Rethink platform engineering and developer impact in the age of AI. Tune in to our webinar on Thursday, May 22.

Kubernetes & Cloud Native Glossary

Getting started with Kubernetes is not an easy task, and the last thing you need to worry about is terminology. Our Kubernetes glossary is a dictionary of the terminology used in the Kubernetes space, defined in the context of cloud native applications.
A

API

An API, or application programming interface, is an interface that allows applications to communicate with one another, with other programs, and with end-users.

Read More

Application Modernization

Application modernization is the process of taking legacy applications on older platforms and updating their platform and architecture. It is frequently...

Read More

Application Performance Monitoring (APM)

Application Performance Monitoring is a set of tools and practices to introspect and diagnose large complex application performance issues with the...

Read More

Authentication

Authentication is the verification of identity. Today's applications control access to sensitive data that should only be exposed to the appropriate consumer.

Read More
C

Canary Release

A canary release is a strategy for incrementally releasing new versions of an application or service to a subset of users to mitigate the risk of failure...

Read More

Circuit Breaker

The circuit breaker pattern is a resilience pattern to prevent cascade failure. In a distributed system, the failure of one component can quickly lead to...

Read More

Cloud-Native

Adopting Cloud-Native: Leverage containerization, microservices, and dynamic orchestration to build resilient and elastic applications for rapid delivery.

Read More

Container

A container is a self-contained software artifact that includes an application & all the dependencies necessary for the application to run. A container enables...

Read More

Container Registry

Explore what a Container Registry is, its pivotal role in cloud-native technologies & its benefits in enhancing security and scalability in software deployments

Read More
D

Data Plane

The data plane is a layer of service proxies that manage application-level network traffic. Data plane typically operate on Layer 7 (application) traffic...

Read More

DevOps

DevOps is a philosophy in which development & operations teams work together in a rapid cycle of building, testing, & deploying software, in a microservices...

Read More

Distributed Tracing

Distributed tracing is a technique for troubleshooting and profiling distributed microservices applications. In a microservices architecture, a single request...

Read More

Docker

Docker is a suite of tools that allows the packaging, distribution, and deployment of software applications as containers. In the cloud-native ecosystem, Docker

Read More
E

Envoy Proxy

Envoy Proxy is a modern, high performance, small footprint edge and service proxy. Envoy is most comparable to software load balancers such as NGINX and...

Read More
F

Full Cycle Development

Discover how full cycle software development boosts velocity and quality by giving teams end-to-end ownership—from coding to production support.

Read More
G

GitOps

GitOps is an operating model for cloud-native applications built on the principle that the source of truth for an entire application from its deployment...

Read More

gRPC

gRPC is a high performance, polyglot RPC protocol & framework built on HTTP/2 and Protocol Buffers. Designed for applications that are heavily dependent on RPC...

Read More

gZip Compression

Gzip compression is a technique for minimizing bandwidth in communication through compression. Gzip compression can improve network performance at the...

Read More
H

Header Propagation

Header Propagation, also referred to as Context Propagation, is the technique by which context is transferred across services and remote processes through...

Read More

High Availability

High availability is a principle of software or an application maintaining functionality or “staying up” despite interruptions. Commonly abbreviated as...

Read More

HTTP

HTTP is an application protocol for data exchange that relies on a request/response model. Due to its nature as the foundational protocol for the modern...

Read More
I

Identity and Access Management (IAM)

Identity and Access Management is about defining and enforcing policies to ensure the right individuals, through their digital identity, have the proper roles...

Read More

Identity Provider (IDP)

An Identity Provider is a trusted system or service that manages and verifies identity information. A typical identity provider, or IDP, stores information...

Read More

Ingress Controller

An ingress controller is a Kubernetes application that can process routing rules according to the Kubernetes ingress specification. An ingress controller...

Read More

iptables

Is a utility in the user-space where a root user can configure a set of table rules for the Linux kernel firewall.

Read More

Istio

Istio is an open source service mesh built on Envoy Proxy. Originally created by IBM and Google, Istio provides a broad set of service mesh functionality...

Read More
J

JSON Web Tokens (JWTs)

JSON Web Tokens, or JWTs, are a standard way for securely representing claims. A JWT consists of a digitally signed payload. The most common use case for JWT...

Read More
K

Kube-Proxy

Kube-proxy is the routing layer used by Kubernetes to route traffic between nodes in a cluster. Built on iptables, kube-proxy operates at Layer 4...

Read More

Kubectl

Kubectl is the command line interface that developers & operators use to interact with the Kubernetes API. Kubectl connects to the kubernetes API server running

Read More

Kubernetes

Kubernetes is an open-source container management system widely used for running cloud applications. Originally developed by Google, Kubernetes is now...

Read More

Kubernetes API Gateway

A Kubernetes API Gateway is an intermediary layer within a Kubernetes environment that manages communication between clients and microservices. It offer...

Read More
L

Layer 7

Layer 7 is the application-level communication layer in the OSI network model. In networking, communication between services happens at multiple layers...

Read More

Load Balancer

A load balancer is a traffic management implementation that optimizes resource use by distributing network traffic across different, redundant servers...

Read More
M

Microservices

A microservices is a software module that is developed, deployed, & released independently. Multiple microservices, working together, comprise of an...

Read More

Monolith

A monolith is a single, standalone application that is deployed as a single unit. Monoliths were a dominant application architecture in the 2010s, as web...

Read More

Multi-Cluster

Multi-cluster is an architecture strategy for deploying a cloud native application on or across multiple Kubernetes clusters. Multi-cluster architectures...

Read More
N

Node

A Kubernetes node is a physical or virtual machine that runs containerized workloads. A Kubernetes cluster consists of multiple nodes that are joined together

Read More

NodePort

A NodePort is a way to enable Kubernetes services to receive traffic from outside the cluster. In a NodePort, the Kubernetes API server allocates a specific...

Read More
O

OAuth

OAuth is an open standard and protocol for authentication on the Internet.The OAuth protocol enables Single Sign-On use cases, where a user can authenticate...

Read More

Observability

Observability is the ability for a system to provide data into the behavior of systems, along with the context with which to analyze that data. Highly...

Read More

OpenID Connect (OIDC)

OpenID Connect (OIDC) is an authentication layer that enables web applications to authenticate users without storing and managing credentials. Built on the...

Read More
P

Pod

Pods are the basic compute deployment unit in Kubernetes. Pods consist of one or more containers. All containers on the pod are managed together and share...

Read More

Progressive Delivery

Progressive delivery is a software development practice that emphasizes incrementally releasing features to end users. By incrementally rolling out features...

Read More

Proxy

A proxy is an intermediary between a source (typically, a client) and a destination (typically, a server-based application). When a proxy is deployed, all...

Read More
R

Rate Limiting

Rate limiting is a technique used to control the amount of incoming and outgoing traffic to or from a network, or the amount of data being queried...

Read More

Resilience

Resilience is the ability for an application to maintain operational status and acceptable service to users despite faults, errors, or threats.

Read More
S

Self-Service

Self-service is an operating model for infrastructure software focused on empowering application developers to safely make infrastructure changes.

Read More

Server Name Indication (SNI)

Server Name Indication, or SNI, is an extension to the TLS protocol that allows a single server to securely host multiple domains. With SNI, a client can...

Read More

Serverless

Serverless is a computing model where code is directly deployed on compute resources in a way that is abstracted from the developer. Also know as Function...

Read More

Service Catalog

A Service Catalog is a centralized portal for tracking microservices. With access to a Service Catalog, developers get an integrated, developer-friendly view...

Read More

Service Discovery

Service discovery enables apps and microservices to locate each other. Learn about implementations, central servers, and cloud-native architecture benefits.

Read More
T

Traffic Shadowing

Traffic shadowing is a routing strategy whereby incoming requests are duplicated and sent to two different destinations. Also called mirroring, traffic...

Read More

Transport Layer Security (TLS)

Transport Layer Security, or TLS, is a network protocol that secures network communication. Websites use HTTP over TLS ("HTTPS") to secure communication...

Read More
V

Version 0

Version 0 is a development technique that involves shipping an end-to-end development and deployment workflow as the first milestone. Also known as a "dancing..

Read More

Virtual Machine

A virtual machine is a software computer that simulates a physical machine. Virtual machines are designed to be indistinguishable from a physical machine...

Read More
Y

YAML

YAML is a common, human readable language for configuration. Defined as a recursive acronym "YAML Ain’t Markup Language," YAML is the common configuration...

Read More