TechAnek

DevOps glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Card Layout
Active Directory
Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work done.
Application migration
Application migration is the process of moving a software application from one computing environment to another.
Artificial Intelligence (AI)
Artificial intelligence (AI) is a set of technologies that enable machines to perform tasks that mimic human intelligence.
Artifact
An artifact is a package or Docker container image that can be stored and managed in Artifact Registry
Autonomy
Autonomy in the cloud refers to the ability to use cloud benefits without becoming locked into a vendor's services.
Agile methodology
Agile methodology is a project management approach that involves breaking the project into phases and emphasizes continuous collaboration and improvement.
Artificial Intelligence for IT Operations (AIOps)
Artificial Intelligence for IT Operations (AIOps) is a set of technologies that use AI, machine learning (ML), and other advanced analytics to help organizations manage and monitor IT operations.
Application performance monitoring (APM)
Application performance monitoring (APM) is the practice of tracking key software application performance metrics using monitoring software and telemetry data.
Application program interface (API)
An application programming interface (API) is a collection of programming codes that allow different software platforms to communicate with each other.
Application Release Automation (ARA)
Application Release Automation (ARA) is a process that uses automation tools to package and deploy applications and their updates across different environments, from development to production.
Application lifecycle management
Application lifecycle management (ALM) is an integrated system of people, tools and processes that supervise a software application from its initial planning and development, through testing and maintenance, and into decommissioning and retirement

B

Blue/Green Deployment
A blue/green deployment is a deployment strategy in which you create two separate, but identical environments. One environment (blue) is running the current application version and one environment (green) is running the new application version.
Business Analytics
Business analytics is the process of transforming data into insights to improve business decisions. Data management, data visualization, predictive modeling, data mining, forecasting simulation, and optimization are some of the tools used to create insights from data.
Business Intelligence
AWS Fargate is a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes (EKS).
Business Technology
Business technology refers to the tools, systems, and methodologies that businesses use to run their operations and improve customer experiences.
Branching
Branching is the practice of creating new code branches for different versions of a software project.
Black Box Testing
Black box testing, a form of testing that is performed with no knowledge of a system's internals, can be carried out to evaluate the functionality, security, performance, and other aspects of an application.

C

Canary Deployments
A canary deployment is a progressive rollout of an application that splits traffic between an already-deployed version and a new version, rolling it out to a subset of users before rolling out fully.
Chaos Engineering
Chaos engineering is a discipline that studies how these failures can occur and provides methodologies to help avoid them. By understanding the root cause of failures, chaos engineers can develop plans to prevent or mitigate them.
CI/CD
CI And CD is the practice of automating the integration of code changes from multiple developers into a single codebase.
Content delivery network (CDN)
A content delivery network (CDN) is a group of servers that are spread out across the world to deliver web content to users based on their location.
Configuration as Code (CaC)
Configuration as Code (CaC) is a practice that involves using code to define and manage the settings and configurations of software and systems.
Container Registry
A container registry is a type of tool that can host and distribute container images.
Content delivery network (CDN)
A content delivery network (CDN) is a group of servers that are spread out across the world to deliver web content to users based on their location.
Configuration as Code (CaC)
Configuration as Code (CaC) is a practice that involves using code to define and manage the settings and configurations of software and systems.
Container Registry
A container registry is a type of tool that can host and distribute container images.
Container image
A container image is a static file that contains the code and other components needed to run an application in a container on a cloud computing system.
Continuous improvement (CI)
Continuous improvement (CI) is a process of ongoing analysis, identification, and improvement of products, services, or processes.
Container
A container is a software package that contains all the necessary elements to run an application in any environment, including the public cloud
Cluster
A cluster is a group of computers or applications that work together to achieve a common goal.
CloudWatch
Amazon CloudWatch is a monitoring and management service for AWS and other cloud resources that helps users gain insights into the health of their applications and infrastructure
Cron job
A cron job is a scheduled task that runs automatically on a computer server at a set time or interval.
Capacity Test
Capacity testing, also known as load testing or scalability testing, is a performance testing technique used to determine the maximum number of concurrent users an application can handle before experiencing performance degradation or failure.
Continuous Quality
Continuous quality (CQ) is an engineering practice that measures, monitors, improves, and debugs software quality throughout the software development life cycle (SDLC).
Continuous Testing
Continuous testing (CT) is a software development process that involves automatically testing applications at every stage of the software development life cycle (SDLC).
Complex-Adaptive Systems
A complex adaptive system (CAS) is a system that is made up of many interacting components that adapt and learn as they interact.
Configuration Drift
Configuration drift is when configurations in an IT system gradually change over time.
Containerization
Containerization is a software deployment process that packages an application's code and dependencies into a single container, which can then be run on any infrastructure
Continuous Security
Continuous security ensures end-to-end protection by continuously monitoring and addressing vulnerabilities at each stage of development, deployment, and operations.
Configuration Management
Configuration Management is the process of maintaining systems, such as computer hardware and software, in a desired state.
Continuous Delivery (CD)
Continuous delivery is a software development practice where code changes are automatically prepared for a release to production.
Continuous Deployment
Automates the entire process, including releasing changes to production without human intervention. This practice is good for accelerating the feedback loop with customers and reducing pressure on the team
Continuous Quality Improvement (CQI)
Continuous Quality Improvement (CQI) is a process that aims to improve quality by creating an environment where management and staff are constantly striving to improve. CQI is also known as Performance and Quality Improvement (PQI).
Conditional Access
Conditional Access takes signals from various sources into account when making access decisions.

D

Deployment
Deployment is the process of making software updates or applications available for use by end-users.
Digital customer experience (DCX)
Digital customer experience (DCX) is the total online interactions a customer has with a brand.
Docker
Docker is a platform designed to help developers build, share, and run container applications.
Directory traversal
Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory other than the server's root directory.
Distributed tracing
Distributed tracing is a technique that allows developers to track requests as they move through a distributed system or microservice environment.
Database management
Database management is the process of defining, retrieving, manipulating, and managing data in a database.
DevSecOps
DevSecOps stands for development, security, and operations. It's an approach to culture, automation, and platform design that integrates security as a shared responsibility throughout the entire IT lifecycle.
Denial-of-service (DoS)
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning.
DevOps-as-a-Service (DaaS)
DevOps as a Service (DaaS) is a model that allows organizations to access DevOps practices and tools without building or maintaining their own infrastructure.
Dynamic infrastructure
Dynamic Infrastructure automatically tracks defects in civil infrastructure assets to provide maintenance alerts, prevent unplanned expenses and maximize annual budgets.

E

Environments
Environments are the target platforms for software and are collections of resources that can be deployed to by pipelines.
Edge Computing
edge computing is the use of DevOps principles and practices to manage, deploy, and develop applications and infrastructure at the edge.
Elastic Kubernetes Service (EKS)
Amazon Elastic Kubernetes Service (EKS) is a managed service and certified Kubernetes conformant to run Kubernetes on AWS and on-premises.
ElasticSearch
Elasticsearch is a search and analytics engine that can be used in DevOps to index and search large amounts of data quickly and efficiently.
Enterprise Application Integration (EAI)
Enterprise application integration (EAI) encompasses the technologies and processes that facilitate the automated exchange of information between enterprise applications.
Endpoint security
Endpoint security is the process of protecting devices like workstations, servers, and other devices (that can accept a security client) from malicious threats and cyberattacks.
Enterprise security
Enterprise security is a set of strategies, policies, technologies, and people that an organization uses to protect its digital assets, employees, and operations from unauthorized access, abuse, or infiltration.
Everything-as-Code (EaC)
Everything as code (EaC) is a software development and IT operations philosophy that uses code to manage and define IT resources.
Event-Driven Architecture
An event-driven architecture uses events to trigger and communicate between decoupled services and is common in modern applications built with microservices. An event is a change in state, or an update, like an item being placed in a shopping cart on an e-commerce website.
Error budget
An error budget is the maximum amount of time a technical system can fail without contractual consequences. Learn why this matters for your team.
Error tracking
Error tracking is the proactive process of monitoring web applications or microservices to identify problems and fix them before they become serious issues. Usually, error tracking reports will monitor your applications for any deviation from benchmark activity levels.

F

Feature Branching
Feature branching is a source code branching pattern where a developer creates a copy of the main codebase and works on a new feature in isolation
FluentD
Fluentd is an open source data collector, which lets you unify the data collection and consumption for a better use and understanding of data.
Fargate
AWS Fargate is a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes (EKS).
Fail Fast
"Fail fast" is a business management concept and philosophy that encourages businesses to test ideas early and often, and learn from mistakes quickly
Functional Testing
Functional testing is a type of testing that seeks to establish whether each application feature works as per the software requirements.
File Inclusion
File inclusion is a technique used in web applications to include external files, such as configuration files, server-side scripts, or other data.
Function-as-a-Service (FaaS)
Function-as-a-Service (FaaS) is a serverless way to execute modular pieces of code on the edge.

G

Google App Engine (GAE)
Google App Engine is mostly used to run Web applications.
GitOps
GitOps is a set of practices that use Git as a source control system to manage infrastructure and application code deployments.
GitHub
GitHub is a platform for hosting code that allows for version control and collaboration.
Gitlab
GitLab is a web-based Git repository that provides free open and private repositories, issue-following capabilities, and wikis.
Git
Git is easy to learn and has a tiny footprint with lightning fast performance.
Governance
Governance is the process of making decisions and implementing them, and the institutions and practices that are involved in this process.
Google Cloud Platform (GCP)
Google Cloud Platform (GCP) is a suite of cloud computing services provided by Google. It offers a wide range of services, including computing power, storage, databases, machine learning, networking, and more, all delivered over the internet.
GitOps Operator
Red Hat OpenShift GitOps is an Operator that uses Argo CD as the declarative GitOps engine. It enables GitOps workflows across multicluster OpenShift and Kubernetes infrastructure.
Gitlab CI
GitLab CI is used to solve for several different use cases, from the most traditional software development workflows (building software, small code changes, testing new features in your local machine for demonstration purposes, etc.)
Gain Privileges
Gaining privileges, also known as privilege escalation, is a cyberattack technique that allows attackers to gain more administrative rights on a system or network.
GitHub Actions
GitHub Actions is a continuous integration and continuous delivery (CI/CD) platform that allows you to automate your build, test, and deployment pipeline.

H

Hyperlink
In computing, a hyperlink, or simply a link, is a digital reference to data that the user can follow or be guided to by clicking or tapping. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks. The text that is linked from is known as anchor text.
Hypervisor
A hypervisor is a software that you can use to run multiple virtual machines on a single physical machine. Every virtual machine has its own operating system and applications. The hypervisor allocates the underlying physical computing resources such as CPU and memory to individual virtual machines as required.
Hybrid Cloud
A hybrid cloud is a mixed computing environment where applications are run using a combination of computing, storage, and services in different environments—public clouds and private clouds, including on-premises data centers or “edge” locations.
Helm Chart
Helm uses a packaging format called charts. A chart is a collection of files that describe a related set of Kubernetes resources. A single chart might be used to deploy something simple, like a memcached pod, or something complex, like a full web app stack with HTTP servers, databases, caches, and so on.
Helm
Helm helps you manage Kubernetes applications, Helm Charts help you define, install, and upgrade even the most complex Kubernetes application.

I

Ingress controller
An Ingress controller abstracts away the complexity of Kubernetes application traffic routing and provides a bridge between Kubernetes services and external ones.
I/O Throughput
I/O throughput is a metric that measures the amount of data a system can process in a given time period.
Instance
An instance in cloud computing is a server resource provided by third-party cloud services.
Image
An image is composed of multiple stacked layers, like layers in a photo editor, each changing something in the environment.
Issue Tracking
Issue tracking is the process of recording customer complaints and problems so that they can be resolved in an organized fashion.
IIS Log Viewer
IIS log viewer tools can help analyze and view log files from IIS servers.
Infrastructure
infrastructure refers to the methods, tools, and procedures that help development and operations teams work together to consistently and effectively produce software.
Infrastructure Resilience
Infrastructure resilience is the ability of infrastructure to withstand and recover from disruptions, such as disasters, extreme weather, or socioeconomic challenges.
Infrastructure-as-a-Code (IaaC)
Infrastructure as code (IaC) is the ability to provision and support your computing infrastructure using code instead of manual processes and settings.
Infrastructure-as-a-Service (IaaS)
Infrastructure as a Service (IaaS) is a business model that delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet. You can use IaaS to request and configure the resources you require to run your applications and IT systems.
Internal developer platform (IDP)
An Internal Developer Platform (IDP) is built by a platform team to build golden paths and enable developer self-service. An IDP consists of many different techs and tools, glued together in a way that lowers cognitive load on developers without abstracting away context and underlying technologies.
Istio
Istio is an open source service mesh that helps organizations run distributed, microservices-based apps anywhere. Why use Istio? Istio enables organizations to secure, connect, and monitor microservices, so they can modernize their enterprise apps more swiftly and securely.
Internet Information Services (IIS)
Internet Information Services (IIS) is a Microsoft web server that can be used with Azure DevOps to deploy web applications to an on-premises IIS server.
IT infrastructure
IT infrastructure is the foundation for a company's technology resources and applications.
Infrastructure Monitoring
Infrastructure monitoring is the process of collecting, analyzing, and tracking data about an IT infrastructure's health and performance.
Incident response
Incident response (sometimes called cybersecurity incident response) refers to an organization's processes and technologies for detecting and responding to cyberthreats, security breaches or cyberattacks. A formal incident response plan enables cybersecurity teams to limit or prevent damage.
Information Technology Service Intelligence (ITSI)
Information Technology Service Intelligence (ITSI) is a new type of software tool that uses artificial intelligence and machine learning to help IT managers monitor increasingly complex computing environments.
IT operations management (ITOM)
IT operations management (ITOM) is responsible for managing information technology requirements within an organization, overseeing the provisioning, capacity, performance, and availability of IT infrastructure and resources.
IT operations (ITOps)
IT operations, or ITOps, is the management and maintenance of an organization's IT infrastructure and services. ITOps is a core function of the IT department, and is responsible for ensuring that IT systems are running efficiently, securely, and reliably.
Infrastructure Metrics
Metrics are numeric samples of data collected over time. Infrastructure metrics can measure the performance of various IT infrastructure components, such as the operating system, disk activity, servers or virtual machines.
Information Security Management (ISM)
Information security management (ISM) is the process of protecting an organization's data and assets from potential threats.
Indicators of Compromise (IoC)
Indicators of Compromise (IoCs) are markers in digital data that indicate when a hacker has breached a network or system.

J

Jenkins Job
A Jenkins job is an automated process created by a Jenkins user. Jenkins jobs can support continuous integration workflows and can be created using a variety of build tasks.
Jenkins Pipeline
Jenkins Pipeline (or simply "Pipeline") is a suite of plugins which supports implementing and integrating continuous delivery pipelines into Jenkins.
Jenkins
Jenkins an open source automation server which enables developers around the world to reliably build, test, and deploy their software.

K

Kubernetes Monitoring
Kubernetes monitoring involves tracking the health, performance, and resource usage of Kubernetes clusters and their components (pods, nodes, etc.). It typically includes gathering metrics, logs, and events to detect issues, optimize performance, and ensure the cluster runs smoothly.
Kubernetes Observability
Kubernetes observability is the practice of gaining insights into the internal state of a Kubernetes cluster by collecting and analyzing metrics, logs, and traces. It helps identify and troubleshoot issues, optimize performance, and maintain the health of applications and infrastructure.
Kibana
Kibana is a data visualization and exploration tool used for log and time-series analytics, application monitoring, and operational intelligence use cases.

L

Lead Time
Lead time is the time between the start and completion of a process or project.
Load balancer
A load balancer is a device that distributes traffic across multiple servers to improve the availability and scalability of an application.
Log4Shell vulnerability
Log4Shell, also known as CVE-2021-44228, is a software vulnerability in the Apache Log4j 2 Java library that allowed remote attackers to take control of devices.
Log Aggregation
Log aggregation is a software function that collects and organizes log data from various sources into a single location for analysis, monitoring, and management.
Log Rotation
Log rotation is an automated process that manages log files by moving, renaming, compressing, or deleting them when they reach a certain size or age.
Log File
A log file is a computer-generated file that records information about a system's activities, operations, and usage patterns.
Log Analysis
Log analysis is the process of reviewing and interpreting log files to understand the behavior, performance, and security of a system.
Log Levels
Log levels are a way to prioritize and filter logging information based on the needs of a system or organization.
Log Management
Log management is the process of collecting, storing, analyzing, and disposing of log data to provide insights for troubleshooting, performance enhancement, or security monitoring.
Log Management Policy
A log management policy is a set of guidelines and processes that govern how an organization generates, collects, stores, analyzes, and reports log data.
Log Management Process
Log management is a continuous process of centrally collecting, parsing, storing, analyzing, and disposing of data to provide actionable insights for supporting troubleshooting, performance enhancement, or security monitoring.

M

Managed Detection and Response (MDR)
Managed detection and response (MDR) is a cybersecurity service that helps organizations protect themselves from cyberthreats
Model-Based Testing
Model-based testing is a systematic method to generate test cases from models of system requirements.
Machine Learning (ML)
Machine learning (ML) is a type of artificial intelligence (AI) that allows computers to learn and improve from data without being explicitly programmed.
Mean Time Between Failures (MTBF)
Mean Time Between Failures (MTBF) is a key performance indicator (KPI) that measures the average time between repairable failures of a system or product.
Mean Time to Recovery (MTTR)
Mean Time to Recovery (MTTR) is a key DevOps metric that measures how long it takes to recover from a system failure or outage.
Mean Time to Identify (MTTI)
Mean time to identify (MTTI) is a key performance indicator, or metric, for incident response and cyber security. It represents the average time it takes for an organization to identify that a security incident or breach has occurred.
Multi-Cloud Strategy
Microservices describes the architectural process of building a distributed application from separately deployable services that perform specific business functions and communicate over web interfaces.
MLOps
Machine learning operations (MLOps) is a set of practices that help manage the machine learning (ML) lifecycle. MLOps aims to ensure that ML models are developed, tested, and deployed in a reliable and consistent way.
Mutable and immutable infrastructure
Mutable Infrastructure is the ability to change or mutate into something new. Immutable infrastructure is a model in which no upgrades, security patches, or configuration changes are made in place on production workloads.
Monolithic Architecture
monolithic architecture, in which the entire program is constructed as a single, indivisible unit. Every component of the program, including the data access layer, business logic, and user interface, is deployed and integrated tightly together in this design.
Microservices Architecture
A microservices architecture results in an application designed as a set of small, independent services. Each one represents a business capability in itself. The services loosely couple with one another and communicate over the network, typically making use of lightweight protocols such as HTTP or messaging queues.
MITRE ATT&CK
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive matrix of tactics and techniques used by cyber adversaries. It is used for threat modeling and security defense to better understand security risks associated with specific threats and to improve detection and prevention strategies.
Managed security information and event management (SIEM)
Managed security information and event management (SIEM) is a service provided by external cybersecurity organizations that involves the centralized monitoring, analysis, and management of security events and incidents within a client’s IT infrastructure.

N

Non-Functional Testing
Non-functional testing is a type of software testing that evaluates how a system operates, rather than what it does. It assesses non-functional aspects of the software, such as its performance, stability, usability, and security.
Node
A physical or virtual machine that hosts multiple pods, providing the necessary resources for running the applications. Nodes play a crucial role in enabling DevOps practices within Kubernetes.
Node Pool
A node pool is a group of nodes with the same configuration that run applications in a cluster.
NIST SIEM Requirements and Standards
The National Institute of Standards and Technology (NIST) produces guidance on security information and event management (SIEM). These are standards for dealing with data and systems breaches for which log data can be leveraged to gather more information.
Node logging
Node logging provides engineers and developers with a system that allows them to manage and control what text gets logged and is sent. Node logging helps debug by saving information about an application and giving developers the insight to identify the causes of various incidents and errors.
NoOps
NoOps (no operations) is a software development and deployment concept that aims to automate IT environments so that they don't require a dedicated team to manage software. The goal is to reduce or eliminate the need for manual intervention and human error.

O

OpenStack
An open source platform for building on-prem cloud infrastructures.
OpenShift
Enterprise-grade container management platform for Kubernetes running on on-prem cloud infrastructures, developed by Red Hat.
Operational Intelligence
Operational intelligence (OI) is a data analytics process that involves collecting and analyzing real-time data to help improve performance and user experience.
Open Source
A set of modern IT practices which seek to more closely bring together software developers and operations staff to work on the same project in a more collaborative manner.
OpenTelemetry
OpenTelemetry (OTel) is an open source framework that helps DevOps professionals and IT teams collect and analyze telemetry data to improve the performance, reliability, and security of applications.
Observability
Observability is the process of collecting, analyzing, and using data to understand how a software application is performing and behaving in real time. It's a key technique for optimizing multilayer architectures and identifying and fixing bugs.
Open Integration Framework (OIF)
The Open Integration Framework (OIF) is an integration framework that helps organizations connect security tools to streamline security remediation workflows. It is built on the Open Connector Framework (OCF) and offers interfaces for the integration connector and the associated connector provider.
Out-of-the-Box
Tools that provide a set of functionalities that works immediately after installation with hardly any configuration or modification needs. When applied to the software delivery, a one-stop shop solution allows quick setup of a deployment pipeline.
Orchestration
A practice of automating the IT tasks (container management and infrastructure configuration in particular) in the context of SOA, virtualization, environment provisioning. In short, it is a process of executing predefined tasks using predefined scripts executed with interactive tools like Terraform (which was built specifically for configuration orchestration purposes).

P

Platform Engineering
Platform engineering is a practice that builds on DevOps principles to improve developer experiences and productivity.
Pods
Pods are the smallest deployable units of computing that you can create and manage in Kubernetes.
Pair Programming
Pair programming is a software development technique where two developers work together on a single project using one computer.
Platform-as-a-Service (PaaS)
Platform-as-a-Service (PaaS) is a cloud infrastructure layer that provides resources for building applications and tools for users.
Production
Production is the environment that handles traffic from customers and end users.
Private Cloud
A private cloud is a cloud computing environment that's dedicated to a single organization, and can be used in DevOps to maximize agility. It's also known as an internal or corporate cloud.
Public Cloud
A public cloud is a type of computing that can be a good fit for DevOps because it provides resources that are shared, accessible, and scalable.
Product Owner (PO)
The Product Owner (PO) is the Agile team member primarily responsible for maximizing the value delivered by the team by ensuring that the team backlog is aligned with customer and stakeholder needs.
Pivotal Cloud Foundry (PCF)
Pivotal Cloud Foundry (PCF) is a cloud-native platform that can help with DevOps by simplifying the development, deployment, and scaling of applications.
Provisioning
Provisioning is the process of creating and setting up IT infrastructure, and includes the steps required to manage user and system access to various resources. Provisioning is an early stage in the deployment of servers, applications, network components, storage, edge devices, and more.
PCI DSS
PCI DSS (Payment Card Industry Data Security Standard) 4.0 is a set of rules and guidelines designed to help organizations that handle credit card information keep that information safe and secure. These guidelines are essential to protect against data breaches and credit card fraud.
Pen testing
Enetration testing, AKA “pen test” is an authorized attempt by an individual or a team to exploit the existing vulnerabilities in an organization's technical infrastructure and all components to determine whether unauthorized access or malicious activity is possible or not.
Predictive analytics
Predictive analytics can help DevOps teams improve their workflow efficiency, reliability, and quality.
Playbook
A method for enhancing process efficiency in the DevOps Capable Resource (formation) and the DevOps Capable Team (formation). It involves writing scripts to provision new service account identities and automating application and environment promotion using pipelines.

Q

N/A

R

Regression Testing
A process that verifies that recent software changes do not negatively impact existing functionality.
Release Management
A process that involves planning, scheduling, and controlling the release of software applications or updates.
Root Cause Analysis (RCA)
Root cause analysis (RCA) is a systematic process that helps DevOps teams identify the underlying causes of a problem or incident.
Rollback
A rollback is the process of reverting a server or web application to a previous state, usually before an update or change was applied. Rollbacks can be performed manually or automatically, depending on the severity of the problem and the DevOps pipeline.
Real-time big data analytics
Real-time big data analytics is a tool that analyzes large amounts of data as it's created or stored in an IT infrastructure. It's used to discover patterns and trends in data to help with decision-making.
Real-time dashboard
A real-time dashboard is a type of graphical user interface that provides simplified, easy-to-review visualizations of key metrics or performance indicators concerning a business objective, function or process in real time.
Real user monitoring (RUM)
Real user monitoring (RUM) is a tool that helps DevOps teams and businesses understand how users interact with their websites, applications, and mobile apps. It's a key part of application performance monitoring (APM) and digital experience monitoring (DEM).
Role-Based Access Control (RBAC)
Role-based access control (RBAC) is a method for managing user access to systems, networks, or resources in DevOps by assigning roles to users instead of giving them direct permissions. Each role has a set of permissions that allows users to access only what they need for their job. This helps prevent issues like insider threats.

S

Security Analytics
Security analytics is the combination of tools used to identify, protect, and troubleshoot security events that threaten your IT system using real-time and historical data.
SecOps
SecOps (Security Operations) is a set of practices that combines security and IT operations to identify, prevent, detect, and respond to security threats in real-time.
Shadow CD
Shadow CD is where teams create custom solutions for Continuous Delivery processes. Unfortunately, The solutions cost more time in support, training, or maintenance than using a purpose-made tool.
Shadow IT
Shadow IT is when people outside of IT use or install tools that their IT department should oversee. Shadow IT reduces resource transparency and control and adds risk to organizations.
Serverless Computing
Serverless computing is a cloud service model that allows developers to build and run applications without managing servers or infrastructure.
Serverless Monitoring
Serverless computing is a cloud native computing model in which the cloud provider runs the server, and dynamically manages the allocation of machine resources.
Serverless Framework
A serverless framework is a set of services that enables DevOps teams to build and write code without needing to manage the underlying infrastructure required for application development.
Site reliability engineering (SRE)
Site reliability engineering (SRE) is a software engineering discipline that uses software tools to improve the reliability and performance of software systems.
Snapshot
A snapshot is a collection of specific versions of components and processes. Typically, a snapshot represents a set of component versions that are known to work together. In most cases, snapshots include all of the components in an application.
S3
Amazon Simple Storage Service (S3) is a cloud object storage service that DevOps teams use to store and manage data, including application artifacts, backups, and logs
Self-Service Deployment
Self-service deployment refers to situations where deployment is not fully automated. A single manual command can take push code from staging to production.
Sprint
A sprint is a short period of time in DevOps when a team works to complete a set of tasks.
Standard operating procedures (SOPs)
Standard operating procedures (SOPs) are a set of step-by-step instructions that can help ensure consistency and clarity in how tasks are completed.
Structured logging
A method of using a consistent format for application logs to make them easier to search and analyze. This allows for more efficient filtering, aggregation, and searching of log data
Shift-Left
Shift-left is the practice of testing earlier in the software delivery process. Rather than deferring thorny issues to an unknown later date, testers can improve quality by catching errors before they snowball or become critical.
Source Control
Source control (or version control) is a system that records changes to a file or set of files over time so that previous versions can be accessed and recalled later. It is useful for rollbacks and disaster recovery, among other things.
Software Development Life Cycle (SDLC)
Software development life cycle (SDLC) is a structured process that is used to design, develop, and test good-quality software. SDLC, or software development life cycle, is a methodology that defines the entire procedure of software development step-by-step.

T

Tenants
Tenant is a logical entity that can refer to a Microsoft Entra ID entity or a group of devices.
Terraform
Terraform is an open-source tool that allows users to configure and deploy cloud infrastructure.
Terraform Cloud
Terraform Cloud is a hosted service that helps teams manage Terraform, an open-source Infrastructure as Code (IaC) tool.
Technical Debt
Technical debt, also known as design debt or code debt, is the cost of choosing speed over quality in software development.
Test Automation
Test automation is the use of software tools and scripts to automatically run tests on software to ensure it meets quality standards.
Test Environment
A test environment is a dedicated space where software is tested for quality and functionality before it's released to the public.
Tactics techniques and procedures (TTPs)
TTPs stands for tactics, techniques, and procedures. It's a term used by cybersecurity professionals to describe the actions, strategies, processes, and behaviors used by threat actors to develop threats and cyberattack.
Technology stack
A technology stack, also known as a solutions stack, is a collection of software and hardware systems that are used to develop and run a website, mobile application, or web integration
Testing-as-a-Service (TaaS)
Testing as a Service (TaaS) is a cloud-based model that allows companies to outsource testing services to a third-party provider. TaaS can help organizations develop, test, and release software faster and more reliably.
Threat detection and response (TDR)
Threat detection and response is a cybersecurity process for identifying cyberthreats to an organization's digital assets and taking steps to mitigate them as quickly as possible.
Threat hunting
Threat hunting is a proactive cybersecurity technique that involves searching for signs of malicious activity in a network or organization.
Threat intelligence
Threat Intelligence is evidence-based information about cyber attacks that cyber security experts organize and analyze. This information may include: Mechanisms of an attack. How to identify that an attack is happening. Ways different types of attacks might affect the business.
Telemetry
Telemetry automatically collects, transmits and measures data from remote sources, using sensors and other devices to collect data.
Tool sprawl
Tool sprawl happens when a company accesses an unnecessarily high number of IT tools that individually address different use cases. With tool sprawl, each tool potentially creates a data silo, which often requires manual data translation between utilities, causing bottlenecks and other barriers to development.

U

UEBA
User and entity behavior analytics (UEBA) is a cybersecurity tool that uses machine learning to identify and respond to anomalous behavior on a network.
Unit Testing
Unit testing is a software testing process in which each components or unit of software are tested individually.
User Acceptance Testing (UAT)
User Acceptance Testing (UAT) is a software development phase where real users test the software in a real-world environment to ensure it meets their needs.

V

Version control
Version control, also known as source control, is a software engineering practice that tracks and manages changes to computer files.
Virtual machine
A virtual machine (VM) is a software-based computer that emulates a physical computer and allows users to run multiple operating systems on a single device.
Virtual Private Cloud (VPC peering)
VPC peering is a networking connection between two Virtual Private Clouds (VPCs) that allows them to communicate with each other using private IP addresses. This enables resources in different VPCs to securely exchange traffic as if they were in the same network.
Virtual Private Cloud (VPC)
A Virtual Private Cloud (VPC) is a public cloud service that allows businesses to create a private, secure network within a shared public cloud infrastructure.
Vault
White box testing is a form of application testing that provides the tester with complete knowledge of the application being tested, including access to source code and design documents.
verbose
Verbose mode provides detailed insights into startup processes, including loaded drivers and software, thus helping troubleshoot hardware or software issues. In software, verbose mode produces in-depth and technical output, beneficial for debugging and understanding system operations.
Value Stream Mapping
Value stream mapping (sometimes called VSM) is a lean manufacturing technique to analyze, design, and manage the flow of materials and information required to bring a product to a customer.
Value Stream Management
Value stream management is a set of practices that improve the way teams deliver high-quality customer experiences. VSM focuses on two things – how quickly customer-requested features or updates are delivered and whether the customer realizes the value from those changes.

W

Web Application Development
Web application development is the process of creating software applications that run on web servers and are accessed through web browsers.
Waterfall
The Waterfall model is a traditional software development methodology that can be used in DevOps projects
White Box Testing
White box testing is a form of application testing that provides the tester with complete knowledge of the application being tested, including access to source code and design documents.

X

Extended Detection and Response (XDR)
Extended Detection and Response, is a cybersecurity solution that unifies threat data from multiple security tools and layers to improve threat detection and response times.

Y

N/A

Z

Zabbix
Zabbix is an enterprise-class, open-source monitoring solution that makes network and application monitoring simple.