Sign up for a live Kubernetes or DevSecOps demo

Click here

DevOps Glossary

A

Active Directory

Active Directory is a specialized software tool that was developed by Microsoft to make it easier for the administrators to manage and deploy system changes.

Application Security

Application security is a catch-all term that encompasses any security measures deployed at the application level of an organization's technology stack.

Attack Vector

An attack vector is a method or pathway used by a hacker to access or penetrate the target system. Attack vectors can be former employees or even hackers.

AWS Monitoring

Prioritizing security means investing in an AWS monitoring solution that complements existing AWS security tools and enables business best practices.

AIOps (Artificial Intelligence Operations)

AIOps (artificial intelligence for IT operations) is the use of artificial intelligence, machine learning, and pattern recognition to perform and automate tasks.

Application Containerization

Application containerization is a rapidly developing technology that is changing the way developers test and run application instances in the cloud.

Application Performance Monitoring (APM)

APM (Application Performance Monitoring) tools capture data, and aggregate and analyze the data to detect patterns and present actionable insights in a human-readable format.

API Management

API (Application Program Interface) management includes the entire process of creating and publishing an API for your application.

Application Program Interface (API)

API is a specified communication protocol that allows two applications to interface with each other, or for a client application to access information within another application.

Application Whitelisting

Application whitelisting is a common method used by IT organizations to secure on-premise and cloud-based networks and infrastructure against malicious cyber attacks and unwanted network penetration.

Authentication Factor

An authentication factor is a security credential that is used to verify the identity and authorization of a user attempting to gain access or request data from a secured network.

Application Lifecycle Management

Application lifecycle management (ALM) encompasses all aspects of the application lifecycle from gathering initial requirements through to service and maintenance.

Agile Methodology

Agile methodology is a set of techniques, values, and principles designed to guide how software development teams work together to deliver new applications and updates.

Application Infrastructure

Application infrastructure includes all of the components that are necessary to manage the development, deployment and management of enterprise applications.

Application Migration

Application migration describes the process of moving an application, along with its associated data and host servers, from one environment into another.

B

Business Analytics

Business analytics makes use of mathematics, statistics, predictive modeling, and other investigative tools to discover and interpret patterns in data.

Business Intelligence

Business intelligence (BI) describes the set of processes that business use to analyze operational data and create actionable insights that drive effective business decision-making.

Blue-Green Deployment

Blue/green deployment is a methodology for releasing new code into the production environment whose purpose is to reduce software downtime.

Business Technology (BT)

Business technology can be simply defined as any application of information technology that is integrated into the operation of a business.

C

CaaS

Containers-as-a-service (CaaS) is a category of cloud services where the service provider offers customers the ability to manage and deploy containerized application and clusters.

CASB

A Cloud Access Security Broker (CASB) is a software application that mediates user access to cloud-based application. CASB tools can be hosted on-premises or in the cloud.

Cloud Application

A cloud application simply refers to any software application that is deployed in a cloud environment rather than being hosted on a local server or machine.

Cloud Computing

Cloud computing is the delivery of computer system resources, including applications, virtual machines, containers, data storage and processing power over the internet.

Cloud Computing Security

Cloud computing security refers to the technical discipline and processes that IT organizations use to secure their cloud-based infrastructure.

Cloud Management

Cloud management is the process of maintaining oversight and administrative control of cloud computing products and services.

Container

A container is a virtualized environment whose contents are an application and all of the files, libraries, binaries and dependencies needed to execute that application.

Continuous Deployment

Continuous deployment (CD) is a strategy where any new code change is deployed directly into the live production environment where it will be visible to customers.

Continuous Integration

Continuous integration is a software engineering practice where all developers merge their working copies into a shared mainline several times a day.

Cyber Security

Cyber security refers to the set of processes, policies and techniques that work together to secure and organization against digital attacks.

Cloud Automation

Cloud automation is the practice of using specialized software and methodologies to automate the manual tasks associated with managing cloud-based IT infrastructure.

Cloud Orchestration

Cloud orchestration is designed to help IT organizations manage interconnections and interactions between disparate systems in increasingly complex cloud environments.

CRUD

CRUD is an acronym that refers to the four functions that are considered necessary to implement a persistent storage application: create, read, update and delete.

Cloud Infrastructure

Cloud infrastructure consists of all hardware and software components that are needed to support the delivery of cloud services to the customer.

Continuous Monitoring

Continuous monitoring is a technology and process that IT organizations may implement to enable rapid detection of compliance issues and security risks within the IT infrastructure.

CDN (Content Delivery Network)

A content delivery network (CDN) is an important tool for optimizing the performance of heavily-trafficked websites and applications that are deployed in cloud environments.

D

DevOps

DevOps is a collection of best practices for the software development process to shorten the development life cycle such as continuous integration, delivery and deployment.

Docker Swarm

Docker swarm is a container orchestration tool, meaning that it allows the user to manage multiple containers deployed across multiple host machines.

Database Management

Database management is the process of defining, manipulating, retrieving and otherwise managing data that exists in a database.

Data Security

Data security is the set of policies, processes, procedures, and tools that prevent unauthorized access to their networks, servers, and data storage.

E

Endpoint Security

Endpoint security refers to an organization's overall approach to managing the security of network endpoint devices that remotely access the IT infrastructure.

Enterprise Application Integration (EAI)

Enterprise Application Integration (EAI) is the implementation of technologies that facilitate communication between enterprise applications.

Encapsulation

Encapsulation is a mechanism of restricting direct access to some components of an object, so users cannot access state values for all of the variables of a particular object.

F

Function as a Service (FaaS)

Functions-as-a-Service (FaaS) is a cloud computing model on serverless technologies and architectures that allow software developers to easily deploy applications in the cloud.

H

Hadoop Architecture

Hadoop Architecture was designed to allow many data storage devices to work in parallel instead of one large one, making it one of the most popular data processing platforms.

Hybrid Cloud

Hybrid cloud is a specific deployment model for cloud service delivery that combines private, on-premise cloud infrastructure and services with public cloud services.

I

Incident Response

Incident Response is a documented, formalized set of policies and procedures for managing cyber attacks, security breaches and other types of IT or security incidents.

Indicators of Compromise

Indicators of Compromise (IoC) is evidence which suggests that a data breach may have occurred and that further investigation of the incident response plan is necessary.

Information Security

Information security can be defined as the implementation and management of the set of tools and processes whose goal is to preserve security in the business.

Information Security Management

Information security management describes the set of policies and procedural controls that organizations implement to secure their informational assets against threats.

Infrastructure as Code

Infrastructure as Code (IaC) refers to the increasingly common practice of provisioning and managing IT infrastructure using coding.

Infrastructure as a Service

Infrastructure-as-a-Service (IaaS) is a delivery model for cloud services where customers purchase access to managed IT infrastructure from a cloud services provider.

IT Infrastructure

IT infrastructure includes all of the hardware, software, and network resources that are necessary to deliver IT services within the organization.

IT Infrastructure Management

IT infrastructure consists of physical components that support the activities and services that are required by users to support business functions.

IT Operations

IT Operations refers to the set of processes and services that are administered by an IT department within a larger organization or business.

ITOM

IT operations management (ITOM) refers to the administration of all technology components and application requirements within an organization.

ITSI

Information Technology Service Intelligence (ITSI) is a software tool that uses artificial intelligence and machine learning to helps monitor complex computing environments.

Infrastructure Management (IM)

Infrastructure management includes the management of processes, equipment, data, human resources and external contacts needed to ensure that operations run smoothly and efficiently.

Infrastructure Monitoring

IT infrastructure monitoring is a business process of collecting and analyzing data from the IT infrastructure and to leverage that data to improve business results.

IIS Server

The Windows Internet Information Services (IIS) Server is an extensible web server that was created by Microsoft to be used on Windows operating systems.

IIS Log Viewer

An IIS Log Viewer is a software application whose function is to streamline the process of viewing log files from an IIS web server.

L

Log Analysis

Log analysis is the process of reviewing, interpreting and understand computer-generated records called logs.

Log File

A log file is a computer-generated data file that contains information about usage patterns, activities, and operations within a system, application, server or device.

Log Aggregation

Log aggregation is a software function that consolidates log data from throughout the IT infrastructure into a single centralized platform where it can be reviewed and analyzed.

Log Levels

Log levels are a fundamental tool for tracking and analyzing events that take place throughout your IT infrastructure and cloud-based computing environments.

Load Balancer

When an organization allocates more than one server to handle requests for a website or business application, a load balancer is used to distribute requests between them.

M

Machine Data

Machine data is digital information that is automatically created by the activities and operations of networked devices, including computers, phones, and more.

Machine Learning

Machine learning is a programming technique used to automate the construction of analytical models and enable applications to perform specified tasks more efficiently.

Managed Detection and Response

Managed Detection and Response (MDR) is an outsourced security service that helps organizations detect malicious network activity and quickly respond to eliminate the threat.

Managed SIEM

Managed SIEM is an alternative to on-premise deployment, setup and monitoring of a SIEM software solution hosted by a third-party service provider.

Microservices

Microservices are an important innovation in application development and deployment.

O

Operational Intelligence

Operational Intelligence is the application of data analysis techniques to data that is generated or collected in real-time through an organization's IT infrastructure.

Observability

Observability of a system is defined as if the system's current state can be determined in a finite time period using only the outputs of the system.

P

PaaS

Platform-as-a-service (PaaS) is a model of cloud service delivery where a cloud service provider delivers some hardware and software tools to customers over the internet.

Pivotal Cloud Foundry (PCF)

Pivotal Cloud Foundry (PCF) is a distribution of the open-source Cloud Foundry platform that includes additional features that expand the capabilities of Cloud Foundry.

Private Cloud

A private cloud is a deployment model for cloud services where the cloud environment and infrastructure is dedicated to providing services for a single organization.

Predictive Analytics

Predictive analytics is a set of methods and technologies that can be used to analyze current and historical data with the goal of making predictions about future events.

Polymorphism

Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.

R

Real-Time Big Data Analytics

Real-time big data analytics is a software feature or tool capable of analyzing large volumes of incoming data at the moment that it is stored or created with the IT infrastructure.

Root Cause Analysis

Root cause analysis (RCA) is a method of problem solving used to investigate known problems and identify their antecedent and underlying causes.

Real-Time Dashboard

Real-time dashboards are being used to display data in real-time, providing the most up-to-date information on a variety of performance metrics.

Role Based Access Control

Role Based Access Control (RBAC) is a critical capability for organizations that deploy applications into the cloud. Gain complete visibility with Sumo Logic today!

S

SaaS

Software-as-a-service (SaaS) is a model of software distribution where customers pay a fee and the application becomes available over the internet.

Security Intelligence

Security Intelligence describes the practice of collecting, standardizing and analyzing data that is generated by networks, applications, and other IT infrastructure in real-time.

SIEM

SIEM (security information and event management) is an approach in cybersecurity that combines SIM and SEM.

SIEM vs Log Management

SIEM and Log Management are two examples of software tools that allow IT organizations to monitor their security posture using log files, detect and respond to IoCs.

Server Monitoring

The primary objective of server monitoring is always to protect the server from possible failure that would interrupt service availability.

Serverless

Serverless computing is an execution model for cloud computing services where servers are not accessible to the developers running the code.

Software Deployment

Software deployment includes all of the steps, processes, and activities that are required to make a software system or update available to its intended users.

Software Life Cycle

The software life cycle, or software development life cycle (SDLC), can be summarized as a set of activities and processes that are required to develop a new application.

Scrum

In software development, Scrum is a project management framework or methodology that is used to efficiently produce quality work while adapting quickly to change.

Structured Logging

Structured logging is the practice of implementing a consistent, predetermined message format for application logs that allows them to be treated as data sets rather than text.

Software Stack

A software stack refers to the set of components that work together to support the execution of the application, which power back-end and front-end processes, as well as interfaces.

SecOps

SecOps is a methodology that IT managers implement to enhance the connection, collaboration, and communication between IT security and IT operations teams.

T

Threat Intelligence

Threat Intelligence refers to the practice of collecting data, information and knowledge that keep an organization informed about potential cyber security threats.

Technology Stack

A technology stack includes all of the hardware and software systems that are needed to develop and run a single website, web app or mobile application.

Testing as a Service (TaaS)

Testing-as-a-Service (TaaS) represents a new avenue for outsourcing many types of testing that are demanded in today's IT environment.

Threat Detection and Response (TDR)

Threat detection and response is the most important aspect of cybersecurity for IT organizations that depend on cloud infrastructure.

V

Virtual Private Cloud (VPC)

Virtual private cloud (VPC) represents a unique delivery model for private cloud services that allow an organization to establish a virtual network under their control.

W

Web Application Development

Web application development describes the process of designing, building, testing and deploying web-based applications delivered to users or customers via the internet.