API
An API, or Application Programming Interface, is an interface that allows applications to communicate with one another, with other ...
Getting started with Kubernetes is not an easy task, and the last thing you need to worry about is terminology. Our Kubernetes glossary is a dictionary of the terminology used in the Kubernetes space, defined in the context of cloud native applications.
An API, or Application Programming Interface, is an interface that allows applications to communicate with one another, with other ...
Application modernization is the process of taking legacy applications on older platforms and updating their platform and architect...
Application Performance Monitoring is a set of tools and practices to introspect and diagnose large complex application performance...
Authentication is the verification of identity. Today's applications control access to sensitive data that should only be exposed t...
A canary release is a strategy for incrementally releasing new versions of an application or service to a subset of users to mitiga...
The circuit breaker pattern is a resilience pattern to prevent cascade failure. In a distributed system, the failure of one compone...
Cloud-native is an approach to building and running applications that utilize cloud computing benefits through containerization, mi...
A container is a self-contained software artifact that includes an application and all the dependencies necessary for the applicati...
Continuous delivery is the technique of being able to easily and quickly release software changes to end users. Continuous delivery...
The control plane is a management layer that applies a consistent set of policies to a distributed data plane. Application network ...
A Custom Resource Definition (CRD) is a powerful tool designed to extend the Kubernetes API to include custom resources tailored fo...
The data plane is a layer of service proxies that manage application-level network traffic. Data plane typically operate on Layer 7...
DevOps is a philosophy in which development and operations teams work together in a rapid cycle of building, testing, and deploying...
Distributed tracing is a technique for troubleshooting and profiling distributed microservices applications. In a microservices arc...
Docker is a suite of tools that allows the packaging, distribution, and deployment of software applications as containers. In the c...
GitOps is an operating model for cloud-native applications built on the principle that the source of truth for an entire applicatio...
Kubernetes is an open-source container management system widely used for running cloud applications. Originally developed by Google...
gRPC is a high performance, polyglot RPC protocol and framework built on HTTP/2 and Protocol Buffers. Designed for applications tha...
Gzip compression is a technique for minimizing bandwidth in communication through compression. Gzip compression can improve network...
HTTP is an application protocol for data exchange that relies on a request/response model. Due to its nature as the foundational pr...
Header Propagation, also referred to as Context Propagation, is the technique by which context is transferred across services and r...
High availability is a principle of software or an application maintaining functionality or “staying up” despite interruptions. Com...
An Identity Provider is a trusted system or service that manages and verifies identity information. A typical identity provider, or...
Identity and Access Management is about defining and enforcing policies to ensure the right individuals, through their digital iden...
An ingress controller is a Kubernetes application that can process routing rules according to the Kubernetes ingress specification....
Istio is an open source service mesh built on Envoy Proxy. Originally created by IBM and Google, Istio provides a broad set of serv...
is a utility in the user-space where a root user can configure a set of table rules for the Linux kernel firewall. iptables allow...
Kube-proxy is the routing layer used by Kubernetes to route traffic between nodes in a cluster. Built on iptables, kube-proxy opera...
Kubectl is the command line interface that developers and operators use to interact with the Kubernetes API. Kubectl connects to th...
A Kubernetes API Gateway is an intermediary layer within a Kubernetes environment that manages communication between clients and mi...
A microservices is a software module that is developed, deployed, and released independently. Multiple microservices, working toget...
A monolith is a single, standalone application that is deployed as a single unit. Monoliths were a dominant application architectur...
Multi-cluster is an architecture strategy for deploying a cloud native application on or across multiple Kubernetes clusters. Multi...
OAuth is an open standard and protocol for authentication on the Internet.The OAuth protocol enables Single Sign-On use cases, wher...
OpenID Connect (OIDC) is an authentication layer that enables web applications to authenticate users without storing and managing c...
Observability is the ability for a system to provide data into the behavior of systems, along with the context with which to analyz...
Pods are the basic compute deployment unit in Kubernetes. Pods consist of one or more containers. All containers on the pod are man...
Progressive delivery is a software development practice that emphasizes incrementally releasing features to end users. By increment...
A proxy is an intermediary between a source (typically, a client) and a destination (typically, a server-based application). When a...
Self-service is an operating model for infrastructure software focused on empowering application developers to safely make infrastr...
Server Name Indication, or SNI, is an extension to the TLS protocol that allows a single server to securely host multiple domains. ...
Serverless is a computing model where code is directly deployed on compute resources in a way that is abstracted from the developer...
A Service Catalog is a centralized portal for tracking microservices. With access to a Service Catalog, developers get an integrate...
Service discovery is how applications and (micro)services locate each other on a network. Service discovery implementations include...
A service mesh is a network layer that secures, manages and observes application-level communication. In a service mesh deployment,...
Session affinity is a load balancing technique that recognizes and links an HTTP request from an end user with their application in...
Traffic shadowing is a routing strategy whereby incoming requests are duplicated and sent to two different destinations. Also calle...
Transport Layer Security, or TLS, is a network protocol that secures network communication. Websites use HTTP over TLS ("HTTPS") to...