Join us on July 18th for a webinar on CI/CD Pipeline Optimization with APIs & K8s. Register now

Kubernetes & Cloud Native Glossary

Getting started with Kubernetes is not an easy task, and the last thing you need to worry about is terminology. Our Kubernetes glossary is a dictionary of the terminology used in the Kubernetes space, defined in the context of cloud native applications.



An API, or Application Programming Interface, is an interface that allows applications to communicate with one another, with other ...

Read More

Application Modernization

Application modernization is the process of taking legacy applications on older platforms and updating their platform and architect...

Read More

Application Performance Monitoring (APM)

Application Performance Monitoring is a set of tools and practices to introspect and diagnose large complex application performance...

Read More


Authentication is the verification of identity. Today's applications control access to sensitive data that should only be exposed t...

Read More


Canary Release

A canary release is a strategy for incrementally releasing new versions of an application or service to a subset of users to mitiga...

Read More

Circuit Breaker

The circuit breaker pattern is a resilience pattern to prevent cascade failure. In a distributed system, the failure of one compone...

Read More

Cloud Native

Cloud-native is an approach to building and running applications that utilize cloud computing benefits through containerization, mi...

Read More


A container is a self-contained software artifact that includes an application and all the dependencies necessary for the applicati...

Read More

Continuous Delivery

Continuous delivery is the technique of being able to easily and quickly release software changes to end users. Continuous delivery...

Read More

Control Plane

The control plane is a management layer that applies a consistent set of policies to a distributed data plane. Application network ...

Read More

Custom Resource Definition

A Custom Resource Definition (CRD) is a powerful tool designed to extend the Kubernetes API to include custom resources tailored fo...

Read More


Data Plane

The data plane is a layer of service proxies that manage application-level network traffic. Data plane typically operate on Layer 7...

Read More


DevOps is a philosophy in which development and operations teams work together in a rapid cycle of building, testing, and deploying...

Read More

Distributed Tracing

Distributed tracing is a technique for troubleshooting and profiling distributed microservices applications. In a microservices arc...

Read More


Docker is a suite of tools that allows the packaging, distribution, and deployment of software applications as containers. In the c...

Read More


Envoy Proxy

Envoy Proxy is a modern, high performance, small footprint edge and service proxy. Envoy is most comparable to software load balanc...

Read More


Full Cycle Development

Full cycle development is a software development methodology where a development team owns the full software development lifecycle,...

Read More



GitOps is an operating model for cloud-native applications built on the principle that the source of truth for an entire applicatio...

Read More

Glossary - Kubernetes

Kubernetes is an open-source container management system widely used for running cloud applications. Originally developed by Google...

Read More


gRPC is a high performance, polyglot RPC protocol and framework built on HTTP/2 and Protocol Buffers. Designed for applications tha...

Read More

gZip Compression

Gzip compression is a technique for minimizing bandwidth in communication through compression. Gzip compression can improve network...

Read More



HTTP is an application protocol for data exchange that relies on a request/response model. Due to its nature as the foundational pr...

Read More

Header Propagation

Header Propagation, also referred to as Context Propagation, is the technique by which context is transferred across services and r...

Read More

High Availability

High availability is a principle of software or an application maintaining functionality or “staying up” despite interruptions. Com...

Read More


Identity Provider (IDP)

An Identity Provider is a trusted system or service that manages and verifies identity information. A typical identity provider, or...

Read More

Identity and Access Management (IAM)

Identity and Access Management is about defining and enforcing policies to ensure the right individuals, through their digital iden...

Read More

Ingress Controller

An ingress controller is a Kubernetes application that can process routing rules according to the Kubernetes ingress specification....

Read More


Istio is an open source service mesh built on Envoy Proxy. Originally created by IBM and Google, Istio provides a broad set of serv...

Read More


is a utility in the user-space where a root user can configure a set of table rules for the Linux kernel firewall. iptables allow...

Read More



JSON Web Tokens, or JWTs, are a standard way for securely representing claims. A JWT consists of a digitally signed payload. The mo...

Read More



Kube-proxy is the routing layer used by Kubernetes to route traffic between nodes in a cluster. Built on iptables, kube-proxy opera...

Read More


Kubectl is the command line interface that developers and operators use to interact with the Kubernetes API. Kubectl connects to th...

Read More

kubernetes API Gateway

A Kubernetes API Gateway is an intermediary layer within a Kubernetes environment that manages communication between clients and mi...

Read More


Layer 7

Layer 7 is the application-level communication layer in the OSI network model. In networking, communication between services happen...

Read More

Load Balancer

A load balancer is a traffic management implementation that optimizes resource use by distributing network traffic across different...

Read More



A microservices is a software module that is developed, deployed, and released independently. Multiple microservices, working toget...

Read More


A monolith is a single, standalone application that is deployed as a single unit. Monoliths were a dominant application architectur...

Read More


Multi-cluster is an architecture strategy for deploying a cloud native application on or across multiple Kubernetes clusters. Multi...

Read More



A Kubernetes node is a physical or virtual machine that runs containerized workloads. A Kubernetes cluster consists of multiple nod...

Read More


A NodePort is a way to enable Kubernetes services to receive traffic from outside the cluster. In a NodePort, the Kubernetes API se...

Read More



OAuth is an open standard and protocol for authentication on the Internet.The OAuth protocol enables Single Sign-On use cases, wher...

Read More


OpenID Connect (OIDC) is an authentication layer that enables web applications to authenticate users without storing and managing c...

Read More


Observability is the ability for a system to provide data into the behavior of systems, along with the context with which to analyz...

Read More



Pods are the basic compute deployment unit in Kubernetes. Pods consist of one or more containers. All containers on the pod are man...

Read More

Progressive Delivery

Progressive delivery is a software development practice that emphasizes incrementally releasing features to end users. By increment...

Read More


A proxy is an intermediary between a source (typically, a client) and a destination (typically, a server-based application). When a...

Read More


Rate Limiting

Rate limiting is a technique used to control the amount of incoming and outgoing traffic to or from a network, or the amount of dat...

Read More


Resilience is the ability for an application to maintain operational status and acceptable service to users despite faults, errors,...

Read More



Self-service is an operating model for infrastructure software focused on empowering application developers to safely make infrastr...

Read More

Server Name Indication

Server Name Indication, or SNI, is an extension to the TLS protocol that allows a single server to securely host multiple domains. ...

Read More


Serverless is a computing model where code is directly deployed on compute resources in a way that is abstracted from the developer...

Read More

Service Catalog

A Service Catalog is a centralized portal for tracking microservices. With access to a Service Catalog, developers get an integrate...

Read More

Service Discovery

Service discovery is how applications and (micro)services locate each other on a network. Service discovery implementations include...

Read More

Service Mesh

A service mesh is a network layer that secures, manages and observes application-level communication. In a service mesh deployment,...

Read More

Session Affinity

Session affinity is a load balancing technique that recognizes and links an HTTP request from an end user with their application in...

Read More


Traffic Shadowing

Traffic shadowing is a routing strategy whereby incoming requests are duplicated and sent to two different destinations. Also calle...

Read More

Transport Layer Security (TLS)

Transport Layer Security, or TLS, is a network protocol that secures network communication. Websites use HTTP over TLS ("HTTPS") to...

Read More


Version 0

Version 0 is a development technique that involves shipping an end-to-end development and deployment workflow as the first mileston...

Read More

Virtual Machine

A virtual machine is a software computer that simulates a physical machine. Virtual machines are designed to be indistinguishable f...

Read More


What is a Container Registry?

A container registry is a central repository for container images. As a fundamental component of cloud-native technologies, contain...

Read More



YAML is a common, human readable language for configuration. Defined as a recursive acronym "YAML Ain’t Markup Language," YAML is t...

Read More