretability Services

Cloud-based tools for explaining and understanding the decision-making processes of AI models.

AI Model Interpretability Tools

Software for analyzing and explaining AI model decisions, crucial for transparency in cloud AI services.

AI Model Marketplaces

Cloud platforms for discovering, sharing, and monetizing pre-trained AI models and algorithms.

AI Model Monitoring and Drift Detection

Tools for tracking AI model performance and identifying deviations from expected behavior in cloud environments.

AI Model Versioning and Governance

Systems for managing different versions of AI models and enforcing governance policies in cloud deployments.

AI-Assisted Coding Platforms

Cloud-based development environments that use AI to assist programmers in writing and optimizing code.

AI-Augmented Analytics

Integration of AI capabilities into data analytics processes in cloud environments for enhanced insights.

AI-Driven Capacity Planning

Use of AI algorithms to predict and optimize resource allocation in cloud infrastructures.

AI-Driven Cloud Optimization

Application of AI techniques to improve efficiency, performance, and cost-effectiveness of cloud resources.

AI-Driven Cloud Resource Allocation

Automated distribution of cloud resources using AI to optimize performance and cost-efficiency.

AI-Driven Cloud Service Composition

AI-based automation of cloud service selection and integration for complex workflows.

AI-Driven Code Generation

Automated creation of source code using AI models, often integrated into cloud development platforms.

AI-Driven Data Classification

Automated categorization and labeling of data using AI algorithms in cloud storage and processing systems.

AI-Driven Network Optimization

Use of AI to improve network performance, efficiency, and security in cloud environments.

AI-Driven Resource Allocation

Intelligent distribution of computing resources in cloud environments using AI algorithms.

AI-Driven Security Information and Event Management (SIEM)

Enhanced SIEM systems using AI for improved threat detection and response in cloud environments.

AI-Driven Threat Detection

Use of AI algorithms to identify and analyze potential security threats in cloud systems.

AI-Driven Threat Hunting

Proactive search for hidden threats in cloud environments using AI-powered analytics and automation.

AI-Optimized Cloud Hardware

Cloud infrastructure components designed or configured to enhance AI workload performance.

AI-Optimized Databases

Database systems tailored for AI workloads, often featuring in-memory processing and distributed architectures.

AI-Powered Anomaly Detection

Use of AI algorithms to identify unusual patterns or behaviors in cloud systems and data.

AI-Powered Integration

Intelligent automation of data and application integration processes in cloud environments using AI.

AI-as-a-Service

Cloud-based offering of AI capabilities, allowing businesses to leverage AI without extensive in-house expertise.

AI-as-a-Service (AIaaS)

Cloud-based AI capabilities offered as a service, enabling easy integration of AI into applications.

AIOps

Application of AI for automating and enhancing IT operations management in cloud environments.

AIOps Platforms

Integrated solutions leveraging AI for automated monitoring, analysis, and management of cloud IT operations.

AIOps for Predictive Maintenance

Use of AI-driven analytics to forecast and prevent system failures in cloud infrastructure.

API Security Gateway

Service that protects APIs in cloud environments by managing access, monitoring traffic, and preventing attacks.

API Security Gateways

Dedicated services for securing and managing APIs in cloud environments, including access control and threat protection.

API-First Development

Design approach prioritizing API creation before implementation, common in cloud-native application development.

API-Led Connectivity

Integration strategy using purpose-built APIs to connect data, devices, and applications in cloud ecosystems.

AR Cloud

Persistent 3D digital content overlaid on the physical world, accessible via cloud infrastructure for augmented reality applications.

AR/VR Analytics

Cloud-based tools for analyzing user behavior and performance in augmented and virtual reality environments.

AR/VR Collaboration Platforms

Cloud-hosted services enabling multi-user interaction in shared augmented or virtual reality spaces.

AR/VR Content Delivery Network

Specialized CDN optimized for delivering AR/VR content with low latency and high bandwidth.

AR/VR Development Platforms

Cloud-based tools and services for creating, testing, and deploying augmented and virtual reality applications.

ARM Templates (Azure)

JSON-based files defining infrastructure and configuration for Azure resource deployment.

Adaptive User Interfaces for Cloud Services

Dynamic UIs that adjust based on user behavior, device capabilities, and context in cloud applications.

Adversarial Machine Learning Detection

Techniques to identify and mitigate attacks on ML models in cloud-based AI systems.

Alerting and Notification

Systems for informing administrators or users about important events or issues in cloud environments.

Algorithmic Auditing

Process of examining AI algorithms for bias, errors, or unintended consequences in cloud-based systems.

Ambient Computing Interfaces for Cloud

Seamless, context-aware interaction methods for accessing cloud services in IoT environments.

Anomaly Detection Systems

Tools for identifying unusual patterns or behaviors in cloud systems, often using machine learning techniques.

Application-Aware Networking

Network management approach that optimizes performance based on specific application requirements in cloud environments.

Approximate Query Processing

Technique for quickly estimating query results in large-scale cloud databases, trading accuracy for speed.

Archive Storage (e.g., Amazon Glacier, Azure Archive Storage)

Low-cost cloud storage for infrequently accessed data with longer retrieval times, e.g., Amazon Glacier, Azure Archive Storage.

Artifact Repository

Cloud-based storage for software build outputs, dependencies, and related metadata.

Artificial General Intelligence (AGI) as a Service

Hypothetical cloud offering of human-level AI capabilities across various domains.

Artificial General Intelligence Research Platforms

Cloud-based environments for developing and testing advanced AI systems approaching human-level intelligence.

Audit Logging

Systematic recording of actions and events in cloud systems for security and compliance purposes.

Audit Trails

Chronological records of system activities for reconstructing and examining the sequence of events in cloud environments.

Augmented Analytics

Integration of machine learning and natural language processing in cloud-based data analytics workflows.

Augmented Reality (AR) Cloud

Shared, persistent digital content overlaid on the physical world, accessible via cloud infrastructure.

Augmented Reality Cloud Interfaces

Cloud-based systems for managing and delivering AR content and experiences, enabling scalable AR applications.

Augmented Reality Cloud Rendering

Cloud-powered generation of AR graphics and content, offloading processing from end-user devices.

Auto Scaling Groups

Collections of EC2 instances that automatically adjust capacity based on defined conditions.

Auto-scaling

Automatic adjustment of cloud resources to match workload demands, ensuring optimal performance and cost-efficiency.

AutoML

Automated machine learning processes for model selection, hyperparameter tuning, and feature engineering in cloud environments.

AutoML in the Cloud

Cloud-based services automating the machine learning pipeline from data preparation to model deployment and monitoring.

Automated AI Pipeline Optimization

AI-driven tools for improving efficiency and performance of machine learning workflows in the cloud.

Automated Cloud Governance Enforcement

Systems that automatically implement and maintain cloud resource policies and compliance.

Automated Compliance Monitoring

Continuous, AI-driven assessment of cloud systems against regulatory and security standards.

Automated Data Discovery

AI-powered tools for identifying, categorizing, and mapping data assets in cloud environments.

Automated Data Governance

AI-driven systems for managing data quality, security, and compliance in cloud environments.

Automated Data Wrangling Services

Cloud-based tools using AI to clean, transform, and prepare data for analysis, streamlining data preparation processes.

Automated Feature Engineering

AI-powered generation and selection of features for machine learning models in cloud environments.

Automated Incident Response Orchestration

AI-driven coordination of security incident detection and resolution in cloud systems, automating response workflows.

Automated Machine Learning (AutoML)

Cloud services that automate the process of creating and optimizing machine learning models, from data prep to deployment.

Automated Machine Learning (AutoML) Platforms

Cloud-based systems that automate the end-to-end machine learning model development process, including feature engineering and model selection.

Automated Penetration Testing

AI-driven tools for simulating cyberattacks to identify vulnerabilities in cloud systems and applications.

Automated Threat Modeling

AI-powered analysis of cloud architectures to identify potential security risks and attack vectors.

Autonomous Systems in the Cloud

Self-managing, self-healing cloud services requiring minimal human intervention, leveraging AI for operations.

Azure Edge Zones

Ultra-low latency edge computing extensions of Azure for 5G networks, bringing cloud resources closer to users.

Azure Policy

Service for creating, assigning, and managing policies to control Azure resources and ensure compliance.

B2B Integration Platforms

Cloud-based services facilitating data exchange and process integration between business partners.

Backend for Frontend (BFF) Pattern

Architectural approach creating backend services tailored to specific frontend application needs in cloud environments.

Bare Metal Server

Physical server dedicated to a single tenant, offering direct hardware access in cloud environments.

Bare Metal Servers

Dedicated physical servers without virtualization, offered as a cloud service for high-performance workloads.

Batch Processing (e.g., AWS Batch, Azure Batch)

Execution of series of jobs without user interaction, often for large-scale data processing in the cloud (e.g., AWS Batch, Azure Batch).

Big Data Clusters

Distributed computing environments for processing and analyzing massive datasets in the cloud.

Billing Dashboard

Interface for monitoring and managing cloud service usage and costs, providing detailed breakdowns and forecasts.

Biocomputing in the Cloud

Use of cloud resources for computational biology and genomics research, enabling large-scale analysis and modeling.

Biodiversity Impact Assessment for Cloud Facilities

Evaluation of cloud data center effects on local ecosystems and wildlife to ensure sustainable operations.

Block Storage

Cloud storage that provides fixed-size raw storage volumes, typically used for databases or file systems.

Block Storage (e.g., Amazon EBS, Azure Disk Storage)

Cloud services providing persistent block-level storage volumes for use with compute instances.

Blockchain Analytics

Cloud-based tools for analyzing and visualizing blockchain data and transactions, offering insights into network activity.

Blockchain Databases

Distributed databases using blockchain technology for enhanced security and immutability in cloud environments.

Blockchain Governance Tools

Software for managing and enforcing rules, permissions, and consensus mechanisms in blockchain networks deployed on cloud platforms.

Blockchain Integration Services

Cloud-based solutions for connecting blockchain networks with existing enterprise systems and applications.

Pod Anti-Affinity

Kubernetes scheduling constraint that prevents pods from being co-located with other pods based on labels.

Pod Disruption Budget

Kubernetes object that limits the number of pods of a replicated application that can be down simultaneously.

Pod Lifecycle

Stages a pod goes through from creation to termination, including pending, running, succeeded, failed, and unknown phases.

Pod Monitors

Custom resources in Prometheus Operator for declaratively defining how groups of pods should be monitored.

Pod Networking

Mechanisms and configurations for enabling network communication between pods in a Kubernetes cluster.

Pod Overhead

Additional resources consumed by pod infrastructure on top of the container requests and limits.

Pod Phase

High-level summary of where a pod is in its lifecycle, used for pod status reporting and monitoring.

Pod Priority and Preemption

Kubernetes feature allowing importance-based scheduling and eviction of pods when resources are constrained.

Pod Security Context

Kubernetes object defining privilege and access control settings for a pod or container, enhancing security.

Pod Security Policies (PSP)

Deprecated Kubernetes feature for cluster-level control over pod security sensitive aspects.

Pod Security Standards

Kubernetes-defined levels (privileged, baseline, restricted) of security settings for pods.

PodDisruptionBudget

Kubernetes object limiting the number of pods that can be down simultaneously for a given application.

PodSandbox

Isolation boundary for one or more containers in a pod, providing shared kernel namespaces and cgroups.

PodSecurityPolicy

Deprecated cluster-level resource controlling security-sensitive aspects of pod specification.

Podman for Daemonless Containers

Tool for managing containers and images without a container daemon, compatible with Docker CLI.

Polaris for Best Practices Validation

Open-source tool for checking Kubernetes resources against configurable best practices, enhancing reliability.

Polyglot Persistence

Use of multiple data storage technologies in microservices architectures to best fit varying data storage needs.

Port Address Translation (PAT)

Network address translation technique used in container networking for mapping ports, enabling external access.

Port Mapping

Process of forwarding a network port from the host to a container, enabling external access to containerized services.

Portainer for Container Management

Web-based management UI for Docker environments, simplifying container operations and monitoring.

Portworx

Cloud-native storage platform providing persistent storage for containerized applications in multi-cloud environments.

Portworx PX-Store

Software-defined storage solution by Portworx for containerized stateful applications in Kubernetes.

Predicates

Kubernetes scheduling policies that filter out nodes that cannot run a pod, based on resource requirements and constraints.

Preemption

Kubernetes process of evicting lower-priority pods to schedule higher-priority pods when resources are constrained.

PrintColumn

CustomResourceDefinition feature for defining custom columns in kubectl output for custom resources.

Priorities

Kubernetes scheduling policies that rank nodes that have passed the predicate phase, determining the best placement for a pod.

Priority Classes

Kubernetes objects defining the relative importance of pods, used in scheduling and preemption decisions.

Priority and Preemption

Kubernetes feature allowing pods to be assigned different priorities, influencing scheduling and eviction decisions.

Privileged Containers

Containers running with elevated permissions, potentially accessing host resources and devices.

Progressive Delivery

Deployment strategy gradually rolling out changes to a subset of users or servers, monitoring for issues.

Project Calico eBPF Datapath

High-performance networking mode in Calico using extended Berkeley Packet Filter for packet processing.

Projected Volumes

Kubernetes volume type that maps several existing volume sources into the same directory, combining multiple configs.

Prometheus

Open-source systems monitoring and alerting toolkit, widely used for Kubernetes and container monitoring.

Prometheus Alertmanager

Component of Prometheus handling alerts, including silencing, inhibition, aggregation, and notifications.

Prometheus Operator

Kubernetes operator that makes it easy to deploy and manage Prometheus instances, simplifying monitoring setup.

Prometheus Pushgateway

Component allowing ephemeral and batch jobs to expose their metrics to Prometheus, enhancing monitoring coverage.

Prometheus Remote Write

Feature allowing Prometheus to send samples to compatible remote storage systems, enabling long-term storage.

Prometheus Rules

Definitions for recording rules and alerting rules in Prometheus, allowing for complex queries and alert conditions.

Protocol Selection

Process of choosing the appropriate network protocol for container communication based on requirements.

Quality of Service (QoS) Classes

Kubernetes classifications (Guaranteed, Burstable, BestEffort) for pods based on resource requirements and limits.

Qualys Container Security

Platform providing vulnerability management, policy compliance, and runtime defense for containers.

Quay.io

Container registry by Red Hat offering advanced features like vulnerability scanning and fine-grained access controls.

RBAC (Role-Based Access Control)

Kubernetes authorization mechanism for fine-grained control over the actions users can perform.

RBAC Best Practices

Guidelines for implementing secure and manageable role-based access control in Kubernetes environments.

RBAC for Multitenancy

Use of role-based access control to implement isolation and access management in multi-tenant Kubernetes clusters.

RDMA in Container Networks

Integration of Remote Direct Memory Access for high-performance, low-latency container networking.

Rancher for Multi-cluster Management

Platform for managing multiple Kubernetes clusters across different cloud providers and on-premises.

Rate Limiting Pattern

Technique to control the rate of requests or traffic in distributed systems, often implemented in API gateways.

Raw Block Volumes

Kubernetes volume type providing direct access to a block device for applications requiring this capability.

Reactive Systems

Architectural approach emphasizing responsiveness, resilience, elasticity, and message-driven communication in distributed systems.

Read-only Root Filesystem

Security practice of mounting a container's root filesystem as read-only to prevent runtime modifications.

ReadOnly Volumes

Kubernetes volumes mounted with read-only access, enhancing security by preventing modifications.

Registry

Service for storing and distributing container images, crucial for managing and deploying containerized applications.

Registry API

HTTP API provided by container registries for image management, authentication, and metadata retrieval.

Registry Authentication

Process of verifying the identity of clients making requests to containerized services or APIs.

Registry Caching

Technique of locally caching container images to improve pull times and reduce network usage.

Registry Mirroring

Process of replicating container images across multiple registries for improved availability and reduced latency.

Registry Webhooks

Mechanism for registries to send notifications about events such as image pushes, pulls, or deletions.

Release Trains

Scheduled, periodic releases of software components, often used in microservices architectures for coordinated updates.

ReplicaSet

Kubernetes controller ensuring a specified number of pod replicas are running at any given time.

Request Authentication

Process of verifying the identity of clients making requests to containerized services or APIs.

Request Mirroring

Technique of duplicating incoming requests to a separate service instance for testing or debugging purposes.

Resource Bin Packing

Scheduling strategy aiming to consolidate workloads onto a minimal number of nodes for efficient resource utilization.

Resource Limits

Constraints set on the amount of compute resources (CPU, memory) a container can consume, preventing resource hogging.

Resource Quotas

Kubernetes objects for limiting aggregate resource consumption per namespace, ensuring fair resource allocation.

Resource Requests

Specifications of the minimum amount of compute resources required by a container, aiding in scheduling decisions.

Resource Requests and Limits Tuning

Process of optimizing resource allocations for containers to balance performance and efficiency.

ResourceQuota

Kubernetes object providing constraints that limit aggregate resource consumption per namespace.

Retry Budgets

Limits on the number of retry attempts for failed operations in distributed systems to prevent cascading failures.

Retry Logic

Implementation of automatic reattempts for failed operations in microservices to improve system resilience.

Retry Pattern

Design pattern for handling transient failures in distributed systems by automatically repeating failed operations.

Role

Kubernetes RBAC object defining a set of permissions within a particular namespace, controlling access to resources.

RoleBinding

Kubernetes RBAC object that binds a role to a set of users or service accounts within a namespace.

RoleBindings and ClusterRoleBindings

Kubernetes objects associating Roles and ClusterRoles with users, groups, or service accounts.

Roles and ClusterRoles

Kubernetes RBAC objects defining sets of permissions at namespace or cluster level respectively.

Rollbacks

Process of reverting a deployment to a previous version in case of issues with the current version.

Rolling Updates

Deployment strategy where new versions of an application are gradually rolled out by replacing instances incrementally.

Romana for Layer 3 Networking

Networking solution for Kubernetes providing native Layer 3 networking without overlays for improved performance.

Rook

Open-source cloud-native storage orchestrator for Kubernetes, providing the platform, framework, and support for storage solutions.

Rook Storage Orchestrator

Kubernetes operator for file, block, and object storage systems, automating deployment and management of storage services.

Rootless Containers

Containers running without root privileges, enhancing security by reducing the potential impact of container breakouts.

RunC

Lightweight, portable container runtime adhering to the OCI specification, used as a low-level runtime by container engines.

RunC Internals

Inner workings and components of the RunC container runtime, including its interaction with Linux kernel features.

Runtime Application Self-Protection (RASP)

Security technology that detects and prevents real-time attacks on containerized applications.

Runtime Security

Measures and tools for protecting containerized applications during execution, including threat detection and prevention.

Runtime Threat Detection

Process of identifying and alerting on security threats to running containers and orchestration platforms.

RuntimeService

CRI component responsible for managing the entire lifecycle of a container, including creation, execution, and deletion.

SELinux Policies

Security policies enforcing mandatory access controls on containers and pods in Linux-based systems.

SLO-based Monitoring

Monitoring approach focusing on Service Level Objectives to ensure application performance and reliability.

SMI (Service Mesh Interface)

Standard specification for service meshes on Kubernetes, providing a common interface for various implementations.

SPIFFE/SPIRE for Workload Identity

Standards and implementation for securely identifying and authenticating workloads in dynamic environments.

SR-IOV for Container Networks

Use of Single Root I/O Virtualization to provide high-performance networking for containers.

Saga Pattern

Design pattern for managing data consistency across microservices in distributed transactions.

Saga Pattern for Distributed Transactions

Implementation of the Saga pattern to maintain data consistency in microservices architectures.

Sandbox Runtimes

Container runtimes providing additional isolation between the container and the host system for enhanced security.

Sandboxing

Techniques for isolating running containers from the host system and each other to enhance security.

Scale Subresource

Kubernetes API for directly managing the number of replicas of a workload without modifying the entire object.

Scheduler

Kubernetes component responsible for assigning pods to nodes based on resource requirements, policies, and constraints.

Scheduler Extender

External process allowing custom logic to be added to the Kubernetes scheduling decisions.

Scheduling Algorithms

Methods used by Kubernetes scheduler to determine the best node placement for pods based on various factors.