The software that creates and runs virtual machines
Hypervisor
Development practice that requires developers to integrate code into a shared repository several times a day.
Continuous Integration
A method for improving a service availability by adding more instances of that service.
Horizontal Scaling
A trusted third party, that generates and gives out SSL certificates.
Certificate Authority
A situation where the cost/effort of switching to a different cloud provider is so high, that you are stuck with your original provider.
Vendor Lock-in
What technology allows microservices to run independently with their own filesystem, libraries, and processes?
Containers
Records used to determine the sequence of events that caused an issue in the service.
Logs
Architectural style that structures an application as a collection of small autonomous services.
Microservices
A security protocol for accessing remote servers that has the same name as the client-server application used to execute this protocol.
SSH
A server that receives client requests and distributes them across backend server capable of satisfying such requests?
Load Balancer
A container orchestration system that uses pods to host containers.
Kubernetes
The step of the deployment pipeline when performance tests are executed
Staging
A deployment strategy that does not cause service interruption and requires minimal additional resources.
Rolling Update
An algorithm for generating a secret shared cryptographic key over a public channel.
Diffie-Hellman algorithm
A method for dynamically adding new service instances based on current utilization parameters.
Autoscaling
A way to map multiple local private addresses to a public one before transferring the information.
Network Address Translation (NAT)
A property of a service that ensures that old clients continue to work with new versions of this service.
Backward compatibility
The practice of establishing and maintaining consistent settings across all service instances.
Configuration Management
A protocol for encrypting Internet traffic and verifying server identity.
TLS
A practice of programmatically defining virtual machines and networking used in your system.
Infrastructure as Code
The FROM line of the Dockerfile defines this
Base image
A step of the integration environment that creates images and executable binaries of the service.
Build
A technique that reduces downtime and risk by running two production environments. Only one environment is live at any one time.
Blue/Green deployment
A feature of a security protocol the prevents attackers from decrypting future communication, even if the attacker presently obtained the secrete key used for communication between two parties.
Forward Security
A method of providing backend services on an as-used basis.
Serverless Computing