Terms
No | Terminology | Meaning |
---|---|---|
1 | AMDP | Stands for Application Modernization Development Platform |
2 | RDE | Stands for Remoted Development Environment |
3 | IDE | Stands for Integrated Development Environment |
4. | PR | Stands for Pull Request |
5. | Non-PR | Stands for Non- Pull Request |
6. | Topology | Arrangement and distribution of nodes and resources within a cluster |
7. | Add-on service | Optional component that enhances Kubernetes functionality but is not part of its core. |
8. | Fargate | The serverless compute engine for containers provided by AWS. Fargate runs containers without the need to manage the underlying infrastructure (e.g., EC2 instances) |
9 | Infra size | The compute capacity (such as CPU, RAM, and storage) and network resources necessary to run the development environment efficiently |
10 | CICD | Stands for Continuous Integration and Continuous Deployment |
11 | Backing service | Any external or attached service your application depends on (Databases- MySQL, PostgreSQL, Message queues-RabbitMQ, Kafka, Caches- Redis, Memcached) |
12 | Ingress | An Ingress is a Kubernetes resource that manages external access to services within the cluster, typically via HTTP or HTTPS. It defines routing rules, TLS (HTTPS) settings, and URL paths. |
13 | Container Image | A lightweight, standalone package that includes everything needed to run an application: code, runtime, libraries, and file system. |
14 | Namespace | A logical partitioning of the cluster that isolates and organizes resources. Used for multi-team, multi-tenant, or multi-environment use cases |
15 | Cluster | A group of machines (nodes) running Kubernetes components |
16 | DORA | Stands for DevOps Research and Assessment |
17 | Framework | A structured platform or set of tools that provides predefined functionality and patterns for building, deploying, or managing applications and services |
18 | Time To Live (TTL) | Defines how session data is written to the server |
19 | Flush Mode | Controls when data buffered in memory is written (or “flushed”) to a storage system or output |
20 | PVC | Stands for Persistent Volume Claim. It is a request for storage by a user. It specifies size, access modes, and optionally a storage class. Kubernetes matches the PVC to an available PV that meets the requirements. |
21 | PV | Stands for Persistent Volume. It is a piece of storage in a Kubernetes cluster that has been provisioned by an administrator or dynamically provisioned using StorageClasses. It is a resource in the cluster just like a node or pod. |
22 | Pod Lifecycle Hook | Special handlers that execute at specific stages of a container's lifecycle |
23 | Config Map | A Kubernetes object that stores non-sensitive configuration data as key-value pairs. Used to separate app configs from container images. |
24 | Min Replica Count | The minimum number of pod replicas to maintain for the application |
25 | Max Replica Count | The maximum number of pod replicas to maintain for the application |
26 | Pod | The smallest and simplest unit in the Kubernetes object model in order to create or deploy |
27 | Port | A numerical identifier used to specify a particular process or service on a device. In networking, it allows multiple services to run on a single IP address by distinguishing traffic intended for different applications (e.g., HTTP uses port 80) |
28 | Service-account-token | In Kubernetes, a service account token is a JWT (JSON Web Token) automatically mounted into pods to authenticate with the Kubernetes API. It allows applications running inside pods to interact securely with cluster resources |
29 | Basic-auth | A simple authentication scheme built into HTTP. It uses a username and password encoded in base64 and sent in the request header. It’s not secure unless used over HTTPS |
30 | Mount Path | The directory inside a container where a volume (external storage) is attached. It allows the container to read/write data to persistent storage, such as a ConfigMap, Secret, or external disk |
31 | Endpoint | A network-accessible address (IP + port) that exposes a service or resource. In Kubernetes, endpoints are automatically created to represent the IPs of pods backing a service |
32 | GIT repository | A version-controlled storage space for code, configuration, or documentation. It tracks changes, supports collaboration, and is often used in CI/CD pipelines for deploying applications |
33 | Protocol | A set of rules that define how data is transmitted over a network. Examples include HTTP, HTTPS, TCP, UDP, and FTP. It ensures reliable and standardized communication between systems |
34 | Microservice | A small, independent service that performs a specific function within a larger application. Microservices communicate via APIs and are designed for scalability, resilience, and ease of deployment |
35 | LoadBalancer | A type of Kubernetes service that distributes incoming traffic across multiple pods or nodes. It ensures high availability and scalability by balancing the load and preventing overload |
36 | Service Annotations | Key-value metadata attached to Kubernetes objects. Service annotations are used to configure external integrations, such as cloud load balancers, monitoring tools, or ingress controllers |
37 | Session Affinity | Also called sticky sessions, ensures that a user's requests are consistently routed to the same pod or backend server. This is useful for applications that maintain session state. |
38 | Broker Instance | In messaging systems (like Kafka or RabbitMQ), a broker instance is a server that receives, stores, and forwards messages. It acts as an intermediary between producers and consumers in a distributed system. |
39 | Circuit Breaker | A design pattern used to detect failures and prevent repeated attempts to execute a failing operation. It helps maintain system stability by stopping calls to a service that is likely to fail |
40 | WYSIWYG | Stands for What You See Is What You Get |
41 | PaaS | Stands for Platform as a Service. PaaS is a cloud computing model that provides developers with a platform to build, run, and manage applications without dealing with the underlying infrastructure |
42 | SSH | Stands for Secure Shell. SSH is a secure protocol used to remotely access and manage servers over an encrypted connection |
43 | E2C | Stands for Elastic Compute Cloud- a virtual server in Amazon Web Service (AWS) |
44 | OOM | Stands for Out Of Memory |
45 | Kubernetes CNI | Stands for Container Network Interface. CNI is a specification and set of plugins used by Kubernetes to manage network connectivity for containers. It allows pods to communicate with each other and with external services |
46 | Opaque | A method for registering configuration information in a Key/Value format. |
47 | TLS Secret | A Kubernetes Secret object that stores a TLS private key and certificate for use in secure HTTPS communication (SSL/TLS) |
48 | Environment variable | A key-value pair injected into a container’s runtime environment, often used to configure applications |
49 | Provisioner | A component that automatically creates Persistent Volumes (PV) in response to Persistent Volume Claims (PVCs). |
50 | RBAC | Stands for Role-Based Access Control. RBAC is a method of regulating access to resources based on the roles of individual users within an organization. In Kubernetes, RBAC controls who can perform actions like reading pods, creating deployments, or accessing secrets |
51 | Wizard | A graphical or guided interface that walks users through the process of creating or configuring Kubernetes resources step-by-step |
52 | k8sagent | An open-source container orchestration system that automates deployment, scaling, and management of containerized applications. |