API
An API, or Application Programming Interface, is an interface that allows applications to communicate with one another, with other ...
Read MoreGetting started with Kubernetes is not an easy task, and the last thing you need to worry about is terminology. Our Kubernetes glossary is a dictionary of the terminology used in the Kubernetes space, defined in the context of cloud native applications.
An API, or Application Programming Interface, is an interface that allows applications to communicate with one another, with other ...
Read MoreApplication modernization is the process of taking legacy applications on older platforms and updating their platform and architect...
Read MoreApplication Performance Monitoring is a set of tools and practices to introspect and diagnose large complex application performance...
Read MoreAuthentication is the verification of identity. Today's applications control access to sensitive data that should only be exposed t...
Read MoreA canary release is a strategy for incrementally releasing new versions of an application or service to a subset of users to mitiga...
Read MoreThe circuit breaker pattern is a resilience pattern to prevent cascade failure. In a distributed system, the failure of one compone...
Read MoreCloud-native is an approach to building and running applications that utilize cloud computing benefits through containerization, mi...
Read MoreA container is a self-contained software artifact that includes an application and all the dependencies necessary for the applicati...
Read MoreA container registry is a central repository for container images. Popular public container registries include Amazon Elastic Conta...
Read MoreContinuous delivery is the technique of being able to easily and quickly release software changes to end users. Continuous delivery...
Read MoreThe control plane is a management layer that applies a consistent set of policies to a distributed data plane. Application network ...
Read MoreA Custom Resource Definition (CRD) is a way to extend the Kubernetes API for use cases that are not directly covered by core Kubern...
Read MoreThe data plane is a layer of service proxies that manage application-level network traffic. Data plane typically operate on Layer 7...
Read MoreDevOps is a philosophy in which development and operations teams work together in a rapid cycle of building, testing, and deploying...
Read MoreDistributed tracing is a technique for troubleshooting and profiling distributed microservices applications. In a microservices arc...
Read MoreDocker is a suite of tools that allows the packaging, distribution, and deployment of software applications as containers. In the c...
Read MoreEnvoy Proxy is a modern, high performance, small footprint edge and service proxy. Envoy is most comparable to software load balanc...
Read MoreFull cycle development is a software development methodology where a development team owns the full software development lifecycle,...
Read MoreGitOps is an operating model for cloud-native applications built on the principle that the source of truth for an entire applicatio...
Read MoreKubernetes is an open-source container management system widely used for running cloud applications. Originally developed by Google...
Read MoregRPC is a high performance, polyglot RPC protocol and framework built on HTTP/2 and Protocol Buffers. Designed for applications tha...
Read MoreGzip compression is a technique for minimizing bandwidth in communication through compression. Gzip compression can improve network...
Read MoreHTTP is an application protocol for data exchange that relies on a request/response model. Due to its nature as the foundational pr...
Read MoreHeader Propagation, also referred to as Context Propagation, is the technique by which context is transferred across services and r...
Read MoreHigh availability is a principle of software or an application maintaining functionality or “staying up” despite interruptions. Com...
Read MoreAn Identity Provider is a trusted system or service that manages and verifies identity information. A typical identity provider, or...
Read MoreIdentity and Access Management is about defining and enforcing policies to ensure the right individuals, through their digital iden...
Read MoreAn ingress controller is a Kubernetes application that can process routing rules according to the Kubernetes ingress specification....
Read MoreIstio is an open source service mesh built on Envoy Proxy. Originally created by IBM and Google, Istio provides a broad set of serv...
Read Moreis a utility in the user-space where a root user can configure a set of table rules for the Linux kernel firewall. iptables allow...
Read MoreJSON Web Tokens, or JWTs, are a standard way for securely representing claims. A JWT consists of a digitally signed payload. The mo...
Read MoreKube-proxy is the routing layer used by Kubernetes to route traffic between nodes in a cluster. Built on iptables, kube-proxy opera...
Read MoreKubectl is the command line interface that developers and operators use to interact with the Kubernetes API. Kubectl connects to th...
Read MoreA Kubernetes API Gateway is an intermediary layer within a Kubernetes environment that manages communication between clients and mi...
Read MoreLayer 7 is the application-level communication layer in the OSI network model. In networking, communication between services happen...
Read MoreA load balancer is a traffic management implementation that optimizes resource use by distributing network traffic across different...
Read MoreA microservices is a software module that is developed, deployed, and released independently. Multiple microservices, working toget...
Read MoreA monolith is a single, standalone application that is deployed as a single unit. Monoliths were a dominant application architectur...
Read MoreMulti-cluster is an architecture strategy for deploying a cloud native application on or across multiple Kubernetes clusters. Multi...
Read MoreOAuth is an open standard and protocol for authentication on the Internet.The OAuth protocol enables Single Sign-On use cases, wher...
Read MoreOpenID Connect (OIDC) is an authentication layer that enables web applications to authenticate users without storing and managing c...
Read MoreObservability is the ability for a system to provide data into the behavior of systems, along with the context with which to analyz...
Read MorePods are the basic compute deployment unit in Kubernetes. Pods consist of one or more containers. All containers on the pod are man...
Read MoreProgressive delivery is a software development practice that emphasizes incrementally releasing features to end users. By increment...
Read MoreA proxy is an intermediary between a source (typically, a client) and a destination (typically, a server-based application). When a...
Read MoreRate limiting is a technique used to control the amount of incoming and outgoing traffic to or from a network, or the amount of dat...
Read MoreResilience is the ability for an application to maintain operational status and acceptable service to users despite faults, errors,...
Read MoreSelf-service is an operating model for infrastructure software focused on empowering application developers to safely make infrastr...
Read MoreServer Name Indication, or SNI, is an extension to the TLS protocol that allows a single server to securely host multiple domains. ...
Read MoreServerless is a computing model where code is directly deployed on compute resources in a way that is abstracted from the developer...
Read MoreA Service Catalog is a centralized portal for tracking microservices. With access to a Service Catalog, developers get an integrate...
Read MoreService discovery is how applications and (micro)services locate each other on a network. Service discovery implementations include...
Read MoreA service mesh is a network layer that secures, manages and observes application-level communication. In a service mesh deployment,...
Read MoreSession affinity is a load balancing technique that recognizes and links an HTTP request from an end user with their application in...
Read MoreTraffic shadowing is a routing strategy whereby incoming requests are duplicated and sent to two different destinations. Also calle...
Read MoreTransport Layer Security, or TLS, is a network protocol that secures network communication. Websites use HTTP over TLS ("HTTPS") to...
Read MoreVersion 0 is a development technique that involves shipping an end-to-end development and deployment workflow as the first mileston...
Read MoreA virtual machine is a software computer that simulates a physical machine. Virtual machines are designed to be indistinguishable f...
Read MoreYAML is a common, human readable language for configuration. Defined as a recursive acronym "YAML Ain’t Markup Language," YAML is t...
Read More