Skip to main content

Terms

NoTerminologyMeaning
1AMDPStands for Application Modernization Development Platform
2RDEStands for Remoted Development Environment
3IDEStands for Integrated Development Environment
4.PRStands for Pull Request
5.Non-PRStands for Non- Pull Request
6.TopologyArrangement and distribution of nodes and resources within a cluster
7.Add-on serviceOptional component that enhances Kubernetes functionality but is not part of its core.
8.FargateThe serverless compute engine for containers provided by AWS. Fargate runs containers without the need to manage the underlying infrastructure (e.g., EC2 instances)
9Infra sizeThe compute capacity (such as CPU, RAM, and storage) and network resources necessary to run the development environment efficiently
10CICDStands for Continuous Integration and Continuous Deployment
11Backing serviceAny external or attached service your application depends on (Databases- MySQL, PostgreSQL, Message queues-RabbitMQ, Kafka, Caches- Redis, Memcached)
12IngressAn Ingress is a Kubernetes resource that manages external access to services within the cluster, typically via HTTP or HTTPS.
It defines routing rules, TLS (HTTPS) settings, and URL paths.
13Container ImageA lightweight, standalone package that includes everything needed to run an application: code, runtime, libraries, and file system.
14NamespaceA logical partitioning of the cluster that isolates and organizes resources.
Used for multi-team, multi-tenant, or multi-environment use cases
15ClusterA group of machines (nodes) running Kubernetes components
16DORAStands for DevOps Research and Assessment
17FrameworkA structured platform or set of tools that provides predefined functionality and patterns for building, deploying, or managing applications and services
18Time To Live (TTL)Defines how session data is written to the server
19Flush ModeControls when data buffered in memory is written (or “flushed”) to a storage system or output
20PVCStands for Persistent Volume Claim.
It is a request for storage by a user. It specifies size, access modes, and optionally a storage class. Kubernetes matches the PVC to an available PV that meets the requirements.
21PVStands for Persistent Volume.
It is a piece of storage in a Kubernetes cluster that has been provisioned by an administrator or dynamically provisioned using StorageClasses. It is a resource in the cluster just like a node or pod.
22Pod Lifecycle HookSpecial handlers that execute at specific stages of a container's lifecycle
23Config MapA Kubernetes object that stores non-sensitive configuration data as key-value pairs.
Used to separate app configs from container images.
24Min Replica CountThe minimum number of pod replicas to maintain for the application
25Max Replica CountThe maximum number of pod replicas to maintain for the application
26PodThe smallest and simplest unit in the Kubernetes object model in order to create or deploy
27Port A numerical identifier used to specify a particular process or service on a device. In networking, it allows multiple services to run on a single IP address by distinguishing traffic intended for different applications (e.g., HTTP uses port 80)
28Service-account-tokenIn Kubernetes, a service account token is a JWT (JSON Web Token) automatically mounted into pods to authenticate with the Kubernetes API. It allows applications running inside pods to interact securely with cluster resources
29Basic-authA simple authentication scheme built into HTTP. It uses a username and password encoded in base64 and sent in the request header. It’s not secure unless used over HTTPS
30Mount PathThe directory inside a container where a volume (external storage) is attached. It allows the container to read/write data to persistent storage, such as a ConfigMap, Secret, or external disk
31EndpointA network-accessible address (IP + port) that exposes a service or resource. In Kubernetes, endpoints are automatically created to represent the IPs of pods backing a service
32GIT repositoryA version-controlled storage space for code, configuration, or documentation. It tracks changes, supports collaboration, and is often used in CI/CD pipelines for deploying applications
33ProtocolA set of rules that define how data is transmitted over a network. Examples include HTTP, HTTPS, TCP, UDP, and FTP. It ensures reliable and standardized communication between systems
34MicroserviceA small, independent service that performs a specific function within a larger application. Microservices communicate via APIs and are designed for scalability, resilience, and ease of deployment
35LoadBalancerA type of Kubernetes service that distributes incoming traffic across multiple pods or nodes. It ensures high availability and scalability by balancing the load and preventing overload
36Service AnnotationsKey-value metadata attached to Kubernetes objects. Service annotations are used to configure external integrations, such as cloud load balancers, monitoring tools, or ingress controllers
37Session AffinityAlso called sticky sessions, ensures that a user's requests are consistently routed to the same pod or backend server. This is useful for applications that maintain session state.
38Broker InstanceIn messaging systems (like Kafka or RabbitMQ), a broker instance is a server that receives, stores, and forwards messages. It acts as an intermediary between producers and consumers in a distributed system.
39Circuit BreakerA design pattern used to detect failures and prevent repeated attempts to execute a failing operation. It helps maintain system stability by stopping calls to a service that is likely to fail
40WYSIWYG Stands for What You See Is What You Get
41PaaSStands for Platform as a Service.
PaaS is a cloud computing model that provides developers with a platform to build, run, and manage applications without dealing with the underlying infrastructure
42SSHStands for Secure Shell.
SSH is a secure protocol used to remotely access and manage servers over an encrypted connection
43E2CStands for Elastic Compute Cloud- a virtual server in Amazon Web Service (AWS)
44OOMStands for Out Of Memory
45Kubernetes CNIStands for Container Network Interface.
CNI is a specification and set of plugins used by Kubernetes to manage network connectivity for containers. It allows pods to communicate with each other and with external services
46Opaque A method for registering configuration information in a Key/Value format.
47TLS Secret A Kubernetes Secret object that stores a TLS private key and certificate for use in secure HTTPS communication (SSL/TLS)
48Environment variableA key-value pair injected into a container’s runtime environment, often used to configure applications
49ProvisionerA component that automatically creates Persistent Volumes (PV) in response to Persistent Volume Claims (PVCs).
50RBAC Stands for Role-Based Access Control.
RBAC is a method of regulating access to resources based on the roles of individual users within an organization. In Kubernetes, RBAC controls who can perform actions like reading pods, creating deployments, or accessing secrets
51WizardA graphical or guided interface that walks users through the process of creating or configuring Kubernetes resources step-by-step
52k8sagentAn open-source container orchestration system that automates deployment, scaling, and management of containerized applications.