Cloud and Infrastructure Glossary
Key terms from the Cloud and Infrastructure course, linked to the lesson that introduces each one.
8,084 terms.
#
- `apiVersion`
- Specifies the API version Azure should use.
- Lesson 895 — Resource Declarations in ARM TemplatesLesson 1535 — Chart.yaml Metadata
- `create`
- Quick experiments, learning, one-time tasks
- Lesson 1135 — Creating Resources with kubectl create and applyLesson 1379 — Common RBAC Verbs
- `data`
- field holds key-value pairs where values are UTF-8 strings.
- Lesson 1249 — ConfigMap YAML ManifestsLesson 1263 — Declarative Secret Manifests
- `delete`
- Remove a single resource
- Lesson 1379 — Common RBAC VerbsLesson 2264 — Vault Policies and Access Control
- `env` context
- Accesses environment variables defined in your workflow or job:
- Lesson 1692 — Context and Expression SyntaxLesson 1707 — Contexts: Accessing Runtime Information
- `github` context
- Contains workflow run metadata like repository name, branch, commit SHA, and triggering event:
- Lesson 1692 — Context and Expression SyntaxLesson 1707 — Contexts: Accessing Runtime Information
- `labels`
- Key-value pairs you attach for organization, selection, and grouping.
- Lesson 1121 — API Object MetadataLesson 1956 — Prometheus Configuration Basics
- `list`
- Retrieve all resources of a type (like viewing all Pods in a namespace)
- Lesson 1379 — Common RBAC VerbsLesson 2264 — Vault Policies and Access Control
- `name`
- The unique identifier for your resource within its scope.
- Lesson 895 — Resource Declarations in ARM TemplatesLesson 948 — Resource Definition BasicsLesson 1121 — API Object MetadataLesson 1535 — Chart.yaml Metadata
- `Never`
- Kubernetes never restarts the container, regardless of how it exits.
- Lesson 1154 — Pod Restart PoliciesLesson 1193 — Job Restart and Backoff Policies
- `no-cache`
- – Must revalidate with origin before serving (doesn't mean "don't cache")
- Lesson 596 — TTL and Cache Control HeadersLesson 2672 — Cache-Control Headers Deep Dive
- `no-store`
- – Don't cache this at all (sensitive data)
- Lesson 596 — TTL and Cache Control HeadersLesson 2672 — Cache-Control Headers Deep Dive
- `OnFailure`
- Kubernetes only restarts the container if it exits with an error (non-zero exit code).
- Lesson 1154 — Pod Restart PoliciesLesson 1193 — Job Restart and Backoff Policies
- `ports`
- Map container ports to host ports for external access
- Lesson 1049 — Defining Services in ComposeLesson 1054 — Port Mapping and Exposure
- `post-delete`
- Runs after deletion finishes
- Lesson 1547 — Chart Hooks and LifecycleLesson 1550 — Helm Hooks for Lifecycle Management
- `post-install`
- Runs after all resources are installed
- Lesson 1547 — Chart Hooks and LifecycleLesson 1550 — Helm Hooks for Lifecycle Management
- `post-upgrade`
- Runs after an upgrade completes
- Lesson 1547 — Chart Hooks and LifecycleLesson 1550 — Helm Hooks for Lifecycle Management
- `pre-delete`
- Runs before resources are deleted
- Lesson 1547 — Chart Hooks and LifecycleLesson 1550 — Helm Hooks for Lifecycle Management
- `pre-install`
- Runs before any resources are installed
- Lesson 1547 — Chart Hooks and LifecycleLesson 1550 — Helm Hooks for Lifecycle Management
- `pre-upgrade`
- Runs before an upgrade begins
- Lesson 1547 — Chart Hooks and LifecycleLesson 1550 — Helm Hooks for Lifecycle Management
- `properties`
- The configuration details specific to your resource type.
- Lesson 895 — Resource Declarations in ARM TemplatesLesson 948 — Resource Definition Basics
- `secrets` context
- Safely retrieves encrypted secrets stored in your repository settings:
- Lesson 1692 — Context and Expression SyntaxLesson 1707 — Contexts: Accessing Runtime Information
- `type`
- Specifies what kind of data this variable accepts (like `string`, `number`, `bool`, `list`, or `map`).
- Lesson 755 — Variable Declaration SyntaxLesson 895 — Resource Declarations in ARM TemplatesLesson 948 — Resource Definition Basics
- 1-2 minutes
- under normal conditions.
- Lesson 416 — Multi-AZ Failover ProcessLesson 1254 — ConfigMap Volume Auto-Update with Mounted Files
- 3-2-1 rule
- by replicating snapshots to different regions or accounts, treating them as separate backup copies.
- Lesson 2423 — VM and Volume Backup StrategiesLesson 2424 — Database Backup Approaches
- 30 seconds
- execution time (viewer events) or **5 seconds** (origin events), supports up to **10GB memory**, **50MB** code packages, and runs Node.
- Lesson 615 — CloudFront Functions vs Lambda@EdgeLesson 623 — Edge Computing Limitations and Considerations
A
- Aborts
- Return HTTP error codes (500, 503) or connection failures to simulate service crashes.
- Lesson 1610 — Fault Injection for Resilience Testing
- Abstraction through IaC tools
- like Terraform, which can provision resources across clouds using the same workflow but different provider configurations
- Lesson 2775 — CI/CD Pipeline Portability
- Accelerated Computing
- instances deliver specialized hardware.
- Lesson 78 — Choosing Instance Types for Your Workload
- Accelerated computing instances
- are VMs equipped with Graphics Processing Units (GPUs), Field-Programmable Gate Arrays (FPGAs), or custom silicon chips designed for specific computational tasks.
- Lesson 70 — Accelerated Computing Instance Types
- Accelerating delivery
- proven patterns mean less debugging and rework
- Lesson 2935 — Golden Paths and Paved Roads
- Accept
- Authentication, payment processing, critical API calls
- Lesson 2593 — Load Shedding and Graceful DegradationLesson 2803 — Risk Assessment and Mitigation
- Accepter DNS resolution
- – allows VPC-B to resolve private DNS names in VPC-A
- Lesson 225 — DNS Resolution Between VPCs
- access
- they answer questions like "Can this user upload files?
- Lesson 164 — Bucket Policies and Access ControlLesson 2245 — GCP Secret Manager Fundamentals
- Access Analyzer
- is an automated tool that continuously scans your IAM policies and resource-based policies to detect potential security risks.
- Lesson 372 — Access Analyzer for Policy Review
- Access and Security
- Traditional ops requires cluster credentials in CI/CD systems.
- Lesson 1853 — GitOps vs Traditional Operations
- Access Control
- Lesson 92 — VM Tagging and OrganizationLesson 169 — Object Tagging and MetadataLesson 1060 — What is a Container RegistryLesson 1564 — What is a Service Mesh?Lesson 1596 — Open Service Mesh (OSM) BasicsLesson 1856 — Git as Single Source of TruthLesson 2326 — PCI DSS for Payment Card DataLesson 2327 — HIPAA for Healthcare Data (+1 more)
- Access controls
- determine *who* can read, write, or delete your data.
- Lesson 122 — Storage Security Basics
- Access denied
- Lesson 363 — Allow vs Deny Effects
- Access granted
- Lesson 363 — Allow vs Deny Effects
- Access instructions
- How to reach the application (LoadBalancer IP, NodePort, port-forward commands)
- Lesson 1544 — NOTES.txt and User Instructions
- Access Key ID
- A public identifier (like a username)
- Lesson 343 — Access Keys and Credential ManagementLesson 348 — Access Keys and Programmatic Access
- access keys
- (an ID and secret) that stay valid until you manually delete them.
- Lesson 341 — Temporary vs Permanent CredentialsLesson 343 — Access Keys and Credential Management
- Access logs
- record who called your API, when, from where, and what the response was.
- Lesson 535 — API Gateway Monitoring and LogsLesson 656 — Log Retention and Storage RequirementsLesson 1589 — Istio Telemetry ArchitectureLesson 2447 — Compliance and DR Documentation
- Access method
- – Console password for web UI access, or access keys for programmatic access (CLI/API)
- Lesson 346 — Creating and Managing User Identities
- Access mode
- (ReadWriteOnce, ReadOnlyMany, ReadWriteMany)
- Lesson 1290 — PersistentVolumeClaim (PVC) FundamentalsLesson 1292 — PV Access Modes
- Access mode incompatibility
- PVC wants `ReadWriteMany` but PVs only offer `ReadWriteOnce`
- Lesson 1302 — Troubleshooting PV and PVC Issues
- Access modes
- Must match exactly (e.
- Lesson 1291 — PV and PVC Binding ProcessLesson 1297 — Creating PersistentVolumeClaims
- Access patterns
- Unusual login times, new geographic locations, unfamiliar devices
- Lesson 2858 — Behavioral Analytics and Anomaly Detection
- Access policies
- control who (users, service principals, managed identities) can perform which operations (get, list, set, delete) on which object types.
- Lesson 2242 — Azure Key Vault FundamentalsLesson 2243 — Azure Key Vault Access Policies and RBACLesson 2280 — Introduction to Key Management SystemsLesson 2315 — Azure Key Vault Access Policies and RBAC
- Access region-specific providers
- Use local cloud providers that comply with national sovereignty requirements while maintaining global operations on major platforms.
- Lesson 2755 — Multicloud Benefits: Geographic and Regulatory Coverage
- access reviews
- to prove only authorized users can retrieve secrets
- Lesson 2250 — Secrets Auditing and ComplianceLesson 2857 — Identity Governance and Lifecycle
- Accidental damage
- A user with delete permissions might accidentally wipe critical resources
- Lesson 334 — The Principle of Least Privilege
- Accidental deletion protection
- Deleted objects can be recovered
- Lesson 156 — Object Versioning Fundamentals
- Account A
- grants its users or services permission to assume that role
- Lesson 354 — Cross-Account Roles
- Account B
- (the resource owner) creates a role with a **trust policy** that says "Account A can assume this role"
- Lesson 354 — Cross-Account Roles
- Account compromise
- or misconfiguration impacting a single account
- Lesson 2426 — Cross-Region and Cross-Account Backup
- Account for reserved IPs
- Cloud providers always reserve ~5 addresses per subnet
- Lesson 177 — Subnet Sizing and Planning
- Account ID
- All transactions for account `ABC` remain sequential
- Lesson 578 — Event Ordering and Partitioning
- Account-Level Boundary
- Lesson 340 — IAM Service Boundaries and Scope
- Account-level limits
- Apply across all APIs in your account
- Lesson 539 — API Gateway Throttling and Rate LimitsLesson 2750 — Cloud Provider Rate Limiting Services
- Account-level quotas
- Cloud providers enforce maximum concurrency per account/region; you might want to reserve capacity for critical functions
- Lesson 478 — Function Concurrency Limits
- Achieve better pricing tiers
- Larger shared resources often qualify for volume discounts
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- ACID transactions
- on object storage (S3, ADLS, GCS) using formats like Delta Lake, Iceberg, or Hudi
- Lesson 2629 — Data Lakehouse Architecture
- Acknowledgment
- After successful processing, the consumer acknowledges the message, removing it from the queue
- Lesson 2720 — Competing Consumers Pattern
- Acknowledgment levels
- `acks=0` (fire-and-forget), `acks=1` (leader confirms), `acks=all` (all replicas confirm)
- Lesson 2609 — Kafka Producers and Consumers
- AcrPull
- Can only pull (download) images—ideal for production workloads
- Lesson 1092 — ACR Authentication and RBAC
- AcrPush
- Can push and pull images—perfect for CI/CD pipelines
- Lesson 1092 — ACR Authentication and RBAC
- Act
- If there's a difference, take corrective action
- Lesson 1105 — Controller Manager: Maintaining Desired State
- Action
- *What* they want to do (read, write, delete objects)
- Lesson 164 — Bucket Policies and Access ControlLesson 222 — VPC Flow LogsLesson 322 — VMSS Scaling Policies and RulesLesson 335 — IAM Policies: The Language of PermissionsLesson 337 — Effect, Action, and Resource in PoliciesLesson 361 — Policy Structure and SyntaxLesson 362 — Principal, Action, and Resource ElementsLesson 379 — AWS IAM Roles and Trust Policies (+8 more)
- Action groups
- define *what happens* when an alert fires—the notifications and automated responses.
- Lesson 675 — Azure Monitor Metrics and Alerts
- Action items
- Create concrete, assigned tasks with deadlines to prevent similar incidents.
- Lesson 2134 — Post-Incident Reviews and Blameless Postmortems
- action provider
- .
- Lesson 1842 — Build Stage with CodeBuild IntegrationLesson 1843 — Deploy Stages and Deployment Actions
- Action taken
- (ACCEPT or REJECT based on security group/NACL rules)
- Lesson 213 — Network Security Logging and MonitoringLesson 344 — IAM Audit and Compliance LoggingLesson 2374 — WAF Logging and Monitoring
- Actionable insights
- Each finding explains what resource is affected, who can access it, and which policy grants that access
- Lesson 372 — Access Analyzer for Policy Review
- Actionable Metrics
- Monitor queue depths, message age, delivery attempts, and consumer concurrency.
- Lesson 581 — Event-Driven Monitoring and Observability
- Actions
- Where to route the traffic (which target group receives the request)
- Lesson 243 — Load Balancer Listeners and RulesLesson 246 — ALB Listeners and RulesLesson 388 — Azure Custom RolesLesson 1683 — GitHub Actions Architecture ComponentsLesson 1696 — Workflow Run History and Re-runsLesson 1814 — CodePipeline: Orchestration Service OverviewLesson 1838 — CodePipeline Architecture and ComponentsLesson 1841 — Pipeline Actions and Action Types (+2 more)
- Active
- Key is available for encryption/decryption operations
- Lesson 2280 — Introduction to Key Management SystemsLesson 2760 — Multicloud Architecture Patterns: Active-Passive
- Active-Active
- and **Active-Passive**.
- Lesson 274 — Active-Active and Active-Passive Multi-Region PatternsLesson 435 — DynamoDB Global Tables for Multi-RegionLesson 2472 — Active-Passive vs Active-Active for StatefulLesson 2759 — Multicloud Architecture Patterns: Active-Active
- Active-Passive
- .
- Lesson 274 — Active-Active and Active-Passive Multi-Region PatternsLesson 2472 — Active-Passive vs Active-Active for Stateful
- Active-Standby Controllers
- Lesson 1114 — High Availability Control Plane
- Activity Functions
- perform the actual work—calling APIs, processing data, or updating databases.
- Lesson 2523 — Azure Durable Functions
- Activity Log
- is a platform log that records subscription-level events: resource creation, deletion, policy changes, and access attempts.
- Lesson 2359 — Azure Monitor and Activity Logs
- Ad-hoc exploration
- Data analysts investigating patterns or validating hypotheses without waiting for data engineering pipelines
- Lesson 2656 — Serverless Query Engine Overview
- Ad-hoc querying
- with `OPENROWSET` reads files directly without schema definition:
- Lesson 2667 — Azure Synapse Serverless SQL Pool
- Adaptive application controls
- Whitelisting recommendations based on machine learning
- Lesson 2863 — Azure Security Center and Sentinel
- Adaptive Protection
- , which uses machine learning to detect and mitigate application-layer DDoS attacks by analyzing traffic baselines.
- Lesson 2371 — Google Cloud Armor Fundamentals
- Adaptive sampling
- adjusts rates dynamically based on traffic volume or error rates.
- Lesson 1636 — Trace Sampling Strategies
- Add
- new optional fields freely
- Lesson 570 — Event Schema DesignLesson 1479 — GKE Node Pools and Machine Types
- Add custom metadata
- like version numbers or debugging information
- Lesson 604 — Response Header Customization
- Add Descriptive Metadata
- Use the `metadata` property on parameters to document purpose and valid values.
- Lesson 919 — ARM Template Best Practices and Validation
- Add field from calculation
- creates new columns using math or logic.
- Lesson 1999 — Transformations and Data Processing
- Add instances instantly
- during traffic spikes without complex coordination
- Lesson 2462 — Stateless Services and Horizontal Scaling
- Add metadata
- Link back to original requirement for audit trails
- Lesson 2337 — Compliance Requirements Translation
- Add mTLS gradually
- Begin with permissive mode (allows both encrypted and plain traffic), then move to strict
- Lesson 1601 — Service Mesh Adoption Patterns
- Add new rooms
- (new columns) — backward compatible; old queries ignore them
- Lesson 2638 — Schema Evolution and Versioning
- Add Version
- Store actual secret data (creates version 1, 2, etc.
- Lesson 2245 — GCP Secret Manager Fundamentals
- Adding users
- means placing them into a group so they inherit that group's permissions.
- Lesson 351 — Assigning Users to Groups
- Adding/removing fields
- Inject metadata or strip sensitive data
- Lesson 537 — Request and Response Transformation
- Additional Authenticated Data (AAD)
- in authenticated encryption schemes.
- Lesson 2306 — Encryption Context for Access Control
- Additional Fields
- Lesson 1892 — Application Spec Structure
- additional storage volumes
- to your VM, similar to plugging external hard drives into your computer.
- Lesson 61 — Root and Additional Storage VolumesLesson 85 — VM Termination and Deletion
- Additive changes only
- Add new optional fields while keeping existing fields unchanged.
- Lesson 2732 — Event Schema Evolution
- Address Space (CIDR block)
- The range of private IP addresses available in this network—typically using RFC 1918 ranges like `10.
- Lesson 174 — Creating a Virtual Network
- Adjusting instance sizes
- – Downsize from `large` to `medium`, or switch from Memory Optimized to General Purpose if memory isn't your constraint
- Lesson 79 — Cost Optimization with Right-Sizing
- Admin
- Manage registry configuration, users, and policies—highest privilege
- Lesson 1080 — Registry Access Control and RBACLesson 1385 — Default ClusterRolesLesson 1680 — Artifact Repository Access ControlLesson 2002 — Dashboard Sharing and Permissions
- Admin access
- Full control including deletion and policy management
- Lesson 992 — Registry Authentication and Authorization
- Admin Account
- is a simple username/password pair built into each registry, useful for quick testing but not recommended for production due to limited control and auditability.
- Lesson 1092 — ACR Authentication and RBAC
- Admin Activity Logs
- capture who did what administrative action.
- Lesson 2360 — Google Cloud Audit Logs Types
- Admin interfaces
- Temporarily access internal dashboards
- Lesson 1142 — kubectl port-forward for Local Access
- Admin vs Auditor
- System administrators manage infrastructure, but separate security teams audit logs and access patterns—preventing admins from hiding their tracks.
- Lesson 2835 — Separation of Duties
- Administrative operations
- like key deletion or policy changes
- Lesson 2290 — Audit Logging for Key Usage
- Administrators
- – Elevated privileges for infrastructure management
- Lesson 349 — Groups FundamentalsLesson 1288 — Kubernetes Storage Abstractions
- Admins
- full cluster management
- Lesson 2031 — ELK/EFK Stack SecurityLesson 2933 — RBAC and Portal Access Control
- Admission Control
- "Does this request meet cluster policies?
- Lesson 1102 — API Server: The Cluster GatewayLesson 1116 — Kubernetes API Server OverviewLesson 1405 — Admission Control Overview
- Admission Controller
- Applies resource changes when pods are created or restarted
- Lesson 1455 — Vertical Pod Autoscaler (VPA) Basics
- Admission webhooks
- (custom validation logic)
- Lesson 1078 — Admission Controllers for Image PolicyLesson 1412 — Open Policy Agent (OPA) Fundamentals
- Advanced
- Upload plugins manually or configure update sites
- Lesson 1775 — Jenkins Plugins and Extensibility
- Advanced features
- request modification, sticky sessions based on cookies
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Advanced health checks
- probe what matters—not just if the server answers, but if it can actually do its job.
- Lesson 285 — Advanced Health Check Strategies
- Advantages
- Lesson 314 — ASG Launch Templates and ConfigurationsLesson 523 — API Gateway Deployment ModelsLesson 1607 — Blue-Green DeploymentsLesson 1861 — GitOps Repository StructuresLesson 2066 — Sampling StrategiesLesson 2574 — Synchronous vs Asynchronous CommunicationLesson 2697 — Cache- Aside (Lazy Loading) PatternLesson 2699 — Write-Behind (Write-Back) Caching Pattern (+1 more)
- Advisor Recommendations
- automatically identifies optimization opportunities: underutilized VMs, idle resources, and potential reserved instance purchases.
- Lesson 2173 — Azure Cost Management and Billing
- advisory
- (warning)
- Lesson 837 — Policy Enforcement with SentinelLesson 2894 — Sentinel for Terraform IntroductionLesson 2895 — Sentinel Policy LanguageLesson 2896 — Terraform Sentinel Integration
- Affects execution speed
- CPU-intensive tasks run faster with higher memory settings
- Lesson 475 — Function Memory and CPU Allocation
- Affinity
- provides more expressive rules, like "prefer nodes in zone us-east-1a" or "avoid nodes with high memory pressure.
- Lesson 1187 — DaemonSet Scheduling and Node Selection
- After Build, Before Deploy
- Verify build artifacts meet quality standards
- Lesson 1844 — Manual Approval Actions
- After the event
- Lesson 2499 — GameDays and Chaos Testing Practices
- AfterInstall
- Lesson 1834 — CodeDeploy Lifecycle Hooks
- Age
- Remove images older than 90 days
- Lesson 998 — Image Retention and Cleanup PoliciesLesson 1082 — Image Retention and Lifecycle Policies
- Age of Oldest Message
- Lesson 566 — Queue Monitoring and Metrics
- Agent executors
- Match CPU cores (typically 1-2 per core for I/O-bound tasks)
- Lesson 1806 — Performance Tuning and Resource Management
- Agent/executor configuration
- How many concurrent jobs the master can handle
- Lesson 1772 — Installing and Configuring Jenkins
- Agents
- installed on VMs collect OS and application-level logs
- Lesson 676 — Azure Log Analytics WorkspacesLesson 1771 — Jenkins Architecture: Master and AgentsLesson 2005 — Log Aggregation ArchitectureLesson 2043 — Datadog Logs and Log ManagementLesson 2090 — Jaeger Deployment Models
- aggregate
- the data.
- Lesson 682 — GCP Monitoring Query LanguageLesson 2559 — Domain-Driven Design Basics
- Aggregate and group
- Count login attempts per IP address
- Lesson 2047 — Structured Logging in Applications
- Aggregate functions
- `COUNT()`, `SUM()`, `APPROX_QUANTILES()`
- Lesson 2666 — BigQuery Standard SQL and Functions
- Aggregate metrics
- Count success rates without parsing sentence patterns
- Lesson 654 — Structured vs Unstructured Logs
- Aggregates
- this data in-memory (no persistent storage)
- Lesson 1445 — Metrics Server ArchitectureLesson 1447 — Resource Metrics API
- Aggregation
- Sum, average, min, max, count over time
- Lesson 675 — Azure Monitor Metrics and AlertsLesson 682 — GCP Monitoring Query LanguageLesson 2355 — Audit Log Analysis and Search
- Aggregation key
- what identifier groups requests together
- Lesson 2372 — Rate Limiting and Bot Management
- Aggregation operators
- let you roll up these individual time series into summary values that answer questions like "What's my total request rate?
- Lesson 1966 — Aggregation OperatorsLesson 1975 — Subqueries and Complex ExpressionsLesson 1997 — Query Builder and Query Editor
- Aggressive
- `maxUnavailable: 3, maxSurge: 1` — faster updates with temporary resource overhead
- Lesson 1189 — DaemonSet Update Parameters
- Aggressive update
- `maxSurge: 50%`, `maxUnavailable: 0` (never lose capacity)
- Lesson 1167 — Rolling Update Strategy
- Akamai
- is the oldest and largest CDN provider with the most extensive Points of Presence (PoPs) globally —over 4,000 locations.
- Lesson 594 — Popular CDN Providers Overview
- AKS
- , node image upgrades happen automatically or manually per node pool.
- Lesson 1509 — Node Image UpgradesLesson 1512 — Add-Ons and Extensions
- Alarm
- Average CPU utilization > 70% for 5 minutes
- Lesson 300 — Simple Scaling PoliciesLesson 640 — Alarm States and TransitionsLesson 670 — CloudWatch Alarms and Actions
- Alarm actions
- define what happens when your alarm changes state (OK → ALARM, ALARM → OK, or transitioning to INSUFFICIENT_DATA).
- Lesson 646 — Alarm Actions and Notifications
- ALARM state
- Send email to ops team + trigger auto-scaling
- Lesson 646 — Alarm Actions and Notifications
- Alarm suppression
- lets you temporarily disable specific alarms so your team isn't bombarded with alerts they already know about.
- Lesson 648 — Alarm Suppression and Maintenance Windows
- AlarmARN
- The specific CloudWatch alarm that can trigger rollback
- Lesson 890 — Stack Rollback Configuration
- Alarms
- (also called alerts) are automated notifications triggered when a metric crosses a threshold you've defined.
- Lesson 639 — Introduction to Alarms and Alerting
- Alarms without clear owners
- or response procedures
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- ALB Listeners and Rules
- ) and forward to the appropriate **Target Group**.
- Lesson 275 — Content-Based Routing and Path Rules
- ALB updates automatically
- The ALB immediately starts routing traffic to that dynamic port
- Lesson 258 — ALB and Container Integration
- Alert
- defines *what* events trigger notifications and *which* Flux resources to watch (like specific Kustomizations or HelmReleases).
- Lesson 1928 — Flux Notifications and AlertsLesson 1936 — Notification Controller
- Alert Channels
- Route alerts to where your team actually is: email, Slack, PagerDuty, SMS.
- Lesson 457 — Monitoring and Alerting for Performance
- Alert routing
- Notifications to appropriate teams via email, Slack, or incident management tools
- Lesson 2150 — Cost Anomaly DetectionLesson 2969 — Cost Anomaly Detection
- Alert thresholds
- Trigger notifications at 50%, 80%, 100%, or custom percentages
- Lesson 2170 — AWS Budgets and Alerts
- Alerting
- When a new vulnerability is found, teams receive notifications (email, Slack, webhook, etc.
- Lesson 1085 — Continuous Vulnerability MonitoringLesson 1807 — Monitoring and Alerting for JenkinsLesson 1991 — Introduction to Grafana and Its Role in ObservabilityLesson 2355 — Audit Log Analysis and Search
- alias
- is a friendly pointer or label that references a specific function version.
- Lesson 486 — Function Versions and AliasesLesson 744 — Resource Meta-Arguments: provider
- Aliases
- You can configure multiple instances of the same provider (different regions or accounts) using aliases—though you haven't reached that pattern yet.
- Lesson 728 — Provider Configuration BlocksLesson 1144 — kubectl Aliases, Plugins, and Productivity Tips
- all
- query strings → `image.
- Lesson 598 — Query String and Cookie ForwardingLesson 637 — Metric Retention and StorageLesson 780 — terraform destroy WorkflowLesson 868 — Condition FunctionsLesson 1659 — Fan-Out/Fan-In PatternLesson 1963 — Instant Vector Selectors
- All points are summed
- across all affinity rules for that node
- Lesson 1357 — Affinity Weight and Priorities
- All-in-one
- Single binary for development/testing
- Lesson 2089 — Jaeger OverviewLesson 2090 — Jaeger Deployment Models
- Allocates proportional CPU power
- More memory = more vCPU share
- Lesson 475 — Function Memory and CPU Allocation
- Allocation
- is attributing costs to the right owners—teams, projects, or departments.
- Lesson 2137 — Cost Management Fundamentals
- Allow
- TCP port 22 from `0.
- Lesson 208 — NACL Allow and Deny RulesLesson 337 — Effect, Action, and Resource in PoliciesLesson 361 — Policy Structure and SyntaxLesson 363 — Allow vs Deny EffectsLesson 856 — Stack Policies for Update ProtectionLesson 880 — Stack PoliciesLesson 1198 — CronJob Concurrency PoliciesLesson 1408 — Dynamic Admission Control (+2 more)
- Allow all outbound traffic
- (your instance can reach anywhere unless restricted)
- Lesson 202 — Security Group Fundamentals
- Allow inbound traffic
- on ports 80 (HTTP) and 443 (HTTPS) from the internet (`0.
- Lesson 260 — ALB Security Features and WAF Integration
- Allow lists
- Known good bots verified by reverse DNS (like Googlebot)
- Lesson 2372 — Rate Limiting and Bot Management
- Allow outbound traffic
- to your target instances/containers
- Lesson 260 — ALB Security Features and WAF Integration
- Allowed Headers
- Include any custom headers like `Authorization` or `Content-Type`
- Lesson 542 — API Gateway CORS Configuration
- Allowed Methods
- Match the methods your API supports (GET, POST, PUT, DELETE, etc.
- Lesson 542 — API Gateway CORS Configuration
- Allowed Origins
- Specify exact domains or use `*` (though `*` prevents credentials from being sent)
- Lesson 542 — API Gateway CORS Configuration
- Allowed registries example
- Only permit container images from approved registries:
- Lesson 1415 — Implementing Constraints
- AllowedValues
- restricts choices to a predefined list, preventing invalid inputs (like someone requesting a "t2.
- Lesson 861 — Parameters Section Deep DiveLesson 897 — Parameters in ARM Templates
- Already mounted elsewhere
- Volume with `ReadWriteOnce` already attached to different node
- Lesson 1302 — Troubleshooting PV and PVC Issues
- Alternating-User Rotation
- Two sets of credentials alternate.
- Lesson 2240 — AWS Secrets Manager Rotation
- always
- follow the deny instruction, even though you have a valid keycard
- Lesson 363 — Allow vs Deny EffectsLesson 2310 — AWS KMS Key Policies and Grants
- Always start closed
- Like a bouncer at an exclusive club, deny everything unless explicitly allowed.
- Lesson 1629 — Security Policies Best Practices
- Always switch to non-root
- before the final `CMD` or `ENTRYPOINT`
- Lesson 1011 — USER: Running as Non-Root
- Always use `.gitignore`
- for Secret YAML files or manage them outside version control entirely.
- Lesson 1274 — Secret Security Best Practices
- Always verify before upgrading
- Lesson 1533 — Helm Best Practices for Users
- Always-on availability
- with no single point of failure
- Lesson 443 — Keyspaces and Cassandra-Compatible Services
- Amazon Athena
- , **Presto**, and **Spark SQL** read directly from Parquet, ORC, or CSV files organized in your data lake zones, executing SQL queries without copying data into a separate database.
- Lesson 2640 — Query Engines for Data LakesLesson 2668 — Query Federation and External Data
- Amazon CloudFront
- integrates tightly with AWS services (S3, Lambda@Edge, Shield).
- Lesson 594 — Popular CDN Providers Overview
- Amazon ECR
- (your private Docker registry) and push the built images directly.
- Lesson 1830 — CodeBuild with Docker and ECR
- Amazon ECS Deployment
- Lesson 1843 — Deploy Stages and Deployment Actions
- Amazon EventBridge
- (formerly CloudWatch Events) captures detailed pipeline events and routes them to targets for automated responses.
- Lesson 1849 — Pipeline Notifications and EventBridge
- Amazon Machine Image
- Amazon Web Services' specific term for these templates.
- Lesson 54 — Operating System Images and AMIs
- Amazon S3
- Lesson 1840 — Source Stage ConfigurationLesson 2630 — Object Storage as Data Lake FoundationLesson 2754 — Multicloud Benefits: Best-of-Breed Services
- Amazon S3 Deployment
- Lesson 1843 — Deploy Stages and Deployment Actions
- Ambassador
- , or **Tyk** use standard configuration formats (YAML, CRDs) and can run on any Kubernetes cluster, regardless of cloud provider.
- Lesson 2772 — API Gateway Abstraction
- AMI
- stands for **Amazon Machine Image**—Amazon Web Services' specific term for these templates.
- Lesson 54 — Operating System Images and AMIs
- Amortization
- means spreading that upfront payment evenly across the commitment period.
- Lesson 2148 — Amortizing Reserved Instance Costs
- Amortize initialization costs
- Set up connections once per batch, not per record
- Lesson 502 — Batch Processing Pattern
- Analogy
- Moving your furniture to a new house without buying anything new.
- Lesson 26 — Service Model Migration PatternsLesson 52 — Hypervisors and Virtualization TypesLesson 84 — VM Reboot OperationsLesson 97 — AWS Lightsail for Simple WorkloadsLesson 116 — Durability and Availability in StorageLesson 138 — Block Storage Cost OptimizationLesson 150 — Consistency Models in Object StorageLesson 163 — Server-Side Encryption Options (+55 more)
- Analysis
- Run queries and detect patterns across your entire infrastructure
- Lesson 657 — Centralized Logging Concepts
- Analytics
- tools track *how* your storage is accessed—which objects are frequently retrieved, which haven't been touched in months, and whether your storage class choices align with actual access patterns.
- Lesson 170 — Inventory and AnalyticsLesson 561 — Azure Service Bus Topics
- Analytics/Consumption Zone
- Aggregated datasets ready for reporting
- Lesson 2627 — Data Lake Concepts and Architecture
- Analyze traffic patterns
- Understand peak times and popular endpoints
- Lesson 257 — ALB Access Logs and Monitoring
- annotations
- store arbitrary metadata that doesn't affect selection or scheduling.
- Lesson 1124 — Annotations for MetadataLesson 1153 — Pod Labels and Annotations
- Annual full tests
- are the minimum industry baseline, but many organizations test more frequently based on their RTO and RPO requirements.
- Lesson 2415 — DR Testing and Validation Frequency
- Anomaly Detection
- Compares current metrics against this band; deviations beyond a certain threshold trigger the alarm
- Lesson 644 — Anomaly Detection AlarmsLesson 2386 — DDoS Monitoring and MetricsLesson 2402 — Continuous Verification and Monitoring
- Anomaly detection alarms
- use machine learning to study your metric's historical patterns — its typical values, daily cycles, weekly trends — and automatically determine what "normal" looks like.
- Lesson 644 — Anomaly Detection Alarms
- Antimalware
- Deploys Microsoft Antimalware protection
- Lesson 100 — Azure VM Extensions and Custom Script
- any
- policy contains an explicit **Deny** for that action → **Access denied**
- Lesson 363 — Allow vs Deny EffectsLesson 364 — Policy Evaluation LogicLesson 868 — Condition FunctionsLesson 1317 — Container Storage Interface (CSI) OverviewLesson 1363 — Defining Tolerations in Pod SpecsLesson 1405 — Admission Control Overview
- Any state → INSUFFICIENT_DATA
- Metric data stops arriving (perhaps an agent crashed or network issues occurred).
- Lesson 640 — Alarm States and Transitions
- Any-to-Any (IPVPN)
- Integration with your existing MPLS WAN
- Lesson 2215 — Azure ExpressRoute Fundamentals
- Anycast IP Addressing
- Lesson 2233 — Multi-Region Latency Optimization
- AOF
- (Append-Only File) logs every write operation as it happens—like keeping a detailed diary of every change.
- Lesson 2686 — Redis Persistence and Durability
- AOF (append-only file)
- Logs every write operation — more durable but slower and larger files
- Lesson 2684 — Redis Architecture and Data Structures
- AP systems
- (like DynamoDB or Cassandra) choose availability over strong consistency.
- Lesson 2466 — Stateful Services: Challenges and Trade-offs
- Apache Airflow
- is the most popular open-source choice, defining workflows in Python.
- Lesson 2626 — Workflow Orchestration Tools
- Apache Beam SDK
- You define pipelines using Beam's SDK (Python, Java, or Go), which provides built-in transformations like `Map`, `Filter`, `GroupByKey`, and `Combine`.
- Lesson 2621 — Google Cloud Dataflow Batch
- Apache Flink
- is a dedicated distributed processing engine with true event-time processing and sophisticated state management.
- Lesson 2611 — Stream Processing Frameworks
- Apache HBase API
- , meaning applications built on HBase can migrate to Bigtable with minimal code changes.
- Lesson 441 — Cloud Bigtable for Wide-Column Storage
- Apache Spark pools
- – Distributed big data processing using Spark notebooks
- Lesson 2635 — Azure Synapse Analytics
- API
- defines *what* telemetry operations look like—creating spans, adding attributes, recording metrics.
- Lesson 2074 — OpenTelemetry Architecture and Components
- API calls
- some services charge per request
- Lesson 2138 — Cloud Billing Structure BasicsLesson 2251 — Secrets Management Cost Optimization
- API contract
- is a formal agreement between a consumer and provider about request/response formats, endpoints, status codes, and behavior.
- Lesson 2585 — Contract Testing and API Contracts
- API descriptor
- – typically an OpenAPI/Swagger spec that describes available operations
- Lesson 958 — Type Providers and External APIs
- API Design Validation
- Test API structure before building backend logic
- Lesson 545 — Mock Integrations and Testing
- API discovery portal
- acts like a library catalog for your organization's services.
- Lesson 2931 — API Discovery and Documentation
- API endpoints
- might use:
- Lesson 595 — Cache Behavior ConfigurationLesson 1667 — Multi-Environment Promotion
- API Gateway
- Triggers on HTTP requests (sync)
- Lesson 506 — AWS Lambda: Event Sources and TriggersLesson 520 — What is an API Gateway?Lesson 521 — API Gateway vs Load BalancerLesson 1081 — Network Security for RegistriesLesson 1565 — Service Mesh vs API GatewayLesson 2576 — API Gateway Pattern
- API gateway failures
- Return 403/503 errors, not bypass authentication
- Lesson 2837 — Fail Secure Principles
- API Gateway integration
- provides the HTTP interface, mapping `/users` POST requests to `createUser()` and `/users/:id` GET requests to `getUser()`.
- Lesson 2567 — Microservices on Serverless
- API Gateway Integration Pattern
- places a managed gateway service in front of your serverless functions (like AWS Lambda, Azure Functions, or Google Cloud Functions) to handle HTTP routing, request transformation, authentication, rate limiting, and response formatting.
- Lesson 2502 — API Gateway Integration Pattern
- API gateway layer
- sitting between clients and your backend microservices.
- Lesson 2573 — GraphQL in Microservices
- API gateways
- where clients may send bursts of requests followed by quiet periods
- Lesson 2745 — Token Bucket Algorithm
- API key
- is a unique string that identifies who's calling your API.
- Lesson 540 — API Keys and Usage Plans
- API keys
- and access tokens
- Lesson 704 — State File Security ConcernsLesson 2539 — Serverless API Authentication
- API rate-limiting counters
- Lesson 2469 — Distributed Caching for Stateful Data
- API Server
- (`api`): All requests to the Kubernetes API
- Lesson 1473 — EKS Logging and CloudWatch IntegrationLesson 1878 — ArgoCD Architecture Overview
- API Server ↔ etcd
- The API server uses client certificates to authenticate with etcd, protecting your cluster's entire state database
- Lesson 1115 — Component Communication and Security
- API server availability
- – The Kubernetes API is always reachable
- Lesson 1505 — Managed Kubernetes Overview
- API stages
- Which deployment stages (like "dev" or "prod") this plan can access
- Lesson 540 — API Keys and Usage Plans
- API tokens
- Long-lived or scoped tokens for automation
- Lesson 992 — Registry Authentication and Authorization
- API versioning
- , and **security filtering** directly at the load balancer layer—before requests ever hit your servers.
- Lesson 250 — HTTP Header and Method-Based RoutingLesson 1604 — Request Routing Based on Headers and PathsLesson 2502 — API Gateway Integration Pattern
- API-driven automation
- lets you programmatically orchestrate migration services—triggering replication jobs, querying status, and handling failures without human intervention.
- Lesson 2816 — Migration Automation and Scripting
- API-First Platforms
- Expose infrastructure capabilities through REST APIs or CLIs, allowing developers to integrate provisioning directly into their application deployment pipelines.
- Lesson 2926 — Self-Service Infrastructure Patterns
- API-level
- applies to all requests on that API
- Lesson 2540 — Serverless API Rate Limiting and Throttling
- API/stage-level limits
- Apply to specific deployments
- Lesson 539 — API Gateway Throttling and Rate Limits
- App Engine
- is Google's fully managed platform-as-a-service (PaaS) that lets you deploy applications without managing the underlying infrastructure.
- Lesson 105 — GCP App Engine Standard and Flexible
- App version
- The version of the application being deployed (e.
- Lesson 1532 — Helm Versioning and Chart Versions
- AppArmor
- are Linux kernel security modules that enforce **mandatory access control**.
- Lesson 1396 — SELinux and AppArmor Profiles
- Append events
- to an event store (a specialized database or log)
- Lesson 573 — Event Sourcing Fundamentals
- Application
- is simply a logical name that groups everything related to a specific deployment.
- Lesson 1832 — CodeDeploy Application and Deployment GroupsLesson 2681 — Multi-Tier Caching with CDN
- Application and State Chaos
- targets the application layer itself.
- Lesson 2497 — Application and State Chaos
- Application Artifacts
- Lesson 143 — Object Storage Use Cases
- Application behavior
- Items added to cart, search queries performed, feature usage counts
- Lesson 638 — Custom Metrics and Instrumentation
- Application Cache
- Redis/Memcached for session data, computed results
- Lesson 2708 — Multi-Layer Caching Strategies
- Application cookie
- Use your app's own session cookie as the sticky identifier.
- Lesson 278 — Session Affinity and Sticky Sessions
- Application Cutover
- Update DNS records, load balancer configurations, or routing policies to redirect traffic back to primary—similar to your initial failover process but in reverse.
- Lesson 2443 — Failback Procedures
- Application Data and State
- Lesson 1515 — Disaster Recovery for Clusters
- Application deployments
- – Your Pods, Deployments, Services, and configurations
- Lesson 1505 — Managed Kubernetes Overview
- Application developers
- may want: "Deploy my app" with minimal infrastructure decisions
- Lesson 2920 — Abstraction Levels and User Personas
- Application errors
- Look for stack traces, error messages, or unusual patterns.
- Lesson 1444 — Troubleshooting with Logs
- Application Health Extension
- A lightweight agent installed on each VM that reports whether the application inside is responding correctly.
- Lesson 324 — VMSS Health Monitoring and Automatic Repairs
- Application Insights
- , which provides rich telemetry including request rates, failure rates, dependency tracking, and custom metrics.
- Lesson 518 — Provider-Specific Monitoring and ObservabilityLesson 676 — Azure Log Analytics Workspaces
- Application integration
- Allow your application to serve private assets without exposing storage credentials
- Lesson 165 — Pre-Signed URLs and Temporary Access
- Application layer
- Authentication, input validation, encryption
- Lesson 48 — Security by Design and Defense in DepthLesson 1832 — CodeDeploy Application and Deployment GroupsLesson 2379 — DDoS Protection LayersLesson 2833 — Defense in Depth and Layered Security
- Application Load Balancer (ALB)
- is a Layer 7 (application layer) load balancer designed specifically for web traffic.
- Lesson 245 — Introduction to Application Load Balancers (ALB)Lesson 2368 — AWS WAF Fundamentals
- Application Load Balancers
- operate at Layer 7 of the OSI model—the application layer.
- Lesson 236 — Application Load Balancers (Layer 7)
- Application Load Balancers (ALB)
- automatically handle HTTP/2 by:
- Lesson 283 — HTTP/2 and gRPC Load Balancing
- application logs
- and **system logs**.
- Lesson 655 — Application Logs vs System LogsLesson 656 — Log Retention and Storage RequirementsLesson 659 — Log Streaming vs Log ShippingLesson 1314 — Multiple StorageClasses Strategy
- Application Map
- visualization automatically discovers your architecture by analyzing telemetry.
- Lesson 2095 — Azure Monitor Application Insights
- Application portfolio analysis
- ranking by business criticality and technical complexity
- Lesson 2797 — Migration Assessment Framework
- Application presents both
- to Vault's `/auth/approle/login` endpoint
- Lesson 2258 — AppRole Authentication for Applications
- Application Recovery Testing
- validates that your complete application stack—not just individual components—functions correctly after failover to your disaster recovery site.
- Lesson 2908 — Application Recovery Testing
- Application settings
- database connection strings, API endpoints, feature flags
- Lesson 1247 — ConfigMap Fundamentals and Use Cases
- Application Zone
- Internal business logic with moderate access
- Lesson 2840 — Network Segmentation ArchitectureLesson 2841 — Security Boundaries and Trust Zones
- Application-aware routing
- SD-WAN can prioritize critical applications over the best-performing link
- Lesson 2209 — SD-WAN Integration with Cloud
- Application-consistent
- Required for databases, enterprise applications, and any stateful workload where data integrity is critical
- Lesson 2421 — Application-Consistent vs. Crash-Consistent Backups
- Application-consistent backups
- ensure the application's data is in a known, valid state before the snapshot.
- Lesson 2421 — Application-Consistent vs. Crash-Consistent BackupsLesson 2424 — Database Backup Approaches
- Application-consistent snapshots
- that coordinate with the guest OS
- Lesson 2423 — VM and Volume Backup Strategies
- Application-controlled
- The app explicitly tells the load balancer where to route
- Lesson 2467 — Sticky Sessions and Affinity
- Application-Level Cache
- – In-memory or distributed cache (Redis, Memcached) at your origin
- Lesson 2681 — Multi-Tier Caching with CDN
- Application-level failover handling
- means building intelligence into your code to detect, recover from, and adapt to these disruptions without crashing or losing data.
- Lesson 2487 — Application-Level Failover Handling
- Application-level health checks
- verify your app actually works, not just that the port is open
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Application-level logging
- refers to how your application code generates logs.
- Lesson 1433 — Logging Architecture in Kubernetes
- Application-Level Ordering
- Deploy foundation applications first (databases, message queues), then mid-tier services, then user-facing apps.
- Lesson 1902 — Application Dependencies
- Application-Level Replication
- Lesson 2785 — Cross-Cloud Data Replication StrategiesLesson 2787 — Cross-Cloud Database Replication
- Application-specific temporary files
- that CSI drivers can provision on-demand
- Lesson 1326 — Ephemeral Inline Volumes
- Applications
- Use managed identities with narrowly-defined IAM policies
- Lesson 2834 — Principle of Least Privilege
- ApplicationSets with Dependencies
- When using App-of-Apps patterns, structure your parent application to create child apps sequentially based on their readiness.
- Lesson 1902 — Application Dependencies
- ApplicationStart
- Lesson 1834 — CodeDeploy Lifecycle Hooks
- ApplicationStop
- Lesson 1834 — CodeDeploy Lifecycle Hooks
- apply
- phase is where the magic happens.
- Lesson 699 — Apply and ProvisioningLesson 709 — Workflow Automation and CI/CD IntegrationLesson 725 — Your First Terraform Configuration
- Apply different security rules
- Each subnet can have its own access controls and firewall rules
- Lesson 175 — Subnet Fundamentals
- Apply encryption automatically
- (storage encryption, TLS for transit)
- Lesson 2844 — Secure by Default Configuration
- Apply filters and groupings
- Focus on what matters to your stakeholders
- Lesson 2151 — Custom Cost Reports and Export
- Apply labels to namespaces
- Start in `warn` or `audit` mode before enforcing
- Lesson 1400 — Migrating from PodSecurityPolicy
- Apply least privilege
- grant keys only the permissions they absolutely need
- Lesson 348 — Access Keys and Programmatic Access
- Apply network restrictions
- (deny-by-default firewall rules)
- Lesson 2844 — Secure by Default Configuration
- Apply resilience patterns
- you've learned: circuit breakers, health checks, better failover automation, redundancy improvements
- Lesson 2500 — Measuring and Improving Resilience
- Apply tags consistently
- to all resources (VMs, databases, storage buckets) using those cost center names
- Lesson 2145 — Cost Centers and Business Units
- Apply transformations
- – Add visual steps like derived columns, lookups, sorting, window functions, or conditional splits
- Lesson 2651 — ADF Mapping Data Flows
- AppRole
- Designed for machines and applications.
- Lesson 2256 — Vault Authentication Methods OverviewLesson 2258 — AppRole Authentication for Applications
- Approval gates
- Require security team review before merging risky changes
- Lesson 695 — IaC Security and Compliance Benefits
- Approval workflows
- Routes high-impact changes to humans, auto-applies low-risk changes
- Lesson 2979 — Right-Sizing at Scale with Automation
- AppSpec file
- (Application Specification) is CodeDeploy's instruction manual for your deployment.
- Lesson 1833 — AppSpec File for EC2 and On-Premises
- Architectural choices
- Lesson 2786 — Data Transfer Costs and Optimization
- Architecture
- REST-based queue with peek/get/delete operations
- Lesson 2725 — Provider-Specific Queue Services
- Architecture diagrams
- Visual representation of resource relationships
- Lesson 717 — Documentation and Comments
- Archival tasks
- Compressing and moving old data to cold storage
- Lesson 2614 — Batch Processing Fundamentals
- Archive artifacts
- Save build outputs (JARs, logs, reports) for later retrieval
- Lesson 1776 — Build Steps and Post-Build Actions
- Archive to Storage Account
- For cold storage and long-term compliance requirements
- Lesson 2359 — Azure Monitor and Activity Logs
- Archive/Glacier
- Long-term retention, up to 90% cheaper, hours to retrieve
- Lesson 2156 — Storage Lifecycle and Tiering
- ARG
- Build-time only; not visible in running containers; used for conditional build logic
- Lesson 1006 — ARG: Build-Time Variables
- Argo Rollouts
- is a Kubernetes controller that works alongside ArgoCD to provide these advanced deployment capabilities beyond what standard Kubernetes Deployments offer.
- Lesson 1912 — Progressive Delivery with Argo Rollouts
- arguments
- to set properties, and **expressions** to create dynamic, reusable values—forming the foundation of all Terraform code.
- Lesson 726 — HCL Syntax FundamentalsLesson 740 — Resource Arguments and AttributesLesson 750 — Data Source Arguments and Filters
- ARM Template verbosity
- Lesson 921 — Bicep vs ARM Templates
- Artifact Management
- Archive logs, test results, or build artifacts only when specific conditions are met.
- Lesson 1790 — Post Actions and Notifications
- Artifact Production
- Lesson 1648 — Build Automation Fundamentals
- Artifact Registry
- , a unified solution that handles container images *and* multiple artifact types in one place.
- Lesson 1094 — Google Container Registry (GCR) and Artifact RegistryLesson 1095 — Artifact Registry Multi-Format Support
- Artifact Registry (Recommended)
- Lesson 1094 — Google Container Registry (GCR) and Artifact Registry
- artifact storage
- CodePipeline uses S3 behind the scenes to pass outputs between stages.
- Lesson 1818 — Integration Between AWS Code ServicesLesson 1820 — Pricing Model for AWS Code Services
- Artifact types
- Docker images in one registry, NPM packages in another, each with distinct access rules
- Lesson 1680 — Artifact Repository Access Control
- Artifact Versioning
- Redeploy the last stable artifact from your artifact repository
- Lesson 1663 — Rollback and Recovery Patterns
- artifacts
- compiled binaries, Docker images, JAR files, ZIP archives, or any packaged output ready for deployment.
- Lesson 1650 — Artifact Management in PipelinesLesson 1671 — What are Build Artifacts?Lesson 1710 — Artifacts: Upload and Download Between JobsLesson 1734 — Job Artifacts: Passing Data Between JobsLesson 1738 — Cache vs Artifacts: Performance OptimizationLesson 1765 — Cache Optimization and ArtifactsLesson 1780 — Workspace Management and Build ArtifactsLesson 1782 — Jenkins UI Navigation and Monitoring Builds (+2 more)
- As-a-Service
- Lesson 2941 — Platform Team Interaction Modes
- Assess impact over time
- What happens after 1 hour of downtime?
- Lesson 2410 — Business Impact Analysis (BIA)
- Assessment reports
- Flag incompatible features that need manual intervention
- Lesson 2824 — Schema Conversion Tools
- Asset Discovery and Inventory
- SCC automatically discovers and maintains an inventory of all your GCP resources—compute instances, storage buckets, IAM policies, and more.
- Lesson 2864 — Google Security Command Center
- Assign
- the policy to a scope (management group, subscription, or resource group)
- Lesson 2343 — Azure Policy for Compliance Automation
- Assign minimum necessary permissions
- using groups and policies
- Lesson 377 — AWS IAM Users and Root Account
- Assign public IP addresses
- to resources that need internet access
- Lesson 187 — Internet Gateway Fundamentals
- Assign RTO/RPO per tier
- Critical systems get aggressive targets; less important systems get relaxed ones.
- Lesson 2410 — Business Impact Analysis (BIA)
- Associates metadata
- like creation time and key hierarchy position
- Lesson 2284 — Key Generation and Randomness
- Assume Breach Mentality
- Lesson 2846 — Zero Trust Security Model Fundamentals
- Asymmetric encryption
- uses a *pair of keys*: a public key for encryption and a private key for decryption.
- Lesson 2281 — Symmetric vs Asymmetric EncryptionLesson 2295 — Symmetric vs. Asymmetric EncryptionLesson 2307 — Hybrid Encryption for Large Data
- Asymmetric keys
- encrypt those symmetric keys for secure distribution (solving the key-sharing problem)
- Lesson 2295 — Symmetric vs. Asymmetric Encryption
- Asymmetric routing
- Traffic goes out one path but returns via another, breaking stateful firewalls
- Lesson 2190 — Route Table Verification
- Async Export
- Ensure your instrumentation library sends spans in background threads or processes.
- Lesson 2071 — Instrumentation Overhead
- async processing with queues
- (covered earlier) so users don't wait for function initialization
- Lesson 2544 — Cold Start Mitigation StrategiesLesson 2551 — Asynchronous Processing Patterns
- Asynchronous
- Background processing, sending notifications, file processing where the caller doesn't need to wait
- Lesson 487 — Function Invocation TypesLesson 488 — Function Error Handling and RetriesLesson 2486 — Cross-Region ReplicationLesson 2570 — Service Communication OverviewLesson 2574 — Synchronous vs Asynchronous Communication
- asynchronous invocation
- , the caller triggers the function and immediately moves on without waiting for a response.
- Lesson 465 — Function Invocation TypesLesson 487 — Function Invocation TypesLesson 498 — Async and Fire-and-Forget PatternLesson 506 — AWS Lambda: Event Sources and Triggers
- asynchronous replication
- .
- Lesson 418 — Read Replicas for ScalabilityLesson 2436 — Cross-Region Replication SetupLesson 2473 — State Replication and Consistency ModelsLesson 2475 — Database Replication Fundamentals
- Asynchronous updates
- Background process handles refreshes without blocking requests
- Lesson 2701 — Refresh-Ahead Caching Pattern
- at rest
- (when stored).
- Lesson 2014 — Log Security and ComplianceLesson 2294 — Encryption at Rest vs. Encryption in TransitLesson 2669 — Serverless Query Engine Security
- At-Least-Once
- The system guarantees delivery but may send duplicates if it's unsure whether the first attempt succeeded.
- Lesson 552 — Message Delivery GuaranteesLesson 2603 — At-Least-Once vs Exactly-Once SemanticsLesson 2612 — Managed Streaming Services OverviewLesson 2711 — Queue Types and SemanticsLesson 2712 — Message Delivery Guarantees
- At-Least-Once Delivery
- Messages are delivered at least once, but occasionally a message might be delivered more than once.
- Lesson 555 — AWS SQS Standard QueuesLesson 562 — Google Cloud Pub/Sub
- At-Most-Once
- The system delivers each message zero or one time—never duplicates, but messages may be lost.
- Lesson 552 — Message Delivery GuaranteesLesson 2711 — Queue Types and SemanticsLesson 2712 — Message Delivery Guarantees
- Athena's Azure counterpart
- you pay only for the data processed by your queries, not for idle servers.
- Lesson 2667 — Azure Synapse Serverless SQL Pool
- Atomic operations
- Safe concurrent updates across instances
- Lesson 2693 — Session Store and User State Caching
- Attached volumes
- Usually persist through both stop and termination unless explicitly deleted
- Lesson 83 — Starting and Stopping VMs
- attack surface
- .
- Lesson 356 — Temporary Security CredentialsLesson 1075 — Vulnerability Severity and Prioritization
- Attack trends
- which OWASP vulnerabilities are being targeted most
- Lesson 2374 — WAF Logging and Monitoring
- Attack vectors
- are the paths adversaries use to exploit vulnerabilities—stolen credentials, misconfigured network rules, or compromised supply chains.
- Lesson 2860 — Threat Detection Fundamentals
- Attestations required
- Images must have cryptographic signatures proving they passed CI/CD checks, vulnerability scans, or code reviews
- Lesson 1486 — GKE Binary Authorization
- attribute
- The specific output value from that resource
- Lesson 746 — Resource Addressing and ReferencesLesson 751 — Referencing Data Source Attributes
- Attribute Collection
- Gathering stack traces, request bodies, or environment metadata is expensive.
- Lesson 2071 — Instrumentation Overhead
- Attribute matching
- Search by region, state, type, or other properties
- Lesson 750 — Data Source Arguments and FiltersLesson 2736 — Event Filtering and Routing
- Attributes
- are the fields within an item (like spreadsheet cells).
- Lesson 430 — DynamoDB: Fundamentals and Data ModelLesson 730 — Resource Attributes and ReferencesLesson 775 — State File Contents and StructureLesson 2531 — Amazon DynamoDB Fundamentals
- Attribution chaos
- Tagging strategies differ across providers; tracking which team or project owns what becomes nearly impossible
- Lesson 2757 — Multicloud Challenges: Cost Management and Visibility
- audit
- Allows pods but logs violations
- Lesson 1398 — Pod Security StandardsLesson 1473 — EKS Logging and CloudWatch IntegrationLesson 2343 — Azure Policy for Compliance AutomationLesson 2361 — Cloud Governance Tools Overview
- Audit access patterns
- to ensure users only access what they need
- Lesson 346 — Creating and Managing User Identities
- Audit and Compliance
- IAM tracks who accessed what and when, creating an audit trail essential for security investigations and regulatory compliance.
- Lesson 331 — What is IAM and Why It Matters
- Audit and Reporting
- Regularly scan your environment for tag compliance, generating reports showing coverage percentages and highlighting gaps.
- Lesson 2964 — Cost Allocation Tags
- Audit and Rotation
- Log when secrets are accessed (but never log the values themselves).
- Lesson 1654 — CI/CD Security and Secrets Management
- Audit compliance
- Prove which resources communicated with each other during specific timeframes.
- Lesson 222 — VPC Flow Logs
- Audit existing PSPs
- Understand what policies you currently enforce
- Lesson 1400 — Migrating from PodSecurityPolicy
- Audit gaps emerge
- Mixed encrypted/unencrypted resources are hard to track
- Lesson 2839 — Encryption by Default
- Audit logging
- Record all deletions to a separate system
- Lesson 168 — Event NotificationsLesson 434 — DynamoDB Streams and Change Data CaptureLesson 1517 — Cluster Security HardeningLesson 2238 — Cloud-Native Secrets Services OverviewLesson 2247 — GCP Secret Manager Rotation Strategies
- Audit logs
- Continuously monitor which requests are denied and verify they're actually malicious
- Lesson 1629 — Security Policies Best Practices
- Audit mode
- and **dry-run** capabilities let you observe what *would* be blocked without actually rejecting requests.
- Lesson 1416 — Policy Testing and Audit Mode
- Audit permissions
- Regularly review what functions can access
- Lesson 519 — Provider-Specific Security and IAM
- Audit regularly
- Run reports to find untagged resources and remediate
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Audit secret sprawl
- regularly to remove orphaned or duplicate secrets
- Lesson 2251 — Secrets Management Cost Optimization
- Audit security rules
- See which security group or NACL rules are actually blocking or allowing traffic
- Lesson 213 — Network Security Logging and Monitoring
- Audit trail
- See the history of changes to your objects
- Lesson 156 — Object Versioning FundamentalsLesson 434 — DynamoDB Streams and Change Data CaptureLesson 1919 — Introduction to Flux and GitOps PhilosophyLesson 2262 — Dynamic Secrets Fundamentals
- Audit Trail Gaps
- Unlike dedicated secrets managers (like AWS Secrets Manager or Vault you've learned), environment variables provide no audit trail of who accessed which secret or when.
- Lesson 2270 — Environment Variables for Secrets
- Audit trail generation
- automatically documenting compliance evidence
- Lesson 2335 — Introduction to Compliance as Code
- Audit trails
- Log who changed what and when (using tools like CloudTrail)
- Lesson 375 — Policy Documentation and GovernanceLesson 695 — IaC Security and Compliance BenefitsLesson 1498 — AKS Integration with Azure Active DirectoryLesson 1866 — GitOps Repository StructureLesson 1868 — Environment Promotion PatternsLesson 1873 — Rollback and RecoveryLesson 2246 — GCP Secret Manager IAM and VersioningLesson 2280 — Introduction to Key Management Systems (+3 more)
- Auditability
- Every pipeline change appears in your Git history.
- Lesson 1670 — Pipeline as Code PatternsLesson 1853 — GitOps vs Traditional OperationsLesson 1856 — Git as Single Source of TruthLesson 1884 — Sync Policies and Manual vs Auto SyncLesson 2888 — Policy as Code Fundamentals
- Auditing
- See who has access to what, all in one place
- Lesson 383 — AWS IAM Identity Center (SSO)Lesson 579 — Event Replay and Time TravelLesson 652 — What Are Logs and Why They MatterLesson 995 — Image Manifest and DigestLesson 2639 — Data Lake Security and Access Control
- Authentication
- is proving your identity—confirming *who you are*.
- Lesson 332 — Authentication vs AuthorizationLesson 402 — Creating and Launching RDS InstancesLesson 527 — API Gateway Request FlowLesson 599 — Custom Headers and Origin RequestsLesson 728 — Provider Configuration BlocksLesson 992 — Registry Authentication and AuthorizationLesson 1102 — API Server: The Cluster GatewayLesson 1115 — Component Communication and Security (+4 more)
- Authentication & Authorization
- Verifies who you are and what you're allowed to do
- Lesson 1116 — Kubernetes API Server OverviewLesson 2576 — API Gateway Pattern
- Authentication bridging
- Setting up credentials so one provider's services can authenticate to another's registry (using IAM roles, service accounts, or shared secrets)
- Lesson 1099 — Cross-Provider Registry Integration
- Authentication credentials
- (often referencing a Kubernetes Secret containing API keys or tokens)
- Lesson 1278 — SecretStore Resource
- Authentication dependencies
- What identity services are required?
- Lesson 2798 — Application Discovery and Dependencies
- Authentication details
- – how to authenticate with the external API
- Lesson 958 — Type Providers and External APIsLesson 2931 — API Discovery and Documentation
- Authentication happens first
- You log in with credentials or present an API token.
- Lesson 332 — Authentication vs Authorization
- Authentication mechanism
- (IAM roles for CodeCommit/S3, OAuth/connections for GitHub/Bitbucket)
- Lesson 1840 — Source Stage Configuration
- Authentication Mechanisms
- ensure only authorized clients connect:
- Lesson 2696 — Cache Security and Access Control
- Authentication Options
- Configure authentication methods including basic auth, OAuth, LDAP, or SAML.
- Lesson 1993 — Installing and Configuring Grafana
- Authentication/authorization
- enforcement before invocation
- Lesson 2502 — API Gateway Integration PatternLesson 2577 — Backend for Frontend (BFF) Pattern
- Authenticator
- (`authenticator`): IAM authentication attempts
- Lesson 1473 — EKS Logging and CloudWatch Integration
- Authorization
- is granting permissions—determining *what you can do*.
- Lesson 332 — Authentication vs AuthorizationLesson 527 — API Gateway Request FlowLesson 992 — Registry Authentication and AuthorizationLesson 1080 — Registry Access Control and RBACLesson 1102 — API Server: The Cluster GatewayLesson 1405 — Admission Control OverviewLesson 1623 — Authorization Policies BasicsLesson 1680 — Artifact Repository Access Control (+1 more)
- Authorization chaos
- Each service needs to enforce its own access policies
- Lesson 1617 — Service Mesh Security Overview
- Authorization happens second
- Once authenticated, IAM policies determine what you can do.
- Lesson 332 — Authentication vs Authorization
- Authorization strategy
- Who can do what (matrix-based permissions, role-based access)
- Lesson 1772 — Installing and Configuring Jenkins
- Auto minor version upgrade
- Whether to automatically apply small patches (like 14.
- Lesson 413 — Maintenance Windows and Updates
- Auto Scaling
- excels for unpredictable workloads, always-on applications, and anything requiring rapid response to changing demand.
- Lesson 287 — Auto Scaling vs Manual Scaling
- Auto Scaling Group
- (ASG) is the manager that holds everything together.
- Lesson 289 — Auto Scaling Components
- Auto Scaling Group (ASG)
- is AWS's service for managing a collection (or "fleet") of EC2 instances that scale automatically.
- Lesson 313 — AWS Auto Scaling Groups (ASG) Overview
- Auto Scaling Groups (ASG)
- , Azure uses **Virtual Machine Scale Sets (VMSS)**, and GCP has **Managed Instance Groups (MIG)**.
- Lesson 330 — Cross-Provider Auto Scaling Comparison
- Auto sync
- is like authorizing "leave at door"—the moment it arrives, it's deployed.
- Lesson 1884 — Sync Policies and Manual vs Auto Sync
- Auto-correct
- Modify configurations before deployment (e.
- Lesson 2901 — Policy Reporting and Remediation
- Auto-creation
- If `/app/backend` doesn't exist, Docker creates it.
- Lesson 1004 — WORKDIR: Setting Working Directory
- Auto-remediate
- Run `terraform apply` automatically to restore desired state (risky—use with caution)
- Lesson 842 — Drift Detection and Remediation
- auto-scaling
- for variable loads, choosing between **Reserved Capacity** for predictable workloads, and applying the **OpEx model** where you only pay for what you actually consume.
- Lesson 33 — Cloud Cost Optimization: Right-Sizing ResourcesLesson 43 — Designing for Failure and Fault ToleranceLesson 96 — AWS Elastic Beanstalk IntroductionLesson 103 — GCP Instance Groups and TemplatesLesson 646 — Alarm Actions and NotificationsLesson 2511 — Stream Processing PatternLesson 2530 — Serverless Database Concepts
- Auto-scaling headroom
- – Pre-warm instances or use predictive scaling to avoid cold-start delays during sudden demand
- Lesson 2460 — Capacity Planning for High Availability
- Auto-unseal
- solves this by delegating the master key encryption to an external Key Management Service (KMS), letting Vault unseal itself automatically.
- Lesson 2267 — Vault Auto-Unseal and Seal Wrap
- Auto-upgrade channels
- (patch, stable, rapid, or none)
- Lesson 1501 — AKS Cluster Upgrades and Maintenance
- Automate
- Apply tags via infrastructure-as-code templates, not manual clicking
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Automate alerting
- Trigger alarms based on specific field values
- Lesson 654 — Structured vs Unstructured Logs
- Automate backend configuration
- Use partial backend configuration in CI/CD to avoid hardcoding credentials in version control.
- Lesson 797 — Remote State Best Practices
- Automate teardown
- Always destroy test resources in cleanup phases.
- Lesson 2882 — Integration Testing Strategies
- Automated Backup Configuration
- and **Point-in-Time Recovery**?
- Lesson 424 — Manual Snapshots and Retention
- automated backups
- (which capture full snapshots) and **transaction logs** (which record every single change made to your database).
- Lesson 423 — Point-in-Time RecoveryLesson 424 — Manual Snapshots and RetentionLesson 444 — NoSQL Backup, Point-in-Time Recovery, and TTL
- Automated Data Collection
- Your tracking system continuously queries the metrics that feed your SLIs (availability percentages, latency measurements, throughput rates).
- Lesson 2123 — Measuring and Reporting SLO Compliance
- Automated enforcement
- blocking non-compliant deployments before they reach production
- Lesson 2335 — Introduction to Compliance as CodeLesson 2964 — Cost Allocation Tags
- Automated failover
- systems instead of manual processes
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Automated implementation
- Uses IaC or APIs to execute approved changes during maintenance windows
- Lesson 2979 — Right-Sizing at Scale with Automation
- Automated incident response
- uses serverless compute services (AWS Lambda, Azure Logic Apps, Google Cloud Functions) to take immediate containment actions without human delay.
- Lesson 2871 — Automated Incident Response
- Automated Operations
- AKS provides one-click upgrades, automatic scaling capabilities, and automated patching of the underlying infrastructure.
- Lesson 1490 — Introduction to Azure Kubernetes Service (AKS)
- Automated policy enforcement
- through Infrastructure as Code
- Lesson 2980 — Storage Lifecycle Optimization
- Automated PR Creation
- The pipeline commits generated manifests to your GitOps repository and uses Git APIs to automatically open a pull request
- Lesson 1876 — GitOps Workflow Automation
- Automated Provisioning
- When a new employee starts or changes roles, identity management systems automatically create accounts, assign group memberships, and grant appropriate permissions based on role templates.
- Lesson 2857 — Identity Governance and Lifecycle
- Automated Report Generation
- Tools like OPA, Sentinel, or cloud-native services query logs and compliance scans, then format results according to framework requirements.
- Lesson 2363 — Compliance Reporting and Evidence
- Automated Resource Lifecycle Management
- Lesson 694 — Cost Optimization Through IaC
- Automated rollback
- Return to primary when it recovers
- Lesson 2456 — Failover Mechanisms and Automation
- Automated rotation
- Keys updated regularly without downtime
- Lesson 2280 — Introduction to Key Management Systems
- Automated scanning
- The analyzer reviews all policies attached to users, groups, roles, and resources
- Lesson 372 — Access Analyzer for Policy ReviewLesson 842 — Drift Detection and RemediationLesson 1089 — ECR Image Scanning with InspectorLesson 2335 — Introduction to Compliance as Code
- Automated scheduling
- Use plugins like ThinBackup or Jenkins Configuration as Code (JCasC) combined with version control to snapshot configurations regularly (daily or after major changes).
- Lesson 1808 — Backup and Disaster Recovery
- Automated Synchronization
- Automated agents continuously monitor Git and ensure the live environment matches the desired state.
- Lesson 1852 — What is GitOps?Lesson 1919 — Introduction to Flux and GitOps Philosophy
- Automated Testing Scripts
- run scheduled validations using the monitoring tools you've already learned: VPC Flow Logs analysis, packet captures, route table verification, and NAT gateway metrics.
- Lesson 2193 — Network Monitoring Automation
- Automated tests
- Do your modules and configurations behave as expected?
- Lesson 721 — Continuous Integration for IaC
- Automatic
- applies changes immediately to all instances as soon as you update the model.
- Lesson 323 — VMSS Upgrade Policies and Rolling UpdatesLesson 1651 — Environment Promotion StrategiesLesson 2065 — Instrumentation Types
- Automatic backups
- Most backends version your state, protecting against accidental deletions
- Lesson 783 — Why Remote State Matters
- Automatic cleanup
- No manual rotation needed; Vault handles revocation
- Lesson 2262 — Dynamic Secrets Fundamentals
- Automatic Deletion
- Old snapshots are automatically removed when they exceed retention limits, preventing storage costs from spiraling out of control.
- Lesson 132 — Snapshot Lifecycle Management
- Automatic encryption
- Artifacts are encrypted at rest using AWS KMS keys (either AWS-managed or customer-managed)
- Lesson 1847 — Pipeline Artifacts and Artifact Stores
- Automatic enrichment
- The APM agent injects trace and span identifiers into your log statements
- Lesson 2044 — New Relic Logs in Context
- automatic failover
- , or **rolling updates**.
- Lesson 1059 — Compose Best Practices and LimitationsLesson 2209 — SD-WAN Integration with CloudLesson 2478 — Multi-AZ DeploymentsLesson 2687 — Redis High Availability with Sentinel
- Automatic injection
- uses a Kubernetes admission webhook that intercepts pod creation requests.
- Lesson 1579 — Sidecar Injection Mechanisms
- Automatic Linking
- Click from a log line with a trace ID straight into the full trace visualization
- Lesson 2092 — Tempo by Grafana
- Automatic Load Balancing
- The queue handles distribution without custom logic
- Lesson 2720 — Competing Consumers Pattern
- Automatic log access
- The agent reads container logs from the node's filesystem (typically `/var/log/pods` and `/var/log/containers`)
- Lesson 1434 — Node-Level Logging Agents
- Automatic mutual TLS (mTLS)
- Encrypts and authenticates all service-to-service traffic by default
- Lesson 1617 — Service Mesh Security Overview
- Automatic optimization
- The cloud scales resources without human intervention
- Lesson 32 — Elasticity and Cost Benefits of Auto-ScalingLesson 2651 — ADF Mapping Data Flows
- Automatic reconciliation
- The GitOps controller notices the Git state changed and applies the old configuration
- Lesson 1873 — Rollback and Recovery
- Automatic recovery
- If a server fails, users simply get routed to another—no data is lost because nothing was stored locally
- Lesson 42 — Stateless Application Design
- automatic replication
- .
- Lesson 149 — Durability and Availability GuaranteesLesson 2469 — Distributed Caching for Stateful Data
- Automatic rotation
- for compatible resources (though implementation varies)
- Lesson 2238 — Cloud-Native Secrets Services OverviewLesson 2287 — Key Rotation FundamentalsLesson 2304 — Encryption Key Rotation Strategies
- Automatic Scaling
- Lesson 107 — Azure VM Scale Sets IntroductionLesson 441 — Cloud Bigtable for Wide-Column StorageLesson 2537 — Serverless GraphQL APIsLesson 2664 — Google BigQuery as Serverless Query Engine
- Automatic trigger
- All `ONBUILD` instructions execute immediately after `FROM`
- Lesson 1014 — ONBUILD: Triggered Instructions
- Automatic updates
- AWS can patch security vulnerabilities without breaking your workloads
- Lesson 1469 — EKS Add-ons Overview
- automatically
- upgrades your control plane and nodes (during maintenance windows).
- Lesson 1482 — GKE Release ChannelsLesson 2839 — Encryption by Default
- Automatically created
- The service creates the role when you first use that service
- Lesson 357 — Service-Linked Roles
- Automatically fails over
- to the standby if the primary becomes unavailable due to hardware failure, network issues, or scheduled maintenance
- Lesson 415 — Multi-AZ Deployments Fundamentals
- Automatically revokes
- it when the lease expires or the app finishes
- Lesson 2262 — Dynamic Secrets FundamentalsLesson 2265 — Vault Leases and Revocation
- Automatically rolls back
- if failures are detected
- Lesson 1813 — CodeDeploy: Deployment Automation Overview
- Automation
- Code can be executed automatically by tools and pipelines, removing human error and speeding up deployments dramatically.
- Lesson 47 — Infrastructure as Code PhilosophyLesson 63 — VM Tags and Resource OrganizationLesson 92 — VM Tagging and OrganizationLesson 905 — Tags and Resource MetadataLesson 2279 — Secrets Rotation in ContainersLesson 2645 — Glue Data Catalog FundamentalsLesson 2973 — Cost Allocation APIs and Automation
- Automation actions
- trigger systems to respond automatically:
- Lesson 646 — Alarm Actions and Notifications
- Automation and Enforcement
- Lesson 2963 — Tagging Strategy for Cost Allocation
- Automation and notifications
- (Slack, email, webhook triggers)
- Lesson 1775 — Jenkins Plugins and Extensibility
- Automation triggers
- CI/CD tools (Jenkins, GitLab CI, GitHub Actions, etc.
- Lesson 1647 — Version Control as the Source of Truth
- Automation workflows
- Streamlined processes for provisioning, scaling, and decommissioning
- Lesson 2914 — Internal Developer Platform (IDP) Fundamentals
- Autopilot flips this model
- Google manages all the infrastructure, automatically provisions nodes based on your workload requirements, and optimizes resource allocation.
- Lesson 1478 — Creating a GKE Autopilot Cluster
- Autopilot mode
- is Google's managed experience where GKE handles the entire infrastructure layer for you.
- Lesson 1476 — GKE Cluster Types: Standard vs Autopilot
- Autoscaling
- Dataflow continuously monitors your pipeline's workload and automatically adds or removes workers.
- Lesson 2621 — Google Cloud Dataflow Batch
- Availability
- answers: "Can I access my data right now when I need it?
- Lesson 116 — Durability and Availability in StorageLesson 149 — Durability and Availability GuaranteesLesson 1323 — Topology-Aware Volume ProvisioningLesson 2114 — Common SLI Categories: Availability, Latency, and ThroughputLesson 2416 — Compliance and Regulatory DR RequirementsLesson 2466 — Stateful Services: Challenges and Trade-offs
- Availability guarantee
- Minimum capacity ensures service continuity
- Lesson 310 — Capacity Limits and Constraints
- Availability needs
- Multi-AZ deployments require VM scale sets or managed services with built-in redundancy
- Lesson 110 — Compute Service Selection Criteria
- Availability sets
- distribute your VMs across multiple **fault domains** and **update domains** within a single datacenter:
- Lesson 99 — Azure VM Availability Sets and Zones
- Availability Zone (AZ)
- is a physically isolated data center—or cluster of data centers—within a cloud region.
- Lesson 2454 — Availability Zones and Data Center Distribution
- Availability Zone balancing
- Terminate from the AZ with the most instances
- Lesson 319 — ASG Termination Policies
- Availability zone outage
- – The entire data center zone loses connectivity
- Lesson 416 — Multi-AZ Failover Process
- availability zones
- spread across the planet.
- Lesson 9 — Regions and Availability ZonesLesson 36 — Risk Reduction Through Cloud MigrationLesson 49 — Observability and Monitoring ArchitectureLesson 99 — Azure VM Availability Sets and ZonesLesson 149 — Durability and Availability GuaranteesLesson 2452 — Fault Domains and Isolation Boundaries
- Availability Zones (AZs)
- within your region.
- Lesson 315 — ASG Instance Distribution and Availability Zones
- available
- (not failed)
- Lesson 200 — Troubleshooting Internet ConnectivityLesson 1169 — Deployment Rollout StatusLesson 1173 — MinReadySeconds and StabilityLesson 1299 — PV and PVC Lifecycle StatesLesson 1775 — Jenkins Plugins and Extensibility
- Available for your use
- Lesson 179 — Reserved IP Addresses in Subnets
- Available libraries
- (standard library features vary by version)
- Lesson 471 — Function Runtime Environments
- Avoid
- Choose a different migration strategy (remember your 7 R's—maybe refactor instead of rehost if compatibility risks are too high)
- Lesson 2803 — Risk Assessment and Mitigation
- Avoid API lock-in
- You code against Kubernetes APIs, not provider-specific services
- Lesson 2765 — Container-Based Portability
- Avoid Expensive Operations
- Some functions are computationally heavy.
- Lesson 1976 — Query Optimization and Best Practices
- Avoid hardcoded credentials
- Use provider IAM mechanisms
- Lesson 519 — Provider-Specific Security and IAM
- Avoid heavy operations
- Don't perform complex computations or large data transformations at the edge.
- Lesson 622 — Edge Function Performance Optimization
- Avoid high cardinality
- Partitioning by user ID (millions of values) creates management nightmares.
- Lesson 2661 — Athena Partitioning Strategies
- Avoid large transitive dependencies
- One innocent-looking package might pull in dozens of others.
- Lesson 496 — Dependency Management
- Avoid over-provisioning
- If pods request 2 CPU and 4GB RAM, don't use 16-core VMs
- Lesson 1504 — AKS Cost Management and Cluster Sizing
- Avoid overlap
- If two groups have identical permissions, merge them
- Lesson 350 — Creating and Organizing Groups
- Avoid overusing Vary
- Lesson 2673 — Vary Header and Cache Keys
- Avoid relying on `latest`
- it's ambiguous and changes frequently.
- Lesson 1064 — Image Naming and Tagging Conventions
- Avoid rewrite costs
- No translation layer needed when changing providers
- Lesson 2772 — API Gateway Abstraction
- Avoid spot instances
- for databases, critical production apps, or anything requiring continuous uptime.
- Lesson 75 — Spot Instance Pricing
- Avoid wildcard queries
- on high-cardinality fields like `trace_id` or `user_id` without additional filters.
- Lesson 2097 — Query Performance and Indexing
- Avoiding Full Table Scans
- prevents the database from reading every row.
- Lesson 449 — Query Optimization Techniques
- Avoiding Vendor Lock-In
- Lesson 23 — Multi-Cloud Strategy Fundamentals
- Avro
- stores data row-by-row with embedded schemas, making it ideal for streaming pipelines and schema evolution.
- Lesson 2632 — File Formats for AnalyticsLesson 2660 — Querying Data Formats in Athena
- AWS
- charges per 1ms of execution time.
- Lesson 517 — Cross-Provider Function ComparisonLesson 2147 — Multi-Account Cost ConsolidationLesson 2153 — Reserved Instances and Savings PlansLesson 2154 — Spot Instances and Preemptible VMsLesson 2181 — Cross-Provider Cost Tool ComparisonLesson 2389 — DDoS Testing and SimulationLesson 2962 — Cloud Billing Data Structure
- AWS AppSync
- provide managed GraphQL endpoints that execute your data-fetching logic (resolvers) on- demand, charging only for queries executed.
- Lesson 2537 — Serverless GraphQL APIs
- AWS ASGs
- use Launch Templates for configuration and offer Lifecycle Hooks for custom actions during scaling events.
- Lesson 330 — Cross-Provider Auto Scaling Comparison
- AWS best practices
- (inefficient API usage, missing error handling)
- Lesson 1816 — CodeGuru: AI-Powered Code Review
- AWS CLI
- `aws cloudformation describe-stack-events --stack-name my-stack`
- Lesson 887 — Stack Events and MonitoringLesson 1462 — EKS Cluster Creation Options
- AWS CLI (Command-Line)
- Lesson 848 — Creating Your First Stack
- AWS CloudFormation Deployment
- Lesson 1843 — Deploy Stages and Deployment Actions
- AWS CloudTrail
- logs every Secrets Manager API call (who retrieved which secret, when)
- Lesson 2250 — Secrets Auditing and ComplianceLesson 2290 — Audit Logging for Key UsageLesson 2862 — AWS GuardDuty
- AWS CloudTrail Insights
- and **CloudWatch Logs Insights** let you query events using SQL-like syntax
- Lesson 2355 — Audit Log Analysis and SearchLesson 2358 — AWS CloudTrail Deep Dive
- AWS CloudWatch
- excels at native AWS service integration with automatic metric collection.
- Lesson 683 — Cross-Provider Monitoring ComparisonLesson 2055 — Log Retention and Storage Classes
- AWS CloudWatch Network Monitor
- Synthetic monitoring between VPCs
- Lesson 2232 — Network Load Testing Tools
- AWS CodeArtifact
- acts as a package repository for dependencies, while **CodeGuru** provides AI-powered code reviews.
- Lesson 1810 — Introduction to AWS Developer Tools Ecosystem
- AWS CodeBuild
- compiles your code, runs tests, and produces deployable artifacts—it's the build engine.
- Lesson 1810 — Introduction to AWS Developer Tools Ecosystem
- AWS CodeCommit
- serves as your Git repository (like GitHub or GitLab), hosting your source code directly in AWS.
- Lesson 1810 — Introduction to AWS Developer Tools EcosystemLesson 1840 — Source Stage Configuration
- AWS CodeDeploy
- automates application deployments to EC2, Lambda, ECS, or on-premises servers—it's the deployment orchestrator.
- Lesson 1810 — Introduction to AWS Developer Tools Ecosystem
- AWS CodePipeline
- ties everything together as the pipeline orchestrator, defining the flow from source → build → test → deploy.
- Lesson 1810 — Introduction to AWS Developer Tools Ecosystem
- AWS Console (Visual)
- Lesson 848 — Creating Your First Stack
- AWS Cost Explorer
- excels at rich filtering and grouping options, offering the most mature anomaly detection through dedicated AWS Cost Anomaly Detection.
- Lesson 2181 — Cross-Provider Cost Tool Comparison
- AWS Cost Explorer API
- Query costs by service, tag, linked account, or time period
- Lesson 2973 — Cost Allocation APIs and Automation
- AWS DataSync
- is an online agent-based service that automates and accelerates data transfer over the network.
- Lesson 2810 — Large-Scale Data Transfer Services
- AWS Direct Connect
- establishes a dedicated network connection from your on-premises data center or colocation facility to AWS.
- Lesson 2780 — Direct Connect vs ExpressRoute vs Interconnect
- AWS Direct Connect locations
- specialized facilities where AWS networking equipment coexists with third-party network providers.
- Lesson 2212 — AWS Direct Connect Fundamentals
- AWS DocumentDB
- is a fully managed document database service that emulates MongoDB's API.
- Lesson 442 — DocumentDB and MongoDB-Compatible Services
- AWS Elastic Beanstalk
- , which does all of this for you automatically.
- Lesson 96 — AWS Elastic Beanstalk Introduction
- AWS Elastic Disaster Recovery
- Automates replication and orchestrates failover with defined runbooks
- Lesson 2440 — Automated DR Orchestration
- AWS EMR (Elastic MapReduce)
- provisions Spark clusters that integrate seamlessly with S3 for data storage, IAM for security, and CloudWatch for monitoring.
- Lesson 2618 — Spark on Cloud Platforms
- AWS Glue Crawlers
- (which you've already learned) to automatically discover and catalog data.
- Lesson 2653 — Data Catalog Services Across Providers
- AWS Glue Data Catalog
- as its metadata repository.
- Lesson 2634 — AWS Lake FormationLesson 2637 — Data Catalog and Metadata ManagementLesson 2654 — Schema Evolution and VersioningLesson 2658 — Athena Data Catalogs and Databases
- AWS KMS keys (SSE-KMS)
- for enhanced key management and audit logging—critical for compliance requirements.
- Lesson 1828 — Artifact Management and S3 Integration
- AWS Lambda
- Node.
- Lesson 471 — Function Runtime EnvironmentsLesson 517 — Cross-Provider Function ComparisonLesson 2754 — Multicloud Benefits: Best-of-Breed Services
- AWS Lambda Deployment
- Lesson 1843 — Deploy Stages and Deployment Actions
- AWS Management Console
- is the graphical, point-and-click interface.
- Lesson 1462 — EKS Cluster Creation Options
- AWS Native Integration
- CodeCommit naturally connects with other AWS Developer Tools.
- Lesson 1811 — CodeCommit: Git Repository Service
- AWS Organizations
- with consolidated billing, where a payer account aggregates charges from all linked member accounts.
- Lesson 2147 — Multi-Account Cost ConsolidationLesson 2968 — Multi-Account Cost Aggregation
- AWS Partner
- who already has connectivity to these locations
- Lesson 2212 — AWS Direct Connect Fundamentals
- AWS Partner Network
- providers offer sanctioned testing that simulates various attack vectors (volumetric floods, application-layer attacks, protocol exploits) without risking account termination.
- Lesson 2389 — DDoS Testing and Simulation
- AWS public services
- (S3, DynamoDB, public endpoints) using public IP addresses you own.
- Lesson 2213 — Direct Connect Virtual Interfaces
- AWS RDS Performance Insights
- , for example, automatically captures and visualizes database load, breaking it down by SQL statements, users, hosts, or applications.
- Lesson 456 — Performance Insights and Diagnostics Tools
- AWS Route 53
- offers weighted routing, latency-based routing, and health checks
- Lesson 2782 — Cross-Cloud DNS Management
- AWS S3
- Enable versioning per bucket, define lifecycle rules with `NoncurrentVersionTransition` actions
- Lesson 2425 — Object Storage Versioning and Lifecycle
- AWS SDK (Programmatic)
- Lesson 848 — Creating Your First Stack
- AWS Secrets Manager
- and **Systems Manager Parameter Store** come in—they're secure vaults that encrypt and manage secrets, which your Lambda function can fetch at runtime.
- Lesson 508 — AWS Lambda: Environment Variables and SecretsLesson 1274 — Secret Security Best PracticesLesson 1804 — Credential Management at ScaleLesson 1827 — Environment Variables and Parameter StoreLesson 1870 — Handling Secrets in GitOpsLesson 2238 — Cloud-Native Secrets Services Overview
- AWS Snowball/Snowmobile
- and **Azure Data Box** are ruggedized physical devices shipped to your data center.
- Lesson 2810 — Large-Scale Data Transfer Services
- AWS SQS FIFO queues
- deduplicate based on message content or deduplication ID for 5 minutes
- Lesson 577 — Event Deduplication Strategies
- AWS Transit Gateway
- , enabling scalable routing to multiple VPCs and on-premises locations through a central hub.
- Lesson 2213 — Direct Connect Virtual Interfaces
- AWS VPC Reachability Analyzer
- Tests connectivity between source and destination resources within your VPC
- Lesson 2188 — Network Path Analysis Tools
- AWS-assigned static IPs
- AWS automatically assigns a fixed IP per AZ that never changes
- Lesson 266 — Static IP and Elastic IP Support
- AWS-generated tags
- automatically appear with the prefix `aws:` (like `aws:createdBy`).
- Lesson 2142 — Cost Allocation Tags in AWS
- AWS-Heavy Workloads
- If you're deploying to EC2, Lambda, ECS, or Elastic Beanstalk, AWS native services integrate seamlessly with IAM roles and service-to-service permissions without extra authentication layers.
- Lesson 1821 — When to Use AWS Native CI/CD
- AZ spreading
- Distribute across all availability zones in your region
- Lesson 2978 — Spot Instance Fleet Management
- Azure
- includes a free monthly grant of 1 million requests.
- Lesson 517 — Cross-Provider Function ComparisonLesson 2147 — Multi-Account Cost ConsolidationLesson 2153 — Reserved Instances and Savings PlansLesson 2154 — Spot Instances and Preemptible VMsLesson 2181 — Cross-Provider Cost Tool ComparisonLesson 2389 — DDoS Testing and SimulationLesson 2962 — Cloud Billing Data Structure
- Azure Active Directory
- (now called Microsoft Entra ID) and can be assigned **Azure RBAC** roles.
- Lesson 390 — Azure Service PrincipalsLesson 2754 — Multicloud Benefits: Best-of-Breed ServicesLesson 2863 — Azure Security Center and Sentinel
- Azure Active Directory authentication
- , **webhook notifications** for registry events, and **Azure RBAC integration** for granular access control.
- Lesson 1090 — Azure Container Registry (ACR) Overview
- Azure Activity Logs
- track Key Vault operations like key retrieval, encryption operations, and access policy changes.
- Lesson 2290 — Audit Logging for Key Usage
- Azure AD
- Identity-based authentication alongside traditional connection strings
- Lesson 2691 — Azure Cache for Redis
- Azure AD Authentication
- uses your existing Azure Active Directory identities.
- Lesson 1092 — ACR Authentication and RBAC
- Azure Blob
- Use blob versioning with lifecycle management policies for tier transitions
- Lesson 2425 — Object Storage Versioning and Lifecycle
- Azure CDN
- integrates naturally with Microsoft Azure services and offers multiple underlying providers (Verizon, Akamai) through a unified interface—useful for multi-CDN strategies.
- Lesson 594 — Popular CDN Providers OverviewLesson 617 — Azure Functions on CDN Edge
- Azure CLI
- and **PowerShell** act as the deployment engines that understand Bicep natively.
- Lesson 922 — Bicep Tooling and CLI
- Azure CNI networking
- (not kubenet) because ACI containers need direct integration with your Azure virtual network.
- Lesson 1503 — AKS Virtual Nodes and Serverless Bursting
- Azure Container Registry (ACR)
- is Microsoft's private registry service.
- Lesson 929 — Module Registries
- Azure Cost Exports
- let you automatically dump cost and usage data to a storage account on a schedule (daily, weekly, monthly).
- Lesson 2176 — Azure Cost Exports and APIs
- Azure Cost Management
- shines in enterprise scenarios with built-in chargeback/showback features and tight integration with Azure Advisor for optimization recommendations.
- Lesson 2181 — Cross-Provider Cost Tool Comparison
- Azure Cost Management API
- Retrieve usage details, budgets, and forecasts
- Lesson 2973 — Cost Allocation APIs and Automation
- Azure Data Box
- are ruggedized physical devices shipped to your data center.
- Lesson 2810 — Large-Scale Data Transfer Services
- Azure Database Migration Service
- offers similar capabilities with tight integration to Azure Database offerings.
- Lesson 2806 — Database Migration Service FundamentalsLesson 2824 — Schema Conversion Tools
- Azure DNS
- integrates with Traffic Manager for geographic routing
- Lesson 2782 — Cross-Cloud DNS Management
- Azure Enterprise Agreements
- aggregate subscriptions under a single enrollment
- Lesson 2968 — Multi-Account Cost Aggregation
- Azure ExpressRoute
- provides similar dedicated connectivity to Azure services and Microsoft 365.
- Lesson 2780 — Direct Connect vs ExpressRoute vs Interconnect
- Azure Front Door
- and **Azure CDN** integration.
- Lesson 617 — Azure Functions on CDN EdgeLesson 2370 — Azure WAF Overview
- Azure Functions
- JavaScript/TypeScript, Python, C#, Java, PowerShell
- Lesson 471 — Function Runtime EnvironmentsLesson 517 — Cross-Provider Function Comparison
- Azure HDInsight
- offers similar managed Spark clusters tightly coupled with Azure Blob Storage and Data Lake Storage.
- Lesson 2618 — Spark on Cloud Platforms
- Azure Key Vault
- provide:
- Lesson 1274 — Secret Security Best PracticesLesson 1804 — Credential Management at ScaleLesson 1870 — Handling Secrets in GitOpsLesson 2238 — Cloud-Native Secrets Services Overview
- Azure Monitor
- for database insights
- Lesson 410 — Database Monitoring and MetricsLesson 676 — Azure Log Analytics WorkspacesLesson 683 — Cross-Provider Monitoring ComparisonLesson 2055 — Log Retention and Storage ClassesLesson 2250 — Secrets Auditing and ComplianceLesson 2290 — Audit Logging for Key UsageLesson 2669 — Serverless Query Engine SecurityLesson 2691 — Azure Cache for Redis
- Azure Monitor Logs
- uses Kusto Query Language (KQL) for powerful filtering and aggregation
- Lesson 2355 — Audit Log Analysis and Search
- Azure Network Watcher
- Provides "Next Hop" and "IP Flow Verify" features
- Lesson 2188 — Network Path Analysis ToolsLesson 2232 — Network Load Testing Tools
- Azure Policies
- , meanwhile, are like building codes for construction—they enforce rules about what can be deployed and how resources must be configured.
- Lesson 918 — Resource Tags and Policy Assignment
- Azure Policy
- , **GCP Organization Policy Service**, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
- Lesson 2345 — Continuous Compliance Scanning
- Azure Private Peering
- Connects to your Azure VNets and private IP resources
- Lesson 2203 — Azure ExpressRoute Fundamentals
- Azure Public Peering
- (Legacy, deprecated for new circuits)
- Lesson 2203 — Azure ExpressRoute FundamentalsLesson 2215 — Azure ExpressRoute Fundamentals
- Azure Purview
- , and **Google Cloud Dataplex** automatically crawl your data sources (S3 buckets, database tables, BigQuery datasets) to extract **metadata**—information *about* your data.
- Lesson 2637 — Data Catalog and Metadata Management
- Azure RBAC
- roles.
- Lesson 390 — Azure Service PrincipalsLesson 2243 — Azure Key Vault Access Policies and RBACLesson 2315 — Azure Key Vault Access Policies and RBAC
- Azure RBAC integration
- for granular access control.
- Lesson 1090 — Azure Container Registry (ACR) Overview
- Azure Security Center
- (now part of Microsoft Defender for Cloud) provides unified security posture management across your Azure resources, while **Azure Sentinel** serves as a cloud-native SIEM (Security Information and Event Management) solution for advanced threat de...
- Lesson 2863 — Azure Security Center and Sentinel
- Azure Sentinel
- serves as a cloud-native SIEM (Security Information and Event Management) solution for advanced threat detection and response.
- Lesson 2863 — Azure Security Center and Sentinel
- Azure Service Bus
- offers duplicate detection using message IDs
- Lesson 577 — Event Deduplication Strategies
- Azure Site Recovery
- Manages replication and executes recovery plans with dependency ordering
- Lesson 2440 — Automated DR Orchestration
- Azure Site Recovery (ASR)
- Lesson 2805 — Server Migration Tools and Agents
- Azure Storage
- , enable blob versioning on your storage account.
- Lesson 794 — State Versioning and History
- Azure Synapse Analytics
- is Microsoft's answer to the lakehouse architecture.
- Lesson 2635 — Azure Synapse Analytics
- Azure VM Extensions
- work similarly: they're add-on components that automatically install software, configure settings, or run scripts on your VM right after it starts.
- Lesson 100 — Azure VM Extensions and Custom Script
- Azure VMSS
- provides Orchestration Modes (uniform vs flexible) and unique features like Automatic OS Upgrades and automatic instance repairs.
- Lesson 330 — Cross-Provider Auto Scaling Comparison
B
- Backend for Frontend (BFF)
- pattern creates **separate serverless API layers for each client type**.
- Lesson 2507 — Backend for Frontend (BFF) Pattern
- Backend integrations
- define how the gateway connects to and communicates with the services that actually handle the request.
- Lesson 528 — Backend Integration Types
- Backend load spikes
- when many cold requests arrive simultaneously
- Lesson 2707 — Cache Warming Strategies
- Backend services
- Which ClusterIP Services receive the traffic
- Lesson 1219 — Ingress Resource Fundamentals
- Background deletion
- Parent is deleted immediately; children are cleaned up asynchronously
- Lesson 1125 — Owner References and Garbage Collection
- Background jobs
- (cron tasks, batch workers): 1–5m intervals since metrics change slowly
- Lesson 1988 — Scrape Interval Optimization
- Background workers
- Processing queue items or batch jobs in parallel
- Lesson 1057 — Scaling Services with Compose
- Backpressure
- occurs when downstream consumers can't keep pace with upstream producers.
- Lesson 2613 — Streaming Performance ConsiderationsLesson 2741 — Flow Control Mechanisms
- Backstage
- integrate API discovery directly into the developer portal.
- Lesson 2931 — API Discovery and Documentation
- Backup
- `origin2.
- Lesson 597 — Origin Settings and FailoverLesson 2405 — What is Disaster Recovery (DR)?
- Backup 2
- Cross-region replication or archived backups in object storage like S3 Glacier
- Lesson 2418 — The 3-2-1 Backup Rule
- Backup and Recovery
- Regular snapshots protect against data loss from accidental deletion, corruption, or hardware failure.
- Lesson 131 — Volume Snapshots
- Backup and recovery speed
- Faster storage means quicker backups and restores
- Lesson 454 — Database Storage Performance
- Backup and Restore
- pattern and the fully replicated **Warm Standby** or **Hot Standby** patterns.
- Lesson 2432 — Pilot Light Pattern
- Backup Configuration
- Specify backup retention period and maintenance windows
- Lesson 402 — Creating and Launching RDS Instances
- Backup strength
- True backups are self-contained and can restore data even if the entire source infrastructure is gone.
- Lesson 2417 — Backup vs. Snapshot: Understanding the Difference
- Backups
- – Scheduled, automated snapshots with point-in-time recovery
- Lesson 396 — Introduction to Managed Relational DatabasesLesson 2417 — Backup vs. Snapshot: Understanding the Difference
- Backups and Archival
- Lesson 143 — Object Storage Use Cases
- Backups and archives
- Store massive amounts of data cost-effectively
- Lesson 115 — Object Storage Overview
- backward compatibility
- with older applications but are rarely recommended for new deployments.
- Lesson 237 — Classic/Legacy Load BalancersLesson 2288 — Key Versioning and Backward CompatibilityLesson 2638 — Schema Evolution and VersioningLesson 2654 — Schema Evolution and VersioningLesson 2732 — Event Schema Evolution
- Bad encapsulation
- Exposing 30 variables that map directly to every resource argument, forcing users to understand your internal resource structure.
- Lesson 807 — Module Encapsulation and Abstraction
- Bad example
- Lesson 1019 — Optimizing Layer Order
- Bad examples
- Lesson 146 — Bucket Naming and Namespaces
- Bake config into images
- (inflexible, requires rebuilds)
- Lesson 1247 — ConfigMap Fundamentals and Use Cases
- Balance cost and coverage
- Integration tests are expensive and slow.
- Lesson 2882 — Integration Testing Strategies
- Balanced
- `maxSurge: 25%`, `maxUnavailable: 25%` (Kubernetes default)
- Lesson 1167 — Rolling Update Strategy
- Balanced requirements
- (web servers, small databases, development environments) → **General Purpose** instances provide cost-effective, well-rounded resources.
- Lesson 78 — Choosing Instance Types for Your Workload
- Bandwidth
- (measured in Gbps) is the total amount of data your VM can send or receive per second.
- Lesson 72 — Network Performance Across Instance TypesLesson 608 — Performance Monitoring and AnalyticsLesson 2216 — ExpressRoute Circuit ConfigurationLesson 2226 — Bandwidth vs Throughput vs Latency
- Bandwidth Savings
- You pay less for origin bandwidth since the CDN handles delivery.
- Lesson 582 — What is a CDN and Why Use OneLesson 1097 — Registry Mirroring and Caching
- Bar charts
- compare metrics (error rates across Lambda functions)
- Lesson 673 — CloudWatch DashboardsLesson 2103 — Visualization Types and Best Practices
- Base configurations
- Common manifests shared across all clusters
- Lesson 1945 — Multi-Cluster Management with Flux
- base image
- is the first layer—the foundation—of a container image.
- Lesson 978 — Base Images and Parent LayersLesson 1024 — Base Image Selection
- Base Image Policies
- Only allow images built from approved base images (e.
- Lesson 1084 — Compliance and Policy Enforcement
- base images
- for teams or projects with consistent patterns:
- Lesson 1014 — ONBUILD: Triggered InstructionsLesson 1062 — Public vs Private Registries
- Base layers establish foundations
- – system libraries, shells, package managers
- Lesson 981 — Layer Order and Dependencies
- Base manifests + overlays
- Core Kubernetes YAML in one repo, Kustomize patches in another
- Lesson 1893 — Multiple Source Applications
- base64-encoded
- in YAML manifests.
- Lesson 1263 — Declarative Secret ManifestsLesson 2272 — Kubernetes Secrets Overview
- Baseline establishment
- Historical cost data trains the detection model
- Lesson 2150 — Cost Anomaly DetectionLesson 2969 — Cost Anomaly Detection
- Baseline learning
- The system learns your typical daily, weekly, and seasonal spending
- Lesson 2987 — Cost Anomaly Detection Systems
- Baseline Values
- Establish acceptable ranges from historical data.
- Lesson 2492 — Steady State Hypothesis
- Basic
- Almost never in production (testing only)
- Lesson 392 — GCP IAM Roles: Basic, Predefined, CustomLesson 1090 — Azure Container Registry (ACR) OverviewLesson 2691 — Azure Cache for Redis
- Basic Authentication
- is the simplest approach: you provide a username and password to access the registry.
- Lesson 1079 — Private Registry Authentication
- Basic cache configuration
- Lesson 1750 — Cache Configuration
- Basic Options
- Tags for organization, whether to enable features like DNS resolution, and flow logs for monitoring
- Lesson 174 — Creating a Virtual Network
- Basic parameter syntax
- Lesson 952 — Jinja2 Templates for Parameterization
- Basic pull command
- Lesson 1066 — Pulling Images from a Registry
- Basic scanning
- Uses the open-source Clair scanner (now being phased out)
- Lesson 1089 — ECR Image Scanning with Inspector
- Basic structure
- Lesson 1298 — Mounting PVCs in Pods
- Basic syntax
- Lesson 827 — Moved Blocks and Resource RefactoringLesson 900 — Resource Dependencies and OrderingLesson 1010 — LABEL: Metadata ManagementLesson 1142 — kubectl port-forward for Local AccessLesson 2022 — Logstash Grok Patterns
- Batch processing
- jobs that can checkpoint and resume
- Lesson 2154 — Spot Instances and Preemptible VMsLesson 2503 — Fan-Out/Fan-In PatternLesson 2510 — Scheduled Job Pattern
- Batch processing jobs
- that crunch through massive datasets
- Lesson 67 — Compute Optimized Instance TypesLesson 104 — GCP Preemptible and Spot VMs
- Batch secret retrieval
- when multiple secrets are needed simultaneously
- Lesson 2251 — Secrets Management Cost Optimization
- Batch Sync Patterns
- Lesson 2785 — Cross-Cloud Data Replication Strategies
- Batching
- Configure telemetry exporters to batch data before sending to collectors, reducing network calls.
- Lesson 1643 — Observability Performance Impact
- BBR
- (Bottleneck Bandwidth and RTT) measure actual path capacity instead of inferring congestion from packet loss.
- Lesson 2228 — TCP Performance Optimization
- Be selective
- Only preserve what's necessary (compiled binaries, test reports, deployment packages)
- Lesson 1746 — Job Artifacts
- Be specific early
- narrow by time range first, then add filters
- Lesson 2030 — Kibana Query Language (KQL)
- Before Infrastructure Changes
- Review planned changes to critical resources
- Lesson 1844 — Manual Approval Actions
- Before production deployment
- Review metrics, test results, or business readiness
- Lesson 1662 — Manual Approval GatesLesson 1844 — Manual Approval Actions
- Before promotion
- block artifacts with critical issues from advancing to staging or production
- Lesson 1679 — Artifact Security Scanning
- Before the event
- Lesson 2499 — GameDays and Chaos Testing Practices
- Before/after views
- Show the state pre- and post-deployment
- Lesson 2104 — Time Series and Temporal Context
- BeforeInstall
- Lesson 1834 — CodeDeploy Lifecycle Hooks
- Behavior
- Does this activity match normal patterns?
- Lesson 2848 — Continuous Verification and Contextual Access
- Behavior Analysis
- Systems establish baselines of normal activity patterns—when users typically log in, which resources they access, typical data transfer volumes.
- Lesson 2402 — Continuous Verification and Monitoring
- Behavioral analysis
- Mouse movements, JavaScript execution, browser fingerprints
- Lesson 2372 — Rate Limiting and Bot ManagementLesson 2388 — Anycast and Traffic Scrubbing
- Behavioral analytics
- watches *how* identities behave over time—what they normally do, when, and from where—then flags deviations that suggest account takeover or insider threats.
- Lesson 2858 — Behavioral Analytics and Anomaly DetectionLesson 2863 — Azure Security Center and Sentinel
- Benchmark Regularly
- Measure P50, P95, and P99 latency with and without instrumentation.
- Lesson 2071 — Instrumentation Overhead
- Benchmarking
- measures performance against known standards or baselines.
- Lesson 459 — Performance Testing and Benchmarking
- Benefit
- Maximum resource utilization and instant failover
- Lesson 2451 — Redundancy Principles and Types
- Benefits
- Simpler application code—no need to share session state across servers.
- Lesson 242 — Session Affinity (Sticky Sessions)Lesson 274 — Active-Active and Active-Passive Multi- Region PatternsLesson 403 — Database Parameter GroupsLesson 1023 — Using .dockerignoreLesson 1212 — EndpointSlicesLesson 1339 — Resource OvercommitmentLesson 2075 — Instrumentation Types: Automatic vs ManualLesson 2311 — AWS KMS Key Rotation and Aliasing (+1 more)
- Best for
- sporadic, unpredictable workloads where cost matters most.
- Lesson 510 — Azure Functions: Core Concepts and Hosting PlansLesson 526 — HTTP API vs REST APILesson 991 — Public vs Private RegistriesLesson 1783 — Declarative vs Scripted Pipeline SyntaxLesson 2115 — Request-Based vs. Window-Based SLIsLesson 2365 — WAF Deployment ModelsLesson 2675 — Cache Invalidation StrategiesLesson 2783 — Global Load Balancing Across Clouds (+1 more)
- Best match
- Object storage or file storage often excel here because they're optimized for moving large volumes of data efficiently.
- Lesson 119 — Storage Access Patterns and Workload Types
- Best practice
- Use security groups as your primary control, add NACLs for additional protection.
- Lesson 210 — Security Groups vs NACLs Use CasesLesson 519 — Provider-Specific Security and IAMLesson 1331 — Memory Resource UnitsLesson 2258 — AppRole Authentication for ApplicationsLesson 2983 — Serverless Cost Optimization Patterns
- Best practice violations
- missing tags, hardcoded secrets, deprecated resource types
- Lesson 2877 — Static Analysis and Linting
- Best-Effort Ordering
- Messages are generally delivered in the order sent, but this isn't guaranteed.
- Lesson 555 — AWS SQS Standard Queues
- Best-of-Breed Services
- Lesson 23 — Multi-Cloud Strategy FundamentalsLesson 2751 — What is Multicloud and Why Organizations Adopt It
- Better access control
- File permissions and ownership provide finer-grained control over who reads secrets.
- Lesson 2271 — Volume-Mounted Secrets
- Better availability
- If one instance type is unavailable in an Availability Zone, Auto Scaling can try another from your list.
- Lesson 309 — Mixed Instance Policies
- Better cache efficiency
- Higher overall hit rates across the CDN
- Lesson 591 — Origin Shield and Cache Hierarchies
- Better caching
- – irrelevant file changes won't invalidate your cache
- Lesson 1023 — Using .dockerignore
- Better compliance
- Required for many regulatory frameworks
- Lesson 2811 — Network Optimization for Migration
- Better cost predictability
- Expenses align with actual business activity
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud Computing
- Better developer experience
- Quicker feedback on CI checks
- Lesson 1719 — Caching Dependencies and Build ArtifactsLesson 1817 — AWS Code Services vs Third-Party Tools
- Better example
- Lesson 1019 — Optimizing Layer Order
- Better isolation
- only containers on the same custom bridge can communicate
- Lesson 1042 — Bridge Networks
- Better performance
- Purpose-built for NAT operations
- Lesson 192 — NAT Gateway OverviewLesson 558 — SNS Message FilteringLesson 1212 — EndpointSlicesLesson 2475 — Database Replication Fundamentals
- Better resilience
- Keeps traffic patterns predictable during zone failures
- Lesson 1615 — Locality-Aware Load Balancing
- Better scalability
- The storage system doesn't need complex locking mechanisms
- Lesson 145 — Object Immutability Concepts
- Better security posture
- Traffic never touches the public internet
- Lesson 2211 — Private Connectivity Overview
- Better separation of concerns
- Different handlers for different message types
- Lesson 2715 — Message Attributes and Filtering
- Between Environments
- Control promotion from staging to production
- Lesson 1844 — Manual Approval Actions
- BGP
- with appropriate AS path prepending or local preference to control active/standby or active/active traffic distribution.
- Lesson 2220 — Private Connectivity Redundancy
- BGP (Border Gateway Protocol)
- , each VPN gateway advertises routes with health checks.
- Lesson 2200 — High Availability VPN Connections
- BGP authentication
- using MD5 passwords or TCP-AO to prevent route injection attacks.
- Lesson 2223 — Private Connectivity Security
- BGP session health
- Are routing protocols properly exchanging routes between environments?
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Bicep advantages
- Lesson 921 — Bicep vs ARM Templates
- Bicep CLI
- is your main command-line tool for compiling and validating Bicep files.
- Lesson 922 — Bicep Tooling and CLI
- Big Data Analytics
- Processing large datasets with Apache Spark or Hadoop where keeping data in memory dramatically speeds up computation.
- Lesson 68 — Memory Optimized Instance Types
- BigQuery (Google Cloud)
- for massive-scale analytics—its serverless query engine excels at petabyte datasets
- Lesson 2754 — Multicloud Benefits: Best-of-Breed Services
- Billing hour proximity
- Choose instances closest to their next billing hour (cost optimization)
- Lesson 319 — ASG Termination Policies
- Billing mode
- Pay-per-request is cost-effective for most use cases
- Lesson 787 — DynamoDB for State Locking
- billing model
- (metered or unlimited data)
- Lesson 2203 — Azure ExpressRoute FundamentalsLesson 2216 — ExpressRoute Circuit Configuration
- Binary (base-2)
- Lesson 1331 — Memory Resource Units
- Binary Authorization
- (already covered) to verify container images
- Lesson 1488 — GKE Security: Private Clusters and Hardening
- Binary data
- can corrupt ConfigMaps if not properly encoded.
- Lesson 1259 — ConfigMap Troubleshooting and Validation
- Binary log replication
- MySQL binlog, PostgreSQL logical replication, or Oracle GoldenGate
- Lesson 2822 — Homogeneous Database Migration
- bind mounts
- for development convenience and specific host-path requirements.
- Lesson 1038 — Bind MountsLesson 1039 — tmpfs MountsLesson 1053 — Volume Management in Compose
- Bitbucket
- , and **S3** (for pre-packaged code archives).
- Lesson 1826 — Source Providers and IntegrationLesson 1840 — Source Stage Configuration
- Blackhole destinations
- (packets disappearing at a specific point)
- Lesson 2227 — Network Path Analysis and Traceroute
- Blacklist (geo-blocking)
- Everyone except these countries can access
- Lesson 603 — Geographic Restrictions
- Blacklisting
- is the opposite—you specify which countries *cannot* access your content, while everyone else is allowed.
- Lesson 592 — Geographic Restrictions and Content Blocking
- blast radius
- .
- Lesson 2068 — Trace Analysis PatternsLesson 2305 — Data Key Caching PatternLesson 2493 — Blast Radius and Safety ControlsLesson 2500 — Measuring and Improving ResilienceLesson 2875 — Introduction to Infrastructure Testing
- Blast radius concerns
- arise when one mistake can affect your entire infrastructure.
- Lesson 831 — Scaling Challenges and Patterns
- Blast Radius Limitation
- If an attacker breaches one segment (say, a web server), they're trapped in that zone.
- Lesson 2390 — Network Segmentation Fundamentals
- Blast radius reduction
- If something goes wrong in the database partition, your networking remains untouched.
- Lesson 834 — State File PartitioningLesson 2262 — Dynamic Secrets Fundamentals
- Blob triggers
- Execute when files are added/modified
- Lesson 511 — Azure Functions: Bindings and Triggers
- Block
- Raw volumes, single VM attachment, high performance, manual filesystem setup
- Lesson 114 — File Storage OverviewLesson 123 — Comparing Storage Types: When to Use WhatLesson 140 — Object Storage vs. Block vs. FileLesson 1399 — Pod Security Admission ControllerLesson 2362 — Policy-Based Governance AutomationLesson 2368 — AWS WAF FundamentalsLesson 2369 — AWS WAF Rules and Rule Groups
- Block malicious traffic
- (like DDoS attacks) early
- Lesson 282 — Rate Limiting and Throttling at Load Balancer
- block storage
- (from our previous lesson) acts like a raw hard drive attached to one VM at a time, **file storage** is network-attached and shareable:
- Lesson 114 — File Storage OverviewLesson 116 — Durability and Availability in StorageLesson 125 — Block Storage vs Other Storage TypesLesson 140 — Object Storage vs. Block vs. FileLesson 2436 — Cross-Region Replication Setup
- Block unsigned images
- (verifying they passed content trust checks like Notary)
- Lesson 1078 — Admission Controllers for Image Policy
- Block-Level Replication
- Lesson 2429 — Continuous Data Protection (CDP)Lesson 2439 — Storage Replication Strategies
- Blocking I/O operations
- – synchronous calls when async would work
- Lesson 2547 — Execution Duration Optimization
- Blocking non-compliant changes
- in CI/CD pipelines
- Lesson 2886 — Compliance Testing with Open Policy Agent
- blocks
- , each with a unique identifier.
- Lesson 113 — Block Storage OverviewLesson 726 — HCL Syntax Fundamentals
- Blue environment
- is live, serving all production traffic through your load balancer's target group
- Lesson 277 — Blue-Green Deployments with Load BalancersLesson 1664 — Blue-Green Deployment PatternLesson 1835 — Blue/Green Deployments with CodeDeploy
- Blue Ocean
- Modern, visual pipeline editor and dashboard
- Lesson 1775 — Jenkins Plugins and Extensibility
- blue-green deployment
- uses your load balancer to maintain two complete, identical production environments—let's call them "Blue" (current) and "Green" (new).
- Lesson 277 — Blue-Green Deployments with Load BalancersLesson 1767 — Deployment Strategies and Environments
- Blue-Green deployment patterns
- you've learned—the infrastructure changes, but feature flags control *what users experience*.
- Lesson 1666 — Feature Flag Integration
- Blue-green deployments
- maintain two identical environments.
- Lesson 720 — Rollback StrategiesLesson 1321 — Volume CloningLesson 1663 — Rollback and Recovery PatternsLesson 1665 — Canary Deployment PatternLesson 1872 — Progressive Delivery with GitOpsLesson 1912 — Progressive Delivery with Argo Rollouts
- Blue-green transitions
- Gradually shift traffic between environments
- Lesson 1605 — Traffic Splitting and Weighted Routing
- Blue-green upgrades
- involve creating an entirely new cluster (the "green" environment) running the target version, then migrating your workloads from the old cluster (the "blue" environment).
- Lesson 1507 — In-Place vs Blue-Green Cluster Upgrades
- Blue/Green Deployment
- A completely new set of instances (green) is provisioned with the new version while the old instances (blue) continue running.
- Lesson 1831 — CodeDeploy Overview and Deployment Types
- Boolean constraints
- Enable or disable a feature entirely (e.
- Lesson 2344 — GCP Organization Policy Service
- Boolean Filters
- Accept all (`TrueFilter`) or none (`FalseFilter`)
- Lesson 561 — Azure Service Bus Topics
- Boolean parameters
- offer simple yes/no toggles for feature flags:
- Lesson 1788 — Parameters and User Input
- boot volumes
- for VMs or containers
- Lesson 123 — Comparing Storage Types: When to Use WhatLesson 124 — Block Storage OverviewLesson 125 — Block Storage vs Other Storage Types
- Bootable volumes
- – you can install operating systems on block storage
- Lesson 125 — Block Storage vs Other Storage Types
- Bootstrapping
- the Git connection, which means configuring Flux to watch a specific repository and sync its contents to your cluster
- Lesson 1921 — Installing Flux on a Kubernetes Cluster
- Bot management
- goes deeper, analyzing request patterns to distinguish "good bots" (like search engine crawlers or monitoring tools) from "bad bots" (credential stuffers, scrapers, or DDoS participants).
- Lesson 2372 — Rate Limiting and Bot Management
- both
- a permission boundary to allow something *and* a regular policy to grant it.
- Lesson 369 — Policy Boundaries and GuardrailsLesson 384 — AWS Organizations and SCPsLesson 645 — Composite AlarmsLesson 1157 — Label Selectors in ReplicaSetsLesson 1242 — Port and Protocol SpecificationsLesson 1565 — Service Mesh vs API GatewayLesson 1718 — Concurrency Control and Job DependenciesLesson 2075 — Instrumentation Types: Automatic vs Manual (+4 more)
- Both parties verify
- the other's certificate against a trusted Certificate Authority (CA)
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- Bottleneck Identification
- These tools pinpoint exactly where traffic is blocked.
- Lesson 2188 — Network Path Analysis Tools
- Bottom tier
- Individual Prometheus instances scrape application metrics
- Lesson 1979 — Prometheus Federation Basics
- Bottom-up approach
- Migrate databases and backend services before the applications that consume them
- Lesson 2829 — Dependency Mapping and Migration Order
- Bound
- Successfully matched to a PV
- Lesson 1291 — PV and PVC Binding ProcessLesson 1299 — PV and PVC Lifecycle States
- Bounded Staleness
- Reads might lag by a defined amount (time or number of versions).
- Lesson 437 — Cosmos DB Consistency LevelsLesson 2709 — Cache Consistency and Trade-offs
- Branch protection rules
- prevent direct commits to `main` or `production` branches
- Lesson 1874 — GitOps Access Control
- Branch-based environments
- Create separate Applications for `main`, `staging`, and `dev` branches, each pointing to different clusters.
- Lesson 1908 — Git Generator Patterns
- Branch-based promotion
- Lesson 1868 — Environment Promotion Patterns
- branches
- to test infrastructure changes safely, then merge them after review—just like application code.
- Lesson 687 — IaC Benefits: Version Control and CollaborationLesson 1908 — Git Generator Patterns
- Branching
- Test dashboard changes safely before merging
- Lesson 2111 — Dashboard as Code and Version Control
- Branching strategy
- Development environment tied to feature branches, staging to main branch, production to tagged releases
- Lesson 712 — Environment Separation Strategies
- Breach impact grows
- Unencrypted data stolen in a breach is immediately readable
- Lesson 2839 — Encryption by Default
- Breaking it down
- Lesson 785 — Configuring S3 BackendLesson 1147 — Creating Pods with YAML ManifestsLesson 1973 — Histogram and Quantile Queries
- Broadcast address
- (last IP) - Network broadcast operations
- Lesson 179 — Reserved IP Addresses in Subnets
- Browser/Client Cache
- Stores static assets locally (Cache-Control headers)
- Lesson 2708 — Multi-Layer Caching Strategies
- Budget accountability
- (managing spend within allocated budgets)
- Lesson 2954 — Shared Responsibility Model
- Budget enforcement
- Set alerts when a tagged group exceeds limits
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Budgets
- let you set spending thresholds with customizable alert rules.
- Lesson 2173 — Azure Cost Management and Billing
- Buffer Configuration
- Reduce in-memory buffering if your backend can keep up.
- Lesson 1442 — Logging Performance and Overhead
- Buffer sizes
- on both sender and receiver must be large enough to accommodate your bandwidth-delay product (BDP = bandwidth × RTT).
- Lesson 2228 — TCP Performance Optimization
- Bug Fixes
- Discovered your processing logic had a bug last month?
- Lesson 2731 — Event Replay and Reprocessing
- Build
- separate images for each architecture (amd64, arm64, etc.
- Lesson 996 — Multi-Architecture ImagesLesson 1055 — Build Configuration and ContextLesson 1657 — Linear Pipeline PatternLesson 1740 — Basic Pipeline Patterns: Build, Test, DeployLesson 1830 — CodeBuild with Docker and ECRLesson 1841 — Pipeline Actions and Action Types
- Build a Roadmap
- Prioritize capabilities like any product backlog.
- Lesson 2938 — Platform as a Product Mindset
- Build and test
- your artifact in early workflow jobs
- Lesson 1725 — Deployment Strategies and Blue-Green Patterns
- Build arguments
- let you parameterize builds with variables, while **secrets** require special handling to prevent leaking credentials into image layers.
- Lesson 1028 — Build Arguments and Secrets
- Build artifacts
- Compilers, build tools, and intermediate files needed only during image creation.
- Lesson 985 — Layer Size and Bloat
- Build confidence
- in your circuit breakers, health checks, and failover automation
- Lesson 2490 — Introduction to Chaos Engineering
- Build Environment
- details like builder version, build tools, timestamps, and build parameters complete the picture.
- Lesson 1677 — Artifact Metadata and Traceability
- Build Executor Status
- Shows active builds running on agents
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Build History
- Left sidebar showing numbered builds with status
- Lesson 1782 — Jenkins UI Navigation and Monitoring BuildsLesson 1808 — Backup and Disaster Recovery
- Build isolation
- Each build gets a fresh, clean environment
- Lesson 1801 — Kubernetes Plugin for Dynamic Agents
- Build optimization
- When building images, unchanged layers are reused from cache.
- Lesson 975 — Image Layers: The Foundation
- Build ordering
- respects the dependency graph—you can't deploy Service C until Services A and B (its dependencies) have successfully deployed and passed their tests.
- Lesson 1669 — Microservices Pipeline Orchestration
- Build outputs
- that don't change between identical code states
- Lesson 1719 — Caching Dependencies and Build Artifacts
- Build parameters
- transform a single job into a flexible template that accepts input at runtime—like function arguments in programming.
- Lesson 1778 — Build Parameters and Environment Variables
- Build Provenance
- includes the git commit SHA, branch name, repository URL, and the identity of who or what triggered the build.
- Lesson 1677 — Artifact Metadata and Traceability
- Build stage
- Compile code, package artifacts
- Lesson 1786 — Stages and Steps OrganizationLesson 1818 — Integration Between AWS Code ServicesLesson 1839 — Creating a Basic PipelineLesson 1842 — Build Stage with CodeBuild IntegrationLesson 2345 — Continuous Compliance Scanning
- Build team confidence
- in both the chaos tooling and recovery procedures
- Lesson 2494 — Chaos Experiments in Non-Production
- Build Team Skills
- Lesson 1864 — GitOps Adoption Strategy
- Build the new service
- Create a microservice that implements that functionality
- Lesson 2598 — Strangler Fig Pattern for Migration
- Build timeline
- Graphical view of build durations
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Build tools and integrations
- (Git, Maven, Docker, Kubernetes)
- Lesson 1775 — Jenkins Plugins and Extensibility
- Build, Test, Deploy
- pattern is the industry-standard workflow that ensures code quality gates before release.
- Lesson 1740 — Basic Pipeline Patterns: Build, Test, Deploy
- Built-in analytics rules
- Pre-configured threat detection based on Microsoft's security research
- Lesson 2863 — Azure Security Center and Sentinel
- Built-in best practices
- (security, compliance, observability)
- Lesson 2940 — Golden Paths and Paved Roads
- Built-in parsers
- JSON, regex, and common log formats supported
- Lesson 2027 — Fluent Bit for Edge Collection
- Built-in proxy
- A simple Go-based proxy included with Consul, suitable for development or basic workloads
- Lesson 1594 — Consul Connect and Sidecar Proxies
- Built-in redundancy
- No need to buy duplicate hardware for failover
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the Cloud
- built-in roles
- pre-configured sets of permissions that define what actions someone can perform on your cloud resources.
- Lesson 387 — Azure Built-in RolesLesson 1890 — ArgoCD RBAC and User Management
- Built-in Scaling
- App Service can automatically scale your application up (more powerful instances) or out (more instances) based on traffic demand—similar to the elasticity and auto-scaling concepts you've learned, but without configuring virtual machine infrastru...
- Lesson 101 — Azure App Service Overview
- Bulk Indexing
- Lesson 2032 — ELK/EFK Performance Tuning
- Bulk operations
- let you add or remove multiple users at once—essential for onboarding entire teams or responding to security incidents quickly.
- Lesson 351 — Assigning Users to Groups
- Burst allowances
- Allow short traffic spikes but throttle sustained high volume
- Lesson 282 — Rate Limiting and Throttling at Load BalancerLesson 2385 — Rate Limiting and Throttling
- Burst capacity
- A temporary allowance for sudden spikes (like filling a bucket that drains at the steady-state rate)
- Lesson 531 — Throttling and Rate LimitingLesson 2540 — Serverless API Rate Limiting and Throttling
- Burst into public cloud
- when you need extra computing power temporarily
- Lesson 22 — Hybrid Cloud Deployment Model
- Burst tolerance
- How much spike traffic you need to absorb
- Lesson 2742 — Queue Depth and Capacity Planning
- Burst traffic
- – Many simultaneous requests trigger multiple cold starts
- Lesson 463 — Cold Starts and Warm Starts
- Burstable
- AWS T-series credits = Azure B-series credits = (GCP uses different approach)
- Lesson 109 — Cross-Provider Compute Feature Comparison
- Burstable Performance
- Lower baseline with occasional burst capacity for dev/test (e.
- Lesson 399 — Database Instance Classes
- Business
- Product line, customer segment, department
- Lesson 2633 — Data Partitioning StrategiesLesson 2948 — What is FinOps?
- Business agility
- requires rapid feature deployment and independent service updates
- Lesson 2794 — Refactor/Re-architect StrategyLesson 2956 — Executive Buy-in and Sponsorship
- Business continuity
- Leveraging cloud provider disaster recovery capabilities, global redundancy, and high availability without building it yourself.
- Lesson 2790 — Introduction to Cloud Migration
- Business criticality
- – Lower-risk applications migrate first to build confidence and refine processes
- Lesson 2812 — Migration Wave Planning and Execution
- Business Impact Analysis (BIA)
- is the structured process of identifying and ranking your critical business functions, then mapping them to supporting IT systems to determine appropriate RTO and RPO values.
- Lesson 2410 — Business Impact Analysis (BIA)
- Business logic
- Integrate with external databases or services for authorization
- Lesson 1626 — External Authorization Integration
- Business logic delays
- Process refunds after return window closes
- Lesson 2723 — Delay Queues and Message Timers
- Business Logic Validation
- Run queries that verify business rules—account balances sum correctly, foreign key relationships intact, date ranges valid.
- Lesson 2830 — Data Validation and Consistency Checks
- Business operations
- Orders placed, accounts created, payments processed
- Lesson 638 — Custom Metrics and Instrumentation
- Business requirements
- Can your application tolerate stale data?
- Lesson 2709 — Cache Consistency and Trade-offs
- Business Risks
- Extended downtime, loss of functionality, user disruption, compliance violations.
- Lesson 2803 — Risk Assessment and Mitigation
- Business Rule Validation
- Apply domain logic—checking that prices are positive, dates fall within reasonable ranges, or required fields aren't null.
- Lesson 2624 — Data Quality in Batch Pipelines
- Business strategy
- Roll out features gradually by region or enforce pricing tiers by geography.
- Lesson 603 — Geographic Restrictions
- Business units
- (organizational divisions like "Product Engineering" or "Sales Operations")
- Lesson 2965 — Cost Centers and Business Units
- Business-unit waves
- Migrate entire business units or product lines together to minimize cross-team coordination.
- Lesson 2802 — Migration Wave Planning
- By aggregate ID
- All events for `Order-123` go to partition `hash(Order-123)`
- Lesson 2739 — Event Store Implementation Patterns
- By Capability
- Run your ML training pipelines on Google Cloud (for strong AI/ML tools), host databases on AWS (for mature RDS offerings), and deploy static content on Azure (for CDN integration with your existing Microsoft stack).
- Lesson 2761 — Multicloud Architecture Patterns: Workload Distribution
- By File
- Delete everything defined in a YAML file (reverses `kubectl apply`):
- Lesson 1136 — Deleting Resources with kubectl delete
- By function
- Different groups for different services—one for SSH bastion hosts, another for internal APIs, another for batch processing jobs.
- Lesson 2395 — Segmentation with Security Groups
- By Geography
- Use AWS in North America, Alibaba Cloud in China (for regulatory compliance), and Google Cloud in Europe—each serving their regional user base optimally.
- Lesson 2761 — Multicloud Architecture Patterns: Workload Distribution
- By Selector
- Remove multiple resources matching labels:
- Lesson 1136 — Deleting Resources with kubectl delete
- By tenant
- Isolate customer data for security and performance
- Lesson 2739 — Event Store Implementation Patterns
- By tier
- Create separate security groups for web, application, and database layers.
- Lesson 2395 — Segmentation with Security Groups
- By time
- Archive older events to cold storage, keep recent ones hot
- Lesson 2739 — Event Store Implementation Patterns
- By Workload Type
- Place latency-sensitive applications close to users on one provider, batch processing jobs on the cheapest provider, and GPU-intensive workloads where GPU availability and pricing are best.
- Lesson 2761 — Multicloud Architecture Patterns: Workload Distribution
C
- CA bundle
- The certificate authority used to verify your webhook's TLS certificate
- Lesson 1411 — Webhook Configuration and Registration
- CA unavailability
- If the control plane is down, proxies can't renew certificates
- Lesson 1628 — Certificate Rotation and Expiry
- CaaS
- is like a pod hotel—you get standardized, efficient rooms (containers) that are ready to use, but you still control what goes inside them
- Lesson 18 — Container as a Service (CaaS) Introduction
- CaaS sits in between
- The cloud provider manages the container orchestration platform (the system that runs and coordinates your containers), while you maintain control over your containers' contents and configurations.
- Lesson 18 — Container as a Service (CaaS) Introduction
- Cache aggressively
- Avoid recomputing or re-fetching the same data
- Lesson 2165 — Cost-Aware Architecture PatternsLesson 2547 — Execution Duration Optimization
- Cache Check
- The edge server checks if it has the requested content cached (cache hit) or needs to fetch it from the origin (cache miss).
- Lesson 586 — CDN Request Flow and Routing
- Cache expiration
- Setting time-to-live (TTL) values to refresh stale data automatically
- Lesson 453 — Caching Strategies for Databases
- Cache Hit
- The edge server *has* the requested content in its cache and can serve it immediately to the user without contacting the origin server.
- Lesson 585 — Cache Hit vs Cache MissLesson 611 — Edge vs. Origin: The Request FlowLesson 2671 — CDN Caching Fundamentals ReviewLesson 2697 — Cache-Aside (Lazy Loading) Pattern
- cache hit ratio
- the percentage of requests served from cache.
- Lesson 585 — Cache Hit vs Cache MissLesson 608 — Performance Monitoring and AnalyticsLesson 609 — Cost Optimization StrategiesLesson 2680 — CDN Cache Analytics and Hit Rates
- Cache hit/miss ratios
- When caching is enabled, this shows effectiveness
- Lesson 535 — API Gateway Monitoring and Logs
- Cache invalidation
- (also called **purging** or **clearing**) tells the CDN to immediately remove specific cached objects so the next request fetches fresh content from the origin.
- Lesson 600 — Cache Invalidation and PurgingLesson 2594 — Distributed Caching Strategies
- Cache invalidation coordination
- Broadcasting cache-clear events across multiple application servers
- Lesson 2685 — Redis Pub/Sub and Messaging
- cache key
- from the incoming request—typically from the URL.
- Lesson 607 — Cache Key NormalizationLesson 1719 — Caching Dependencies and Build ArtifactsLesson 2673 — Vary Header and Cache Keys
- Cache Miss
- The edge server *does not* have the content in its cache, so it must fetch it from the origin server first, then deliver it to the user (and typically store it for future requests).
- Lesson 585 — Cache Hit vs Cache MissLesson 600 — Cache Invalidation and PurgingLesson 611 — Edge vs. Origin: The Request FlowLesson 2671 — CDN Caching Fundamentals ReviewLesson 2697 — Cache- Aside (Lazy Loading) Pattern
- Cache optimization
- Override origin headers by setting `Cache-Control: max-age=3600` to cache content longer at the edge.
- Lesson 604 — Response Header Customization
- Cache partial responses correctly
- each byte range is cached independently based on cache keys that include the range
- Lesson 606 — Range Requests and Partial Content
- Cache policy
- How long to cache (TTL), which headers to respect
- Lesson 595 — Cache Behavior Configuration
- Cache secrets in memory
- after retrieval (refresh periodically rather than per-request)
- Lesson 2251 — Secrets Management Cost Optimization
- Cache tags
- If you've labeled content groups with custom headers
- Lesson 600 — Cache Invalidation and Purging
- Cache with query frontend
- Use Grafana's caching features to reduce load on data sources.
- Lesson 2003 — Grafana Best Practices and Performance
- Cache-aside
- Application checks cache, queries database on miss, then populates cache
- Lesson 453 — Caching Strategies for DatabasesLesson 2595 — Cache-Aside and Read-Through PatternsLesson 2681 — Multi-Tier Caching with CDN
- Cache-Aside (Lazy Loading)
- Your service checks the cache first.
- Lesson 2594 — Distributed Caching StrategiesLesson 2683 — Cache-Aside vs Write-Through Patterns
- cache-aside pattern
- , your application logic:
- Lesson 2694 — Database Query Result CachingLesson 2697 — Cache-Aside (Lazy Loading) PatternLesson 2708 — Multi-Layer Caching Strategies
- cache-control headers
- come in—they're instructions that tell the CDN (and browsers) how long to store content before fetching a fresh copy.
- Lesson 587 — TTL and Cache Control HeadersLesson 596 — TTL and Cache Control Headers
- Cache-warming
- solves this by deliberately requesting content before real traffic arrives, populating edge locations with "hot" cached copies.
- Lesson 2676 — Cache-Warming and Preloading
- Caches
- responses to improve performance
- Lesson 520 — What is an API Gateway?Lesson 1765 — Cache Optimization and Artifacts
- caching
- saves files—like package dependencies (`node_modules`, Python `pip` packages) or compiled code—between workflow runs.
- Lesson 1719 — Caching Dependencies and Build ArtifactsLesson 2502 — API Gateway Integration Pattern
- Caching and Efficiency
- Lesson 2110 — Dashboard Performance and Query Optimization
- Caching layers
- (ElastiCache, Redis) for temporary state
- Lesson 464 — Stateless Function DesignLesson 1681 — Artifact Distribution and Caching
- Cadence
- are open-source alternatives that let you define workflows in general-purpose code (Go, Java, Python, TypeScript) that can run anywhere—on-premises, multi-cloud, or hybrid environments.
- Lesson 2529 — Temporal and Alternative Orchestrators
- Calculates the diff
- – Compares the two and determines what needs to be created, updated, or destroyed
- Lesson 771 — terraform plan Explained
- can
- usually resize within the same instance family (e.
- Lesson 89 — Instance Resize and Type ChangesLesson 1245 — Testing and Troubleshooting NetworkPolicies
- Can preemption help
- It identifies nodes where evicting lower-priority pods would free enough resources.
- Lesson 1371 — Pod Preemption Behavior
- Canary
- and **Blue-Green deployment patterns** you've learned—the infrastructure changes, but feature flags control *what users experience*.
- Lesson 1666 — Feature Flag IntegrationLesson 1835 — Blue/Green Deployments with CodeDeploy
- Canary Deployment
- Roll out changes to a small subset of users first (the "canary").
- Lesson 1767 — Deployment Strategies and Environments
- Canary Deployment Pattern
- is a release strategy where you deploy new code to a small subset of users or servers before rolling it out to everyone.
- Lesson 1665 — Canary Deployment Pattern
- canary deployments
- a pattern named after "canary in a coal mine.
- Lesson 276 — Weighted Target Groups and Canary DeploymentsLesson 328 — MIG Rolling Updates and Canary DeploymentsLesson 1183 — Partition-Based Rolling UpdatesLesson 1605 — Traffic Splitting and Weighted RoutingLesson 1725 — Deployment Strategies and Blue-Green PatternsLesson 1872 — Progressive Delivery with GitOpsLesson 1912 — Progressive Delivery with Argo RolloutsLesson 1940 — Progressive Delivery with Flagger
- Canary releases
- Route users with a `beta-tester: true` header to version 2.
- Lesson 1604 — Request Routing Based on Headers and Paths
- Cancelled
- Someone manually stopped the workflow or a timeout occurred (gray circle with slash)
- Lesson 1694 — Workflow Status and Logs
- cannot
- initiate inbound connections to them—they remain protected.
- Lesson 185 — Network Address Translation (NAT) PreviewLesson 217 — VPC Peering Routing and LimitationsLesson 427 — Restoring from BackupsLesson 796 — Multiple Environment State ManagementLesson 1057 — Scaling Services with ComposeLesson 1059 — Compose Best Practices and LimitationsLesson 1245 — Testing and Troubleshooting NetworkPoliciesLesson 1546 — Subcharts and Values Overrides (+1 more)
- Capacity
- – The `resources.
- Lesson 1297 — Creating PersistentVolumeClaimsLesson 2725 — Provider-Specific Queue Services
- Capacity buffer
- If one instance fails, remaining instances absorb the load
- Lesson 2457 — Load Distribution for Availability
- Capacity Planners
- focus on trends over weeks or months—CPU usage growth, storage consumption—not minute-by- minute fluctuations.
- Lesson 2100 — Dashboard Purpose and Audience
- capacity planning
- the art of matching infrastructure to workload.
- Lesson 1990 — Capacity Planning and Resource LimitsLesson 2413 — Mean Time Between Failures (MTBF)
- Capacity planning dashboards
- inform infrastructure teams about growth trends
- Lesson 2100 — Dashboard Purpose and Audience
- Capacity Settings
- – Your minimum, maximum, and desired instance counts
- Lesson 313 — AWS Auto Scaling Groups (ASG) Overview
- Capacity Units
- Many serverless databases (like DynamoDB On-Demand or Aurora Serverless) use abstracted units that automatically adjust.
- Lesson 2530 — Serverless Database Concepts
- Capacity vs demand
- Are you over-provisioned or under-provisioned?
- Lesson 312 — Scaling Policy Monitoring
- Capacity-optimized
- Prioritizes pools with deepest capacity (lowest interruption likelihood)
- Lesson 2978 — Spot Instance Fleet Management
- CapEx
- approaches where you'd purchase physical hardware for worst-case scenarios, leaving expensive equipment underutilized most of the time.
- Lesson 32 — Elasticity and Cost Benefits of Auto-Scaling
- Capital Expenditure (CapEx)
- is money spent upfront to purchase physical assets.
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud ComputingLesson 2799 — TCO Analysis for Migration
- Capital expenses (CapEx)
- Servers, storage, networking equipment, facility construction
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the Cloud
- Capture events
- triggered by user actions or system changes
- Lesson 2508 — Event Sourcing with Functions
- Cardinality
- is the count of unique combinations across all label values.
- Lesson 630 — Metric Cardinality and DimensionalityLesson 1960 — Data Retention and StorageLesson 1990 — Capacity Planning and Resource Limits
- Cascading failures
- Overloaded consumers slow down, causing timeout errors upstream
- Lesson 2740 — Understanding Backpressure in Distributed SystemsLesson 2744 — Rate Limiting Fundamentals
- Case-insensitive
- for instructions, but UPPERCASE is convention
- Lesson 1000 — Dockerfile Structure and Parsing
- Cassandra
- (high write throughput, distributed)
- Lesson 2091 — Zipkin FundamentalsLesson 2096 — Backend Storage Considerations
- Cassandra API
- Works with Apache Cassandra clients — column-family data model
- Lesson 436 — Azure Cosmos DB: Architecture and APIsLesson 2534 — Azure Cosmos DB Serverless
- catch blocks
- (handle specific errors), and **fallback strategies** (alternative execution paths).
- Lesson 2520 — Error Handling in State MachinesLesson 2526 — Workflow Monitoring and Debugging
- Catch bugs early
- Infinite loops or hanging operations fail fast
- Lesson 476 — Function Timeout Configuration
- Catch integration issues
- Verify cross-resource dependencies and configurations in realistic conditions
- Lesson 2883 — Ephemeral Test Environments
- Catches delayed failures
- (memory leaks, race conditions, external dependency issues)
- Lesson 1173 — MinReadySeconds and Stability
- CDN Caching
- places static or semi-static responses at edge locations worldwide.
- Lesson 2549 — Caching Strategies in Functions
- CDN Edge Cache
- – Closest to users, handles the majority of traffic
- Lesson 2681 — Multi-Tier Caching with CDNLesson 2708 — Multi-Layer Caching Strategies
- CDN Integration
- leverages Content Delivery Networks to distribute large artifacts globally.
- Lesson 1681 — Artifact Distribution and Caching
- Centralize common patterns
- Store policies in a version-controlled repository organized by compliance framework or control family (e.
- Lesson 2347 — Policy Libraries and Reusability
- Centralize standards
- Ensure everyone uses the approved template, not old copies
- Lesson 908 — Template Specs for Reusable Templates
- Centralized access control
- for all AWS services (EC2, S3, Lambda, RDS—everything)
- Lesson 376 — AWS IAM Service Overview
- Centralized authentication
- Users sign in with Azure AD accounts
- Lesson 1498 — AKS Integration with Azure Active Directory
- Centralized backend configuration
- One team manages the connection to AWS Secrets Manager, and all application teams reference it.
- Lesson 1279 — ClusterSecretStore Resource
- Centralized Configuration Management
- Use tools like GitOps to maintain a single source of truth for cluster configurations.
- Lesson 1513 — Multi-Cluster Management
- Centralized control
- One place to manage all encryption keys
- Lesson 2280 — Introduction to Key Management Systems
- Centralized dependency management
- All teams access packages from a single source of truth, preventing "works on my machine" scenarios caused by different package versions.
- Lesson 1815 — CodeArtifact: Artifact Repository Service
- Centralized governance
- Network admins control routing, DNS, and connectivity patterns
- Lesson 230 — Shared VPCs and Multi-Account NetworkingLesson 2763 — Evaluating When Multicloud is the Right Strategy
- Centralized logging
- means all logs from all sources flow into a single, searchable repository.
- Lesson 657 — Centralized Logging Concepts
- Centralized management
- One sync controls many applications
- Lesson 1913 — App of Apps PatternLesson 2209 — SD-WAN Integration with CloudLesson 2423 — VM and Volume Backup Strategies
- Centralized permission sets
- that define what users can do in each account
- Lesson 383 — AWS IAM Identity Center (SSO)
- Centralized policy enforcement
- across your entire mesh
- Lesson 1576 — Istio Overview and Core Value Proposition
- Centralized policy management
- across thousands of storage buckets and volumes
- Lesson 2980 — Storage Lifecycle Optimization
- Centralized routing
- The transit gateway manages all inter-VPC traffic
- Lesson 218 — Transit Gateway ConceptsLesson 2208 — Transit Gateway for Hybrid Networks
- Centralized service registry
- A single source of truth (like Consul or a custom registry) that tracks services regardless of their cloud location.
- Lesson 2784 — Multicloud Service Discovery
- Centralized Session Stores
- Lesson 2463 — Session Management in Stateless Systems
- Centralized shipping
- Each agent forwards collected logs to your chosen destination (Elasticsearch, Splunk, CloudWatch, etc.
- Lesson 1434 — Node-Level Logging Agents
- Centralized updates
- Fix or improve in one place
- Lesson 1716 — Workflow Templates and Reusable Workflows
- Centralized visibility
- into total cloud spend across the organization
- Lesson 2147 — Multi-Account Cost Consolidation
- Certificate age distribution
- Are some services holding expired certificates?
- Lesson 1628 — Certificate Rotation and Expiry
- Certificate automation
- The mesh handles certificate generation, rotation, and distribution
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- Certificate expiration time
- How much time remains before expiry
- Lesson 1628 — Certificate Rotation and Expiry
- Certificate expiry
- mTLS certificates nearing expiration dates.
- Lesson 1642 — Alerting on Service Mesh Metrics
- Certificate management
- Automatic rotation and distribution of security credentials
- Lesson 1617 — Service Mesh Security Overview
- Certificate managers
- verifying certificates are issued and valid
- Lesson 1914 — Resource Health Customization
- Certificate validation errors
- Refuse connection rather than proceeding insecurely
- Lesson 2837 — Fail Secure Principles
- Certificates
- for authentication
- Lesson 1777 — Jenkins Credentials ManagementLesson 2242 — Azure Key Vault Fundamentals
- cgroups
- , are a Linux kernel feature that put guardrails around resource consumption.
- Lesson 964 — Resource Limits with cgroupsLesson 965 — Container Portability Benefits
- Chaining
- Execute functions in sequence, passing outputs to inputs
- Lesson 512 — Azure Functions: Durable Functions
- Challenge mechanisms
- CAPTCHA, JavaScript puzzles, proof-of-work
- Lesson 2372 — Rate Limiting and Bot Management
- Challenges
- Lesson 274 — Active-Active and Active-Passive Multi-Region PatternsLesson 2699 — Write-Behind (Write- Back) Caching Pattern
- Change approval workflows
- Require peer review before policy updates
- Lesson 375 — Policy Documentation and Governance
- Change Data Capture (CDC)
- , meaning you can react to data changes in real-time without constantly polling your database.
- Lesson 434 — DynamoDB Streams and Change Data CaptureLesson 2787 — Cross-Cloud Database ReplicationLesson 2825 — Continuous Data Replication for Databases
- Change logs
- Track major infrastructure changes and their rationale
- Lesson 717 — Documentation and Comments
- Change management and planning
- in Infrastructure as Code means always knowing what will happen *before* you make changes to real systems.
- Lesson 718 — Change Management and Planning
- Change room layouts carefully
- (type changes) — risky; needs explicit handling
- Lesson 2638 — Schema Evolution and Versioning
- change set
- is like a "preview" or "diff" of what will happen when you update your stack.
- Lesson 851 — Stack Updates and Change SetsLesson 878 — Stack Updates and Change Sets
- Change Tracking
- Lesson 2429 — Continuous Data Protection (CDP)
- Changes
- Source control commits that triggered this build
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Changes cost per millisecond
- Higher memory = higher per-ms cost, BUT faster execution may reduce total billable time
- Lesson 475 — Function Memory and CPU Allocation
- Chaos engineering
- flips this: it intentionally breaks things in production-like environments to discover **unknown weaknesses**.
- Lesson 2491 — Chaos Engineering vs Traditional TestingLesson 2501 — Event-Driven Invocation PatternLesson 2776 — Portability Testing and Validation
- Characteristics
- Lesson 1865 — Pull-Based vs Push-Based GitOps
- chargeback
- are two approaches for distributing cloud cost visibility internally, but they serve different purposes.
- Lesson 2146 — Showback vs Chargeback ModelsLesson 2958 — Showback vs ChargebackLesson 2966 — Showback vs Chargeback Models
- Chargeback/showback
- Accurately bill internal teams or customers
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Chart version
- Lesson 1531 — Release History and StatusLesson 1532 — Helm Versioning and Chart Versions
- Chart.yaml
- Metadata about the chart (name, version, description, maintainers)
- Lesson 1522 — Charts: Helm's Packaging Format
- Check
- Run `kubectl describe pod <pod-name>` and look for events like "0/5 nodes are available: 5 node(s) didn't match node selector" or "didn't match pod affinity rules.
- Lesson 1359 — Affinity Troubleshooting
- Check application logs
- `kubectl exec my-pod -- cat /var/log/app.
- Lesson 1140 — kubectl exec: Executing Commands in Containers
- Check BGP
- Verify peer status and advertised routes
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Check cache first
- Application queries the cache with a key
- Lesson 2697 — Cache-Aside (Lazy Loading) Pattern
- Check cluster capacity
- Use `kubectl top nodes` and review available resources
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Check for Explicit Allow
- – If no explicit deny exists, AWS looks for at least one policy that explicitly allows the action.
- Lesson 381 — AWS IAM Policy Evaluation Logic
- Check for Explicit Deny
- – If *any* policy explicitly denies the action, access is **immediately blocked**.
- Lesson 381 — AWS IAM Policy Evaluation Logic
- Check Frequency Trade-offs
- Frequent checks (every 5 seconds) detect failures faster but consume resources.
- Lesson 2455 — Health Checks and Failure Detection
- Check network exposure
- for overly permissive security groups or public access
- Lesson 2868 — Vulnerability Scanning and Management
- Check Node resource usage
- Lesson 1342 — Monitoring Resource Usage
- Check Pod resource usage
- Lesson 1342 — Monitoring Resource Usage
- Check real dependencies
- A liveness probe should verify the application process itself works.
- Lesson 1427 — Designing Effective Health Check Endpoints
- Checking Reconciliation Status
- Lesson 1931 — Flux CLI and Troubleshooting Commands
- Checkov
- is a policy-as-code tool that scans Terraform, CloudFormation, Kubernetes manifests, and more.
- Lesson 2884 — Security Scanning in IaC Tests
- checkpoints
- progress, so if a function restarts mid-workflow, it resumes from the last checkpoint without re- executing completed steps.
- Lesson 512 — Azure Functions: Durable FunctionsLesson 2835 — Separation of Duties
- Checksum and Hash Validation
- Generate checksums (MD5, SHA-256) on data blocks or entire tables.
- Lesson 2830 — Data Validation and Consistency Checks
- Checksum Comparison
- Generate cryptographic hashes of data blocks at both sites and compare them to detect any differences.
- Lesson 2444 — Data Consistency Validation
- Child image build
- Child specifies `FROM your-base-image`
- Lesson 1014 — ONBUILD: Triggered Instructions
- Child instructions continue
- Child's own instructions then proceed normally
- Lesson 1014 — ONBUILD: Triggered Instructions
- Child modules
- are separate, self-contained configurations that the root module calls to create reusable infrastructure patterns.
- Lesson 800 — Root Module vs Child Modules
- Child Process Inheritance
- Environment variables are inherited by all child processes, spreading secrets throughout your process tree.
- Lesson 2270 — Environment Variables for Secrets
- Choice parameters
- provide a dropdown of predefined options, ensuring valid selections:
- Lesson 1788 — Parameters and User Input
- Choose appropriate replication
- – Only replicate secrets that truly need multi-region availability
- Lesson 2251 — Secrets Management Cost Optimization
- Choose cost-effective metrics
- Target tracking on CPU or request count often works better than complex custom metrics that might keep instances running longer than necessary.
- Lesson 311 — Scaling for Cost Optimization
- Choose Deployment Manager if
- Lesson 946 — Deployment Manager vs Terraform on GCP
- Choose JSON when
- Lesson 860 — YAML vs JSON Template Formats
- Choose lightweight libraries
- – When possible, select slim alternatives to bulky frameworks.
- Lesson 485 — Function Packaging and Deployment Size
- Choose Managed Node Groups
- when you want simplicity, automatic updates, and standard workloads.
- Lesson 1464 — EKS Node Groups: Managed vs Self-Managed
- Choose Self-Managed Nodes
- when you need custom AMIs, specialized hardware (GPUs, ARM), specific kernel parameters, or tight control over node lifecycle.
- Lesson 1464 — EKS Node Groups: Managed vs Self-Managed
- Choose Terraform if
- Lesson 946 — Deployment Manager vs Terraform on GCP
- Choose the right runtime
- Compiled languages (Go, Rust) typically execute faster than interpreted ones (Python, Node.
- Lesson 2547 — Execution Duration Optimization
- Choose time granularity
- Daily, weekly, monthly, or custom periods
- Lesson 2151 — Custom Cost Reports and Export
- Choose visualizations
- column charts, area charts, or pivot tables
- Lesson 2174 — Azure Cost Analysis and Views
- Choose YAML when
- Lesson 860 — YAML vs JSON Template Formats
- Choosing poorly
- means "hot partitions"—imagine if 80% of customers had the same ID!
- Lesson 438 — Cosmos DB Partitioning and Request Units
- Choreography
- is decentralized.
- Lesson 575 — Event Choreography vs OrchestrationLesson 580 — Saga Pattern for Distributed TransactionsLesson 2513 — Saga Pattern for Distributed TransactionsLesson 2527 — Saga Pattern in ServerlessLesson 2580 — Saga Pattern for Distributed TransactionsLesson 2586 — Saga Pattern for Distributed TransactionsLesson 2729 — Saga Pattern for Distributed TransactionsLesson 2730 — Choreography vs Orchestration (+1 more)
- Choreography works well when
- Lesson 575 — Event Choreography vs Orchestration
- CI/CD
- Automated pipelines pull images for testing and push successful builds
- Lesson 988 — Container Registry FundamentalsLesson 2154 — Spot Instances and Preemptible VMs
- CI/CD > Pipelines
- , then selecting any pipeline to see its detailed graph view.
- Lesson 1739 — Pipeline Visualization and Job Logs
- CI/CD integration
- Embedding pipeline status from Jenkins, GitHub Actions, GitLab CI, or ArgoCD directly in service catalog pages
- Lesson 2934 — Integrating CI/CD and Observability
- CI/CD pipeline integration
- schedules tests (weekly, nightly) and provides visibility into results.
- Lesson 2906 — Automated DR Test Frameworks
- CI/CD Pipeline Portability
- means structuring your deployment automation so it can target multiple clouds through conditional logic and environment abstraction.
- Lesson 2775 — CI/CD Pipeline Portability
- CI/CD pipelines
- deploy infrastructure alongside applications
- Lesson 693 — IaC and the DevOps CultureLesson 1068 — Registry Authentication MethodsLesson 2929 — Software Templates and Scaffolding
- CI/CD testing environments
- Lesson 104 — GCP Preemptible and Spot VMs
- CIDR notation
- (Classless Inter-Domain Routing) — a compact way to describe entire blocks of IP addresses at once.
- Lesson 172 — IP Address Ranges and CIDR Notation
- Cipher Suites
- Lesson 602 — SSL/TLS Configuration
- circuit breaker
- is a design pattern that monitors calls to downstream services and "trips" (opens) when failures exceed a threshold.
- Lesson 501 — Circuit Breaker PatternLesson 2497 — Application and State ChaosLesson 2583 — Bulkhead Pattern for IsolationLesson 2748 — Throttling and Circuit Breaker Patterns
- Circuit Breaker for Functions
- knowledge to create resilient background processing.
- Lesson 2551 — Asynchronous Processing Patterns
- Circuit Breaker Pattern
- (from your previous lesson) to stop retries when a service is definitively down.
- Lesson 2582 — Retry and Timeout StrategiesLesson 2588 — Circuit Breaker PatternLesson 2589 — Bulkhead Pattern for Isolation
- Circuit breaker thresholds
- Lesson 1603 — Virtual Services and Destination Rules
- circuit breakers
- if many backends start failing simultaneously, keep them in rotation rather than removing all of them
- Lesson 285 — Advanced Health Check StrategiesLesson 2458 — Graceful Degradation PatternsLesson 2748 — Throttling and Circuit Breaker Patterns
- Citadel
- (certificate authority for mTLS), and **Galley** (configuration validation).
- Lesson 1577 — Istio Control Plane Components
- clarity
- .
- Lesson 1264 — Secret Types and Use CasesLesson 1756 — Pipeline Triggers and Parent-Child Pipelines
- Classic Load Balancers
- (legacy): You directly attach the classic load balancer to the ASG.
- Lesson 320 — ASG Integration with Elastic Load Balancing
- Classification
- Automatically detect and tag sensitive data like credit cards or emails
- Lesson 2637 — Data Catalog and Metadata Management
- Clean workspace
- Remove temporary files
- Lesson 1776 — Build Steps and Post-Build ActionsLesson 1793 — Docker Integration in Pipelines
- Cleaner revision history
- – one revision for related changes
- Lesson 1171 — Pausing and Resuming Rollouts
- Cleanup
- Delete temporary files, stop test containers, or free workspace resources.
- Lesson 1790 — Post Actions and Notifications
- Cleanup automation
- Delete logs or temporary files after a set period
- Lesson 158 — Object Lifecycle Policies
- Cleanup tasks
- Deleting expired records, archiving logs, or purging temp files
- Lesson 2510 — Scheduled Job Pattern
- Cleanup with defer
- ensures isolated test runs don't leave orphaned resources consuming costs.
- Lesson 841 — Testing at Scale with Terratest
- Clear deployment practices
- – Forces proper version control and intentional updates
- Lesson 1255 — Immutable ConfigMaps
- Clear documentation
- and examples
- Lesson 2917 — Golden Paths and Paved RoadsLesson 2940 — Golden Paths and Paved Roads
- Clear handoffs
- Document ongoing issues before rotation changes
- Lesson 2127 — On-Call Rotation Structures
- Clear Naming Conventions
- Use descriptive resource names with consistent patterns.
- Lesson 919 — ARM Template Best Practices and Validation
- Clear ownership
- Developers own app repos; platform/ops teams own config repos.
- Lesson 1866 — GitOps Repository StructureLesson 2560 — Service Boundaries and Decomposition
- Clear ownership boundaries
- so teams know which directories they manage
- Lesson 833 — Repository Structure for Large Projects
- CLI flags
- One-off overrides, automation scripts, sensitive values
- Lesson 760 — Passing Variables: CLI and tfvars Files
- CLI scripting
- enables you to wrap provider tools (like AWS CLI or Azure CLI) into shell scripts that execute multi-step procedures: snapshot creation, validation checks, cutover sequences, and rollback procedures.
- Lesson 2816 — Migration Automation and Scripting
- CLI tool
- (what you interact with) and the **Go library** that powers it.
- Lesson 1521 — Helm Architecture: Client and Library
- Clickstream Analysis
- Lesson 2601 — Streaming Use Cases
- client
- that communicates with the **Kubernetes API server** (which you learned about in previous lessons).
- Lesson 1130 — What is kubectl and Its RoleLesson 2575 — Service Discovery Patterns
- Client config
- Where to reach your webhook service (typically a Kubernetes Service with TLS)
- Lesson 1411 — Webhook Configuration and Registration
- Clock skew
- Mismatched system clocks between nodes can cause premature expiration
- Lesson 1628 — Certificate Rotation and Expiry
- Closed
- Normal operation, requests pass through
- Lesson 501 — Circuit Breaker PatternLesson 2506 — Circuit Breaker for Functions
- Closed (Normal)
- Requests flow normally.
- Lesson 1612 — Circuit Breaking PatternsLesson 2581 — Circuit Breaker PatternLesson 2588 — Circuit Breaker Pattern
- ClosestToNextInstanceHour
- Minimizes cost by terminating instances near their billing hour
- Lesson 308 — Scale-In Protection and Termination
- Cloud agents
- Dynamically provisioned (Docker, Kubernetes, EC2)
- Lesson 1779 — Jenkins Build Agents and Executors
- Cloud Audit Logs
- (GCP), or **Azure Monitor** to track every query execution—who ran it, when, what data accessed, and whether it succeeded.
- Lesson 2669 — Serverless Query Engine Security
- Cloud Billing reports
- and **dashboards**, which work together to give you a comprehensive view of your spending patterns.
- Lesson 2177 — Google Cloud Cost Management
- Cloud Custodian
- , **Azure Policy**, **GCP Organization Policy Service**, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
- Lesson 2345 — Continuous Compliance Scanning
- Cloud Debugger
- Inspects application state in production without stopping code
- Lesson 679 — Google Cloud Operations Suite Overview
- Cloud Function
- responds to the message and executes rotation logic:
- Lesson 2247 — GCP Secret Manager Rotation Strategies
- Cloud implementation
- Use a public subnet with ALB/NLB, connecting to application servers in private subnets.
- Lesson 2845 — Security Architecture Patterns
- Cloud Interconnect (GCP)
- are dedicated private network connections between your on-premises datacenter and cloud provider.
- Lesson 2811 — Network Optimization for Migration
- Cloud Load Balancing
- for ingress traffic
- Lesson 1475 — GKE Overview and ArchitectureLesson 2094 — Google Cloud Trace
- Cloud Logging
- (formerly Stackdriver) captures all function logs with structured data support, making filtering and analysis straightforward.
- Lesson 518 — Provider-Specific Monitoring and ObservabilityLesson 679 — Google Cloud Operations Suite Overview
- Cloud Monitoring
- (formerly Stackdriver)
- Lesson 410 — Database Monitoring and MetricsLesson 679 — Google Cloud Operations Suite Overview
- Cloud Profiler
- Continuous CPU and memory profiling
- Lesson 679 — Google Cloud Operations Suite Overview
- Cloud Provider
- Secures the infrastructure (physical data centers, network hardware, hypervisors, encryption services like KMS)
- Lesson 2322 — Introduction to Compliance in Cloud
- Cloud provider adapters
- (AWS CloudWatch, Azure Monitor, GCP Stackdriver)
- Lesson 1453 — External Metrics and HPA
- Cloud provider APIs
- to query resource metadata (creation date, attachment status, metrics)
- Lesson 2986 — Idle Resource Detection and Cleanup
- Cloud Provider Auth
- AWS IAM, Azure Managed Identity, and GCP Service Accounts can authenticate directly.
- Lesson 2256 — Vault Authentication Methods Overview
- Cloud Provider Drivers
- (AWS EBS CSI, Azure Disk CSI, GCP PD CSI)
- Lesson 1327 — CSI Driver Selection and Comparison
- Cloud provider entropy pools
- Managed sources that continuously collect environmental noise
- Lesson 2284 — Key Generation and Randomness
- Cloud provider integration
- (automatically creating cloud disks)
- Lesson 1303 — StorageClass FundamentalsLesson 2278 — Container Registry Authentication
- Cloud provider reserved
- (often fourth IP) - For future cloud services
- Lesson 179 — Reserved IP Addresses in Subnets
- Cloud registry caching
- Azure Container Registry, AWS ECR, GCP Artifact Registry all offer pull-through cache features
- Lesson 997 — Registry Mirroring and Caching
- Cloud resources
- Databases (RDS, Cloud SQL), storage buckets, load balancers, IAM roles
- Lesson 2932 — Kubernetes and Cloud Resource VisualizationLesson 2965 — Cost Centers and Business Units
- Cloud Router
- Acts as your BGP routing endpoint in Google Cloud.
- Lesson 2206 — Interconnect VLAN Attachments
- Cloud Run
- Fully serverless—logs from your containerized apps automatically appear in Cloud Logging with zero configuration.
- Lesson 2054 — Google Cloud Logging (Operations)
- Cloud Scheduler
- triggers a Pub/Sub topic on a schedule (e.
- Lesson 2247 — GCP Secret Manager Rotation Strategies
- Cloud SQL
- uses Cloud KMS for encrypting database instances.
- Lesson 2321 — GCP Cloud KMS Integration and HSM
- Cloud storage
- S3, Azure Blob, GCS for managed durability
- Lesson 2253 — Vault Architecture and Components
- Cloud storage drivers
- Connect to AWS EBS, Azure Disk, Google Persistent Disk
- Lesson 1040 — Volume Drivers and Plugins
- Cloud Storage Events
- Your function fires when objects are created, deleted, or updated in a bucket.
- Lesson 515 — Google Cloud Functions: Event-Driven Architecture
- Cloud Trace
- adds distributed tracing capabilities, showing the complete request path across multiple functions and services.
- Lesson 518 — Provider-Specific Monitoring and ObservabilityLesson 679 — Google Cloud Operations Suite Overview
- Cloud VPN Gateway
- This is the cloud provider's end of the tunnel—a managed service that terminates your VPN connection in the cloud.
- Lesson 2199 — VPN Gateway Configuration
- Cloud-agnostic observability
- Metrics, traces, and logs collected uniformly regardless of underlying infrastructure
- Lesson 2769 — Service Mesh for Portability
- Cloud-config
- – A YAML-based declarative format that's more powerful:
- Lesson 87 — User Data and Cloud-Init
- Cloud-native APIs
- for dynamic path selection based on cloud resource health
- Lesson 2209 — SD-WAN Integration with Cloud
- Cloud-native approach
- Applications write to stdout/stderr.
- Lesson 666 — Cloud-Native Logging Standards
- Cloud-native solutions
- GKE Hub, AWS EKS Anywhere, Azure Arc
- Lesson 1514 — Cluster Federation BasicsLesson 2085 — Integrating OTel with Tracing Backends
- Cloud-Provider Implementations
- (like AWS ALB Ingress Controller, GKE Ingress, Azure Application Gateway) integrate directly with your cloud provider's native load balancers.
- Lesson 1230 — Ingress Controller Options
- CloudEvents
- specification—an industry-standard format for describing events.
- Lesson 515 — Google Cloud Functions: Event-Driven Architecture
- CloudExchange Co-location
- Direct connection at a facility where both you and Azure have presence
- Lesson 2215 — Azure ExpressRoute Fundamentals
- Cloudflare
- offers a generous free tier and emphasizes security features like DDoS protection and Web Application Firewall (WAF) alongside content delivery.
- Lesson 594 — Popular CDN Providers OverviewLesson 2389 — DDoS Testing and Simulation
- CloudFormation Console
- Real-time event stream showing color-coded status
- Lesson 887 — Stack Events and Monitoring
- CloudFormation stack
- is what happens when AWS reads your template and provisions those resources in your account.
- Lesson 846 — CloudFormation Templates and Stacks
- CloudFormation template
- is a text file that declares what infrastructure you want—EC2 instances, S3 buckets, VPCs, databases, and their configurations.
- Lesson 846 — CloudFormation Templates and Stacks
- CloudFront (CDN)
- WAF rules execute at AWS edge locations globally, filtering malicious traffic before it crosses the internet to your origin servers
- Lesson 2368 — AWS WAF Fundamentals
- CloudFront Functions
- execute in **under 1 millisecond** with strict limits: maximum 2MB memory, 10KB code size, and sub-millisecond runtime.
- Lesson 615 — CloudFront Functions vs Lambda@Edge
- CloudTrail
- (AWS), **Cloud Audit Logs** (GCP), or **Azure Monitor** to track every query execution—who ran it, when, what data accessed, and whether it succeeded.
- Lesson 2669 — Serverless Query Engine Security
- CloudTrail Lake
- , and **EventBridge integration** transform CloudTrail from a passive recorder into an intelligent compliance and security engine.
- Lesson 2358 — AWS CloudTrail Deep Dive
- CloudWatch
- integration with automatic metric collection
- Lesson 410 — Database Monitoring and MetricsLesson 887 — Stack Events and Monitoring
- CloudWatch Alarms
- monitor metrics and trigger notifications or automated actions when thresholds are crossed, connecting directly to the alarm concepts you've already learned.
- Lesson 668 — AWS CloudWatch Overview
- CloudWatch and X-Ray
- Built-in metrics and distributed tracing without additional configuration
- Lesson 1595 — AWS App Mesh Overview
- CloudWatch Dashboards
- provide customizable visual displays of your metrics and logs, giving you at-a-glance health views.
- Lesson 668 — AWS CloudWatch Overview
- CloudWatch Logs
- , where every console output from your function appears.
- Lesson 518 — Provider-Specific Monitoring and ObservabilityLesson 668 — AWS CloudWatch Overview
- CloudWatch Logs Insights
- lets you query these logs with SQL-like syntax to find patterns, errors, or specific execution traces.
- Lesson 518 — Provider-Specific Monitoring and ObservabilityLesson 2355 — Audit Log Analysis and Search
- CloudWatch Metrics
- track numerical data points over time (CPU usage, request counts, error rates).
- Lesson 668 — AWS CloudWatch Overview
- CloudWatch/Azure Monitor
- for utilization metrics (CPU, network, IOPS)
- Lesson 2986 — Idle Resource Detection and Cleanup
- Cluster Autoscaler
- bridges the gap between pod-level and infrastructure-level scaling.
- Lesson 1458 — Cluster Autoscaler IntegrationLesson 1510 — Cluster Autoscaler ConfigurationLesson 1516 — Cluster Cost OptimizationLesson 1519 — Troubleshooting Common Cluster Issues
- Cluster Autoscaler events
- Review logs for scale-up failures or quota issues
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Cluster bootstrap
- Each cluster runs its own Flux installation, pointed to the same repo but different paths
- Lesson 1945 — Multi-Cluster Management with Flux
- Cluster Configuration Backup
- Lesson 1515 — Disaster Recovery for Clusters
- Cluster federation
- provides a control layer that sits above individual clusters, letting you manage them as a logical group.
- Lesson 1514 — Cluster Federation Basics
- Cluster Fleets
- Treat clusters as a fleet rather than individuals.
- Lesson 1513 — Multi-Cluster Management
- Cluster Generator
- Auto-discover registered clusters and deploy to each
- Lesson 1903 — ApplicationSets for Multi-EnvironmentLesson 1907 — ApplicationSets for Dynamic ApplicationsLesson 1909 — Cluster Generator for Multi-Environment
- Cluster-level logging
- aggregates logs from all nodes into a centralized system.
- Lesson 1433 — Logging Architecture in KubernetesLesson 2049 — Kubernetes Logging Architecture
- Cluster-Level Resource
- PVs exist at the cluster scope, not within a specific namespace.
- Lesson 1289 — PersistentVolume (PV) Fundamentals
- cluster-scoped resources
- (like Nodes, PersistentVolumes, or Namespaces themselves)
- Lesson 1377 — Role vs ClusterRoleLesson 1382 — Creating a ClusterRole
- Cluster-specific overlays
- Kustomizations that modify the base for each cluster's needs (replica counts, regions, resource limits)
- Lesson 1945 — Multi-Cluster Management with Flux
- Cluster-wide access
- to namespaced resources (like viewing Pods across all namespaces)
- Lesson 1377 — Role vs ClusterRole
- Cluster-Wide Health
- aggregates everything: total resource utilization, deployment rollout status, and cross-node networking issues.
- Lesson 1518 — Observability for Cluster Operations
- Cluster-wide permissions
- – Grant access to non-namespaced resources (like nodes, persistent volumes) or all namespaces at once
- Lesson 1382 — Creating a ClusterRole
- Clustered applications
- that manage their own data synchronization (like clustered databases)
- Lesson 135 — Multi-Attach Volumes
- ClusterRole
- Grants permissions *cluster-wide* or on non-namespaced resources.
- Lesson 1375 — RBAC API Objects OverviewLesson 1377 — Role vs ClusterRoleLesson 1382 — Creating a ClusterRole
- ClusterRoleBinding
- Binds a ClusterRole to subjects *cluster-wide*.
- Lesson 1375 — RBAC API Objects OverviewLesson 1383 — ClusterRoleBinding Usage
- ClusterRoles
- define *what* can be done, while **RoleBindings** and **ClusterRoleBindings** define *who* can do it.
- Lesson 1375 — RBAC API Objects OverviewLesson 1377 — Role vs ClusterRoleLesson 1388 — RBAC Best Practices
- Clusters
- Define the API server endpoints (where the cluster lives)
- Lesson 1132 — Kubeconfig Files and Contexts
- CNI plugin issues
- Check VPC CNI (EKS), Azure CNI, or GKE network plugin logs
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Code Compilation
- Lesson 1648 — Build Automation Fundamentals
- Code conversion
- Translate stored procedures, functions, triggers, and views
- Lesson 2824 — Schema Conversion Tools
- code reviews
- for infrastructure.
- Lesson 687 — IaC Benefits: Version Control and CollaborationLesson 693 — IaC and the DevOps Culture
- Code Structure
- Lesson 492 — Minimizing Cold Start Duration
- Code vs Deployment
- Developers write code but cannot deploy to production; DevOps engineers deploy but don't write application logic.
- Lesson 2835 — Separation of Duties
- Code-based
- Write workflows in your application language, not configuration files
- Lesson 2529 — Temporal and Alternative Orchestrators
- CodeArtifact
- charges for **storage** (GB-month) and **data transfer** out of AWS.
- Lesson 1820 — Pricing Model for AWS Code Services
- CodeBuild
- is a fully managed continuous integration service that compiles your source code, runs unit tests, and produces deployment-ready artifacts.
- Lesson 1812 — CodeBuild: Managed Build Service OverviewLesson 1820 — Pricing Model for AWS Code ServicesLesson 1830 — CodeBuild with Docker and ECR
- CodeBuild project
- Which project contains your buildspec
- Lesson 1842 — Build Stage with CodeBuild Integration
- CodeBuild role
- Permissions to pull source code, push build artifacts, access CodeArtifact, write logs to CloudWatch, and pull Docker images from ECR
- Lesson 1819 — IAM Roles and Permissions for Code Services
- CodeCommit
- (the source stage), Pipeline detects the change and automatically triggers the next steps.
- Lesson 1818 — Integration Between AWS Code ServicesLesson 1820 — Pricing Model for AWS Code ServicesLesson 1826 — Source Providers and Integration
- CodeDeploy
- is **free for EC2 and on-premises deployments**.
- Lesson 1820 — Pricing Model for AWS Code Services
- CodeDeploy role
- Permissions to update EC2 instances, Lambda functions, or ECS services, plus read deployment configurations
- Lesson 1819 — IAM Roles and Permissions for Code Services
- CodeDeployDefault.AllAtOnce
- – Updates all instances simultaneously.
- Lesson 1836 — Deployment Configurations and Rollback
- CodeDeployDefault.HalfAtATime
- – Updates 50% of instances, waits for success, then updates the remaining 50%.
- Lesson 1836 — Deployment Configurations and Rollback
- CodeDeployDefault.OneAtATime
- – Updates one instance at a time.
- Lesson 1836 — Deployment Configurations and Rollback
- CodeGuru
- provides AI-powered code reviews.
- Lesson 1810 — Introduction to AWS Developer Tools Ecosystem
- CodeGuru Reviewer
- (for code quality) and **CodeGuru Profiler** (for runtime performance analysis).
- Lesson 1816 — CodeGuru: AI-Powered Code Review
- CODEOWNERS files
- automatically assign reviewers based on which files changed (e.
- Lesson 1874 — GitOps Access Control
- CodePipeline
- charges per **active pipeline per month**.
- Lesson 1820 — Pricing Model for AWS Code Services
- CodePipeline role
- Permissions to invoke CodeBuild, access source repositories (CodeCommit), trigger CodeDeploy, and read/write pipeline artifacts in S3
- Lesson 1819 — IAM Roles and Permissions for Code Services
- Cohesive services
- , by contrast, group related capabilities around a business domain.
- Lesson 2564 — Service Size and Granularity
- Cold standby
- Infrastructure definitions and recent backups ready to deploy, but not running until needed
- Lesson 2760 — Multicloud Architecture Patterns: Active-Passive
- cold start
- .
- Lesson 463 — Cold Starts and Warm StartsLesson 481 — Cold Starts and Warm StartsLesson 491 — Cold Start FundamentalsLesson 2543 — Cold Start Fundamentals
- Cold start performance
- (some languages start faster than others)
- Lesson 471 — Function Runtime Environments
- cold starts
- when no warm instance is available.
- Lesson 479 — Reserved and Provisioned ConcurrencyLesson 480 — Function Execution Context and ReuseLesson 2552 — Function Chaining and Orchestration Efficiency
- Cold Storage
- (Archive tier) is for rarely accessed data—annually or less:
- Lesson 118 — Hot, Warm, and Cold Storage TiersLesson 120 — Storage Cost ConsiderationsLesson 656 — Log Retention and Storage Requirements
- Cold/Archive
- Hours to retrieve, lowest cost (compliance/long-term)
- Lesson 2055 — Log Retention and Storage ClassesLesson 2157 — Object Storage Cost Optimization
- Cold/Archive storage
- For rarely accessed data like compliance records or backups.
- Lesson 148 — Storage Classes Introduction
- Cold/Archive tier
- Rarely accessed data on low-cost, high-latency storage
- Lesson 2980 — Storage Lifecycle Optimization
- Collaboration
- instead of finger-pointing when issues arise
- Lesson 693 — IaC and the DevOps CultureLesson 1991 — Introduction to Grafana and Its Role in Observability
- Collaborative editing
- tools where multiple users see changes immediately
- Lesson 525 — WebSocket API Support
- Collection
- Agents (covered in "Log Collection Agents") run on each host, tailing log files or capturing streams.
- Lesson 665 — Log Aggregation PipelinesLesson 1438 — Fluentd and Fluent Bit
- Collection functions
- work with lists and maps to merge, filter, or lookup values
- Lesson 736 — Built-in Functions OverviewLesson 824 — Terraform Functions for Data Transformation
- Collection layer
- Ensure logging agents only access logs from their designated namespace
- Lesson 2058 — Multi-Tenancy and Log Isolation
- collections
- (like folders containing JSON-like files).
- Lesson 440 — Google Cloud Firestore and DatastoreLesson 2535 — Google Cloud Firestore
- Collector
- is a standalone service that receives telemetry from applications, processes it (filtering, batching, enriching), and forwards it to backends.
- Lesson 2074 — OpenTelemetry Architecture and Components
- Collectors
- Lesson 2005 — Log Aggregation ArchitectureLesson 2088 — Tracing Backend ArchitectureLesson 2090 — Jaeger Deployment Models
- Collects
- logs from all your sources (applications, servers, containers)
- Lesson 665 — Log Aggregation Pipelines
- Collects system metrics
- CPU, memory, disk, and network usage at cluster, node, and pod levels
- Lesson 1487 — GKE Monitoring with Cloud Monitoring
- Colocation (colo) facilities
- are data centers where you can physically place your own network equipment (routers, switches) alongside equipment from cloud providers, ISPs, and other enterprises.
- Lesson 2222 — Private Peering and Exchange Points
- Colorblind-Friendly Palettes
- The most common form is red-green colorblindness.
- Lesson 2105 — Color Theory and Accessibility
- Column customization
- Add relevant fields to see structured data at a glance
- Lesson 2029 — Kibana Index Patterns and Discover
- Columnar (Wide-Column) Databases
- Lesson 429 — NoSQL Database Categories and Use Cases
- Columnar formats (Parquet, ORC)
- Store data by column rather than row.
- Lesson 2660 — Querying Data Formats in Athena
- Columnar Storage
- Data is stored in a highly compressed columnar format optimized for analytical workloads, enabling fast scans of specific columns across billions of rows.
- Lesson 2636 — Google BigQuery Fundamentals
- Combine with NOT
- `not status: 200` excludes successful requests
- Lesson 2030 — Kibana Query Language (KQL)
- Combine with spot instances
- Use mixed instance policies to incorporate cheaper spot instances where your workload can tolerate interruptions.
- Lesson 311 — Scaling for Cost Optimization
- Combines with other patterns
- Often used alongside Cache-Aside or Read-Through
- Lesson 2701 — Refresh-Ahead Caching Pattern
- Combining with Fn::GetAZs
- Lesson 872 — Fn::Select and List Functions
- Command execution
- Does a command inside the container exit successfully?
- Lesson 1420 — Liveness Probes Fundamentals
- Command history
- the exact `RUN`, `COPY`, and `ADD` instructions from the build
- Lesson 986 — Inspecting Image Layers
- Command-line arguments
- injecting parameters into container commands
- Lesson 1247 — ConfigMap Fundamentals and Use Cases
- commands
- that change data, and **queries** that read data.
- Lesson 574 — CQRS Pattern with EventsLesson 2597 — CQRS PatternLesson 2727 — CQRS Pattern BasicsLesson 2728 — Combining Event Sourcing and CQRS
- Comments
- start with `#` and are ignored by the parser
- Lesson 1000 — Dockerfile Structure and ParsingLesson 1697 — Workflow File Structure and YAML Syntax
- Commit messages
- (skip tests if message contains `[skip ci]`)
- Lesson 1661 — Conditional Execution Pattern
- Committed Use Discounts
- when you commit to using specific resources for 1 or 3 years.
- Lesson 2179 — GCP Committed Use Discounts and Budgets
- Common alert targets include
- Lesson 1642 — Alerting on Service Mesh Metrics
- Common architecture
- Fluent Bit collects at the edge → forwards to Fluentd → Fluentd aggregates, transforms, and routes to backends.
- Lesson 2038 — Fluentd and Fluent Bit Overview
- Common AWS-specific types include
- Lesson 862 — Parameter Types and Validation
- Common cluster-scoped resources
- Lesson 1120 — Namespaced vs Cluster-Scoped Resources
- Common condition types
- Lesson 394 — GCP IAM Conditions
- Common examples
- Lesson 55 — Public vs Private ImagesLesson 172 — IP Address Ranges and CIDR NotationLesson 627 — Metric Types: Counters and GaugesLesson 1699 — Schedule-Based Triggers with Cron
- Common externalization targets
- Lesson 2468 — State Externalization Patterns
- Common formats
- Lesson 1138 — kubectl Output Formatting Options
- Common in
- AWS Kinesis (default), Azure Event Hubs, basic message queues
- Lesson 2603 — At-Least-Once vs Exactly-Once Semantics
- Common namespaced resources
- Lesson 1120 — Namespaced vs Cluster-Scoped Resources
- Common normalization strategies
- Lesson 607 — Cache Key Normalization
- Common partitioning strategies
- Lesson 2607 — Stream Partitioning and Parallelism
- Common pattern
- Create specific deny rules for known bad actors, then broader allow rules for legitimate traffic.
- Lesson 208 — NACL Allow and Deny Rules
- Common strategies include
- Lesson 712 — Environment Separation Strategies
- Common use case
- Node maintenance or degradation.
- Lesson 1365 — Toleration Seconds and Eviction Grace Period
- Common use cases
- Lesson 160 — Cross-Region Replication BasicsLesson 1708 — Expressions and Conditional Execution
- Communicates
- with a specific platform's API (AWS, Azure, GCP, etc.
- Lesson 724 — Installing Terraform and Provider Basics
- Communication
- Share the plan with teammates for review
- Lesson 698 — Planning and PreviewLesson 2555 — What Are Microservices?
- Communications Lead
- crafts updates for internal/external audiences
- Lesson 2131 — Incident Communication and Status PagesLesson 2133 — Incident Command SystemLesson 2870 — Incident Response Planning
- Community and Support
- Lesson 1600 — Service Mesh Selection Criteria
- Compaction
- is a special retention mode that keeps only the *latest value* for each message key.
- Lesson 2610 — Kafka Retention and Storage
- Compaction overhead
- background operations that merge data blocks consume significant resources
- Lesson 1977 — Challenges of Running Prometheus at Scale
- Compactor
- Runs maintenance tasks on object storage—downsampling data for faster queries over long time ranges and compacting small blocks into larger ones.
- Lesson 1982 — Thanos Architecture OverviewLesson 2035 — Loki Components and Deployment Modes
- compactors
- (optimize storage).
- Lesson 1986 — Mimir for Large-Scale MetricsLesson 2034 — Loki Architecture and Design Philosophy
- Compare
- Check if current state matches desired state
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1858 — Continuous ReconciliationLesson 1869 — GitOps Reconciliation Loop
- Compatibility
- with your existing code
- Lesson 727 — Terraform Block and Required ProvidersLesson 1033 — Docker Storage DriversLesson 1327 — CSI Driver Selection and Comparison
- compensating transaction
- is a specific action that reverses the effect of a previously completed operation.
- Lesson 2587 — Compensating TransactionsLesson 2735 — Compensating Transactions
- compensating transactions
- that undo the completed steps in reverse order.
- Lesson 580 — Saga Pattern for Distributed TransactionsLesson 2513 — Saga Pattern for Distributed TransactionsLesson 2586 — Saga Pattern for Distributed TransactionsLesson 2729 — Saga Pattern for Distributed TransactionsLesson 2738 — Event-Driven State Machines
- Competing Consumers Pattern
- solves the problem of processing high volumes of messages efficiently.
- Lesson 2720 — Competing Consumers Pattern
- Compiled binaries or libraries
- Lesson 1719 — Caching Dependencies and Build Artifacts
- Compiles the code
- using your specified runtime environment
- Lesson 1822 — CodeBuild Overview and Core Concepts
- Complete
- Once all parts arrive, you tell the service "assemble these pieces into the final object"
- Lesson 166 — Multipart UploadLesson 912 — Deployment Modes: Complete vs Incremental
- Complete audit trail
- Every change is preserved forever.
- Lesson 573 — Event Sourcing FundamentalsLesson 2508 — Event Sourcing with FunctionsLesson 2596 — Event Sourcing Fundamentals
- Complete control
- Custom configurations that public clouds don't easily support
- Lesson 21 — Private Cloud Deployment Model
- Complete Mode
- Azure treats your template as the **complete desired state** of the resource group.
- Lesson 912 — Deployment Modes: Complete vs Incremental
- Completeness Checks
- Verify expected record counts, ensure critical fields are populated, and detect suspiciously small or large batch sizes that might indicate upstream failures.
- Lesson 2624 — Data Quality in Batch Pipelines
- Completion count
- how many successful pod completions you need
- Lesson 1192 — Job Completion Modes and Parallelism
- Completions
- How many successful pod completions you need (default: 1)
- Lesson 1191 — Kubernetes Job Resource Fundamentals
- Complex expressions
- Combine AND/OR to model sophisticated scenarios
- Lesson 645 — Composite AlarmsLesson 717 — Documentation and CommentsLesson 898 — Variables for Template Simplification
- Complex security requirements
- where mutual TLS and policy enforcement justify the cost
- Lesson 1573 — Service Mesh Performance Overhead
- Complexity and Operational Overhead
- Lesson 1600 — Service Mesh Selection Criteria
- Complexity indicators
- Lesson 1574 — When to Use a Service Mesh
- Complexity-based waves
- Wave 1 contains simple, low-risk applications (pilot/quick wins), while later waves tackle complex, mission-critical systems after lessons learned.
- Lesson 2802 — Migration Wave Planning
- Compliance
- Some laws require data to stay within specific countries.
- Lesson 9 — Regions and Availability ZonesLesson 27 — Deployment Model Selection CriteriaLesson 45 — Multi-AZ and Multi-Region DesignsLesson 110 — Compute Service Selection CriteriaLesson 156 — Object Versioning FundamentalsLesson 158 — Object Lifecycle PoliciesLesson 220 — VPC Endpoints for AWS ServicesLesson 221 — PrivateLink and Service Endpoints (+9 more)
- Compliance and auditing
- Fewer components = fewer CVEs to track
- Lesson 987 — Scratch and Distroless ImagesLesson 2172 — AWS Cost and Usage Reports
- Compliance and data sovereignty
- Some regulations require data residency in specific locations, and certain providers may have better compliance certifications in different regions.
- Lesson 2751 — What is Multicloud and Why Organizations Adopt It
- Compliance as Code
- is about *detection and validation*.
- Lesson 2336 — Policy as Code vs. Compliance as Code
- Compliance auditing
- Capture evidence of network activity for regulatory requirements
- Lesson 229 — VPC Traffic Mirroring
- Compliance benefits
- Many regulations require private connectivity for sensitive workloads
- Lesson 2211 — Private Connectivity Overview
- Compliance Calculation
- The system compares actual performance against your SLO targets.
- Lesson 2123 — Measuring and Reporting SLO Compliance
- Compliance checks
- HIPAA, PCI-DSS, SOC2, or company-specific standards
- Lesson 695 — IaC Security and Compliance BenefitsLesson 2855 — Device Trust and Endpoint Security
- Compliance dashboards
- Automated assessment against standards like PCI-DSS, ISO 27001
- Lesson 2863 — Azure Security Center and Sentinel
- Compliance documentation
- Fixed IPs simplify audit trails
- Lesson 266 — Static IP and Elastic IP Support
- Compliance Inheritance Model
- describes how certain compliance controls are automatically inherited from your cloud provider, while others remain squarely on your shoulders.
- Lesson 2330 — Compliance Inheritance Model
- Compliance logs
- (security, audit): Often 1-7 years (legally mandated)
- Lesson 656 — Log Retention and Storage Requirements
- Compliance mandates
- data residency, audit logging, retention policies
- Lesson 2762 — Multicloud Governance and Operating Model
- Compliance Monitoring
- Pre-built compliance frameworks (PCI-DSS, HIPAA, ISO 27001) help you track your security posture against regulatory requirements.
- Lesson 2864 — Google Security Command Center
- Compliance perspective
- Most frameworks require management event logging (who changed what configuration).
- Lesson 2352 — Management vs Data Event Logging
- Compliance policies
- regulatory frameworks (PCI-DSS, HIPAA)
- Lesson 2900 — Policy Libraries and ReusabilityLesson 2918 — Self-Service vs. Full Autonomy
- Compliance reporting
- built-in (retention proof, encryption verification)
- Lesson 2422 — Cloud-Native Backup Services Overview
- Compliance requirements
- mandate physical isolation (healthcare, finance, government)
- Lesson 108 — GCP Sole-Tenant NodesLesson 160 — Cross-Region Replication BasicsLesson 424 — Manual Snapshots and RetentionLesson 1084 — Compliance and Policy EnforcementLesson 1638 — Log Formats and CustomizationLesson 2420 — Backup Retention PoliciesLesson 2788 — Multicloud Backup and Archive
- Compliance Requirements Translation
- is the systematic process of converting these regulatory obligations into machine-readable policy definitions that tools like AWS Config, Azure Policy, or Open Policy Agent can enforce.
- Lesson 2337 — Compliance Requirements Translation
- Compliance requires network isolation
- but some controlled access is needed
- Lesson 216 — VPC Peering Fundamentals
- Compliance Score
- Pass rate across all evaluated resources
- Lesson 2901 — Policy Reporting and Remediation
- Compliance suffers
- Regulations often require encryption; defaults ensure coverage
- Lesson 2839 — Encryption by Default
- Compliance violations
- Inability to prove who had access when
- Lesson 360 — Auditing Group and Role MembershipLesson 722 — IaC Security ScanningLesson 2237 — Introduction to Secrets Management in Cloud
- Compliance Zones
- PCI-DSS or HIPAA-regulated data in dedicated segments with stricter controls
- Lesson 2390 — Network Segmentation Fundamentals
- Compliance-friendly
- Satisfies data residency and privacy controls
- Lesson 2397 — Private Link and Endpoint Services
- Component isolation
- Tests individual pieces separately
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Composability
- Combine small modules into larger infrastructure patterns (remember infrastructure composability from your earlier lessons)
- Lesson 711 — Code Organization and Module Structure
- Composite indexes matter
- If you frequently filter by `user_id` AND `created_date`, create a single index on both columns together—it's more efficient than two separate indexes.
- Lesson 448 — Index Design and Strategy
- Comprehensive coverage
- Catch environment-specific bugs early by testing all target configurations
- Lesson 1660 — Matrix Build Pattern
- Compress and minify
- – Some runtimes support compressed formats or minified code that preserve functionality while reducing size.
- Lesson 485 — Function Packaging and Deployment Size
- Compress before transit
- Network egress is often expensive
- Lesson 2165 — Cost-Aware Architecture Patterns
- Compression
- Enable gRPC compression for telemetry export to reduce network overhead.
- Lesson 1643 — Observability Performance Impact
- Compression and format
- Gzip CSVs or Parquet for faster queries
- Lesson 2172 — AWS Cost and Usage Reports
- Compression and Minification
- Use minifiers to strip whitespace and comments.
- Lesson 2546 — Package Size Optimization
- Compression matters
- GitLab compresses artifacts automatically, but smaller is always faster.
- Lesson 1765 — Cache Optimization and Artifacts
- Compromised credentials
- Identifying when legitimate accounts behave suspiciously (impossible travel, unusual API patterns)
- Lesson 2866 — Anomaly Detection and Behavioral Analysis
- Compute
- is the processing power — the "brain" of cloud operations.
- Lesson 8 — Cloud Infrastructure ComponentsLesson 30 — Pay-as-You-Go Pricing Model FundamentalsLesson 2138 — Cloud Billing Structure BasicsLesson 2986 — Idle Resource Detection and Cleanup
- Compute abstraction
- Use containers (Docker) or orchestration (Kubernetes) instead of provider-specific VMs
- Lesson 2764 — Application Portability FundamentalsLesson 2766 — Infrastructure Abstraction Patterns
- Compute Chaos
- tests resource limits, **Application and State Chaos** targets the application layer itself.
- Lesson 2497 — Application and State Chaos
- Compute Costs
- Lesson 2140 — Understanding Resource Costs
- Compute Engine
- VM instances require the Ops Agent (formerly Logging Agent) installed on the instance.
- Lesson 2054 — Google Cloud Logging (Operations)Lesson 2321 — GCP Cloud KMS Integration and HSM
- Compute instances
- Deploy separate container replicas or function instances for critical vs.
- Lesson 2589 — Bulkhead Pattern for Isolation
- Compute Integration
- You configure an EC2 instance, VM, or container to reference a secret by name or ARN.
- Lesson 2249 — Cross-Service Secrets Integration
- Compute intensity
- CPU-heavy tasks favor compute-optimized instances; data processing needs memory-optimized types
- Lesson 110 — Compute Service Selection Criteria
- Compute Optimized
- instances provide high-performance processors at optimal cost.
- Lesson 78 — Choosing Instance Types for Your WorkloadLesson 109 — Cross-Provider Compute Feature Comparison
- Compute Optimized instances
- break that balance intentionally—they pack in more powerful processors and higher CPU-to- memory ratios specifically for workloads that demand serious computational muscle.
- Lesson 67 — Compute Optimized Instance Types
- computed attributes
- values you can't set directly but can reference later.
- Lesson 740 — Resource Arguments and AttributesLesson 819 — Local Values and Computed Attributes
- Conceptual Explanations
- Why the platform makes certain decisions, architectural patterns, and interaction modes between teams.
- Lesson 2943 — Platform Documentation and Onboarding
- concurrency
- refers to how many function instances run simultaneously to handle incoming events.
- Lesson 473 — Concurrency and Scaling in FaaSLesson 509 — AWS Lambda: Concurrency and Scaling ControlsLesson 1588 — Istio Proxy ConfigurationLesson 1712 — Timeouts, Concurrency, and Workflow ControlsLesson 2550 — Concurrency Management
- concurrency limits
- to protect your account from runaway costs or resource exhaustion.
- Lesson 473 — Concurrency and Scaling in FaaSLesson 478 — Function Concurrency Limits
- Concurrent access
- Multiple VMs can mount and use the same filesystem
- Lesson 114 — File Storage Overview
- Concurrent Connections
- NLBs excel at maintaining millions of simultaneous long-lived connections.
- Lesson 265 — NLB Performance Characteristics
- Condition
- Which metric to watch (CPU percentage, HTTP queue length, custom metrics)
- Lesson 322 — VMSS Scaling Policies and RulesLesson 675 — Azure Monitor Metrics and AlertsLesson 759 — Variable Validation RulesLesson 1552 — Chart Dependencies and RequirementsLesson 2375 — Custom Rules and Request Inspection
- Condition keys
- let you add an extra layer: "grant this permission *only if* certain conditions are true.
- Lesson 366 — Condition Keys and ContextLesson 2241 — AWS Secrets Manager IAM Integration
- Conditional access policies
- Apply Azure security policies to cluster access
- Lesson 1498 — AKS Integration with Azure Active DirectoryLesson 2933 — RBAC and Portal Access Control
- Conditional branching
- If Function A returns "premium," call Function X; otherwise, call Function Y
- Lesson 2512 — Orchestrator Pattern with Step Functions
- Conditional dependencies
- Use `condition` to enable/disable dependencies via values
- Lesson 1545 — Chart Dependencies
- conditional deployment
- .
- Lesson 915 — Conditional Resource DeploymentLesson 952 — Jinja2 Templates for Parameterization
- Conditional execution blocks
- that branch based on the target environment
- Lesson 2775 — CI/CD Pipeline Portability
- Conditional Execution Pattern
- lets you control which pipeline stages run based on runtime conditions like:
- Lesson 1661 — Conditional Execution PatternLesson 1662 — Manual Approval Gates
- Conditional forwarding
- means: "If someone asks about domain X, forward that question to DNS server Y instead of answering it yourself.
- Lesson 226 — Hybrid DNS and Conditional Forwarding
- conditional logic
- to your IAM bindings.
- Lesson 394 — GCP IAM ConditionsLesson 1539 — Template Functions
- Conditional paths
- Use parallel actions with different deployment targets based on branch or configuration.
- Lesson 1845 — Parallel and Sequential Stage Execution
- Conditional resource naming
- Lesson 876 — Complex Function Nesting
- Conditional routing
- Route based on headers, source, or other criteria
- Lesson 1602 — Traffic Routing Fundamentals in Service MeshLesson 2869 — Security Alerts and Notification Workflows
- Conditional rules
- Use multiple conditions in a single rule block.
- Lesson 2339 — OPA Policy Development
- Conditional triggers
- Start jobs based on previous job completion—success, failure, or any completion state
- Lesson 2648 — Glue Job Triggers and Workflows
- Conditionals
- let you say "only render this if something is true," while **flow control** structures like loops let you repeat template blocks multiple times—making your charts flexible and reusable.
- Lesson 1540 — Conditionals and Flow Control
- Conditions
- What to match (host header, path patterns, HTTP methods)
- Lesson 243 — Load Balancer Listeners and RulesLesson 246 — ALB Listeners and RulesLesson 286 — What is Auto ScalingLesson 355 — Role Trust PoliciesLesson 847 — Template Structure and SectionsLesson 868 — Condition FunctionsLesson 869 — Conditions SectionLesson 1169 — Deployment Rollout Status (+2 more)
- Config repo
- Kubernetes manifests, Helm values, environment configs
- Lesson 1866 — GitOps Repository Structure
- Config then app
- Ensure ConfigMaps and Secrets exist before deployments
- Lesson 1939 — Dependency Management
- ConfigMap
- is a Kubernetes resource that stores non-confidential configuration data as key-value pairs.
- Lesson 1247 — ConfigMap Fundamentals and Use Cases
- ConfigMaps
- Application settings, feature flags, non-sensitive configuration files
- Lesson 1260 — Kubernetes Secrets Overview
- configuration
- from **code**.
- Lesson 477 — Environment Variables in FunctionsLesson 2329 — Cloud Provider Compliance Certifications
- Configuration (formerly Galley)
- Lesson 1577 — Istio Control Plane Components
- Configuration accuracy
- Are connection strings, API endpoints, and environment variables correct for the DR site?
- Lesson 2908 — Application Recovery Testing
- Configuration Analysis
- Path analyzers examine your entire network topology—VPC configurations, subnet routing, security group rules, network ACLs, and firewall policies—to build a complete picture of possible paths.
- Lesson 2188 — Network Path Analysis Tools
- Configuration blob
- A reference to the JSON file containing runtime settings (environment variables, exposed ports, default command)
- Lesson 980 — Image Manifest and Metadata
- Configuration changes
- to DR systems (who enabled cross-region replication and when)
- Lesson 2447 — Compliance and DR Documentation
- Configuration data
- Use Consul, etcd, or config maps loaded from external sources
- Lesson 2773 — Configuration Management Portability
- Configuration differences
- Lesson 748 — Data Source Block Syntax
- configuration drift
- .
- Lesson 691 — Immutable Infrastructure PrincipleLesson 968 — Immutable Infrastructure Pattern
- Configuration Drift Detection
- Compare actual deployed configurations against your declared state.
- Lesson 2776 — Portability Testing and Validation
- Configuration errors
- Incorrect certificate lifetimes or rotation thresholds
- Lesson 1628 — Certificate Rotation and Expiry
- Configuration example concept
- Lesson 2267 — Vault Auto-Unseal and Seal Wrap
- Configuration files
- (if needed by your runtime)
- Lesson 472 — Function Packaging and DeploymentLesson 1073 — Image Scanning FundamentalsLesson 1247 — ConfigMap Fundamentals and Use CasesLesson 1287 — Storage Challenges in Containers
- Configuration injection
- Point to specific config files that change frequently
- Lesson 1038 — Bind Mounts
- Configuration loading errors
- Start with restrictive defaults, not permissive ones
- Lesson 2837 — Fail Secure Principles
- Configuration management services
- (AWS Systems Manager Parameter Store, Azure App Configuration, GCP Secret Manager)
- Lesson 2828 — Connection String and Configuration Updates
- Configuration Normalization
- Convert user-friendly inputs into the exact format required by your infrastructure.
- Lesson 1410 — Mutating Admission Webhooks
- Configuration Provider
- Tells clients the current primary address
- Lesson 2687 — Redis High Availability with Sentinel
- Configuration steps
- Lesson 2202 — Direct Connect Virtual Interfaces
- Configuration sync
- Pull configuration updates from external sources
- Lesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Configuration typically includes
- Lesson 2234 — Connection Pooling and Keep-Alive
- Configuration validation
- EKS warns you about settings that conflict with AWS best practices
- Lesson 1469 — EKS Add-ons Overview
- Configuration-Driven Requests
- Developers specify high-level requirements (CPU, memory, region) through a simple form or API, and the platform translates these into compliant infrastructure code behind the scenes.
- Lesson 2926 — Self-Service Infrastructure Patterns
- Configurations
- are YAML or Python files that declare *what* you want to build—the complete specification of your infrastructure.
- Lesson 936 — Deployment Manager Architecture and ComponentsLesson 1667 — Multi-Environment Promotion
- Configure Instance URL
- Define the Jenkins server's URL so it can generate correct links in notifications and webhooks.
- Lesson 1772 — Installing and Configuring Jenkins
- Configure route tables
- to handle IPv6 traffic separately from IPv4
- Lesson 184 — IPv6 Support in Virtual Networks
- Configure weighted routing
- to send 5% of requests to v2, 95% to v1
- Lesson 1606 — Canary Deployments with Service Mesh
- Configures authentication
- sets up Azure AD-based authentication using your current Azure login
- Lesson 1497 — Connecting to AKS with kubectl
- Conflict resolution
- handles concurrent writes to the same data in different regions
- Lesson 2435 — Active-Active Multi-Region
- Conflicting directions
- If a Step Scaling policy wants to add capacity while a Scheduled action wants to reduce it, the larger capacity request wins.
- Lesson 305 — Multiple Scaling Policy Coordination
- Conflicts
- Two people might try to modify the same infrastructure simultaneously without knowing
- Lesson 776 — Local State Storage
- Connect
- button to get `kubectl` connection commands that configure your local CLI access using Azure credentials.
- Lesson 1492 — Creating an AKS Cluster via Azure Portal
- Connection Count
- How many active connections exist to your database.
- Lesson 410 — Database Monitoring and MetricsLesson 2191 — NAT Gateway Monitoring
- Connection draining
- (also called **deregistration delay**) solves this problem by allowing in-flight requests to complete gracefully before the target is fully removed.
- Lesson 241 — Connection Draining and DeregistrationLesson 252 — ALB Connection Handling and TimeoutsLesson 279 — Connection Draining and Graceful Shutdown
- Connection established
- only if both certificates are valid and trusted
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- Connection establishment
- Client sends an upgrade request; the gateway approves and opens a persistent connection
- Lesson 543 — WebSocket APIs
- Connection hours
- – Some providers charge hourly for active virtual interfaces or circuits
- Lesson 2224 — Private Connectivity Cost Management
- Connection lifetime
- Set reasonable timeouts to avoid stale connections
- Lesson 2548 — Connection Pooling and Reuse
- Connection management
- The gateway tracks active connections and routes messages to the correct backend services
- Lesson 543 — WebSocket APIs
- Connection Monitor
- (tracks connectivity and latency over time).
- Lesson 2194 — Provider-Specific Network Insights
- Connection pool settings
- (max connections, timeouts)
- Lesson 1603 — Virtual Services and Destination Rules
- Connection pool sizing
- – Over-provision connection limits to handle retry storms during partial outages
- Lesson 2460 — Capacity Planning for High Availability
- connection pooling
- you've already learned, creating a multi-layered approach to performance optimization.
- Lesson 453 — Caching Strategies for DatabasesLesson 2481 — Read Replica ScalingLesson 2530 — Serverless Database Concepts
- Connection pools
- Service A gets 10 database connections, Service B gets 10 separate ones
- Lesson 2583 — Bulkhead Pattern for IsolationLesson 2589 — Bulkhead Pattern for Isolation
- Connection Settings
- determine how many simultaneous client connections your database accepts (`max_connections`) and connection timeout values.
- Lesson 451 — Database Parameter Tuning
- Connection statistics
- Lesson 1632 — Automatic Metrics Collection
- Connection String Changes
- In some systems, connection strings or service discovery mechanisms automatically redirect clients to the new endpoint
- Lesson 2483 — Automatic Failover Process
- Connection strings
- for applications to connect to databases or storage
- Lesson 899 — Outputs for Template ResultsLesson 2828 — Connection String and Configuration Updates
- Connection Timeout
- How long to wait for an available connection before failing
- Lesson 450 — Connection Pooling and Management
- Connection timeouts
- might indicate firewall rules blocking mTLS ports or proxy misconfigurations.
- Lesson 1630 — mTLS Troubleshooting and VerificationLesson 2187 — Load Balancer Health and MetricsLesson 2456 — Failover Mechanisms and Automation
- Connection Validation
- Test borrowed connections to ensure they're still alive
- Lesson 450 — Connection Pooling and ManagementLesson 2234 — Connection Pooling and Keep-Alive
- Connection-Based Routing
- Once a TCP connection is established, all packets in that session flow to the same backend target.
- Lesson 235 — Network Load Balancers (Layer 4)
- Connections
- Credentials and endpoints for external data sources
- Lesson 2645 — Glue Data Catalog Fundamentals
- Connectivity
- Define network settings—which Virtual Private Cloud (VPC), subnet groups, and whether the database should be publicly accessible
- Lesson 402 — Creating and Launching RDS Instances
- Connectivity Failures
- Completely block traffic between specific components (e.
- Lesson 2495 — Network Chaos Patterns
- Connectivity provider
- The telecom or partner who provisions the physical connection
- Lesson 2215 — Azure ExpressRoute Fundamentals
- Connectivity Tests
- (similar to AWS Reachability Analyzer), **Performance Dashboard** (packet loss and latency metrics), and **Firewall Insights** (identifies shadowed or unused firewall rules).
- Lesson 2194 — Provider-Specific Network Insights
- Cons
- Lesson 287 — Auto Scaling vs Manual ScalingLesson 1916 — GitOps Repository PatternsLesson 2065 — Instrumentation TypesLesson 2281 — Symmetric vs Asymmetric EncryptionLesson 2575 — Service Discovery PatternsLesson 2595 — Cache-Aside and Read-Through PatternsLesson 2686 — Redis Persistence and DurabilityLesson 2698 — Write-Through Caching Pattern
- Conservative
- `maxUnavailable: 1, maxSurge: 0` — slow but safe, one pod at a time
- Lesson 1189 — DaemonSet Update Parameters
- Conservative update
- `maxSurge: 1`, `maxUnavailable: 0` (one-by-one replacement)
- Lesson 1167 — Rolling Update Strategy
- Considerations
- Requires double the infrastructure temporarily, database migrations need careful planning, both environments must handle shared state correctly.
- Lesson 1607 — Blue-Green Deployments
- Consistency
- Every deployment uses the exact same configuration
- Lesson 46 — Immutable Infrastructure PrinciplesLesson 47 — Infrastructure as Code PhilosophyLesson 117 — Storage Consistency ModelsLesson 349 — Groups FundamentalsLesson 403 — Database Parameter GroupsLesson 686 — IaC Benefits: Consistency and RepeatabilityLesson 711 — Code Organization and Module StructureLesson 727 — Terraform Block and Required Providers (+13 more)
- Consistency guarantee
- Strong consistency—all replicas show the same data at the same time.
- Lesson 2473 — State Replication and Consistency Models
- Consistency trade-offs
- emerge: synchronous replication between distant regions adds latency but prevents data loss; asynchronous is faster but risks losing recent writes during failover.
- Lesson 2453 — Geographic Distribution and Multi-Region Design
- Consistent enforcement
- across AWS, Azure, GCP, and hybrid environments
- Lesson 2335 — Introduction to Compliance as Code
- Consistent naming conventions
- across all projects
- Lesson 833 — Repository Structure for Large Projects
- Consistent network performance
- Reduced latency and jitter compared to internet-based connections
- Lesson 2212 — AWS Direct Connect Fundamentals
- Consistent operations
- The same `kubectl` commands work everywhere
- Lesson 2765 — Container-Based Portability
- Consistent Performance
- Predictable latency and throughput, critical for real-time applications or large data transfers.
- Lesson 2201 — AWS Direct Connect FundamentalsLesson 2230 — Network Placement Groups
- Consistent Prefix
- Reads never see out-of-order writes, but might be behind.
- Lesson 437 — Cosmos DB Consistency Levels
- Consistent Processes
- Authentication, patching, backup schedules, incident response—these should work the same way whether a server is physical, virtual on-prem, or in the cloud.
- Lesson 2815 — Hybrid Operations and Coexistence
- Consistent security
- Enforce uniform network ACLs and flow logs across all accounts
- Lesson 230 — Shared VPCs and Multi-Account Networking
- Consistent standards
- Company-wide security policies applied uniformly across all projects
- Lesson 695 — IaC Security and Compliance Benefits
- Consistent testing
- If tests pass in your container locally, they'll behave the same way in your colleague's container and in CI/CD pipelines.
- Lesson 970 — Developer Workflow Improvements
- Consistent tooling
- One set of skills, one config format, many destinations
- Lesson 2772 — API Gateway Abstraction
- Consistent traffic management
- Load balancing, routing, and traffic splitting work identically across clouds
- Lesson 2769 — Service Mesh for Portability
- Consolidate related secrets
- into structured formats (JSON) rather than storing many individual secrets
- Lesson 2251 — Secrets Management Cost Optimization
- Constraints
- are the instances that actually enforce those rules.
- Lesson 1415 — Implementing ConstraintsLesson 1558 — Helm Schema ValidationLesson 2344 — GCP Organization Policy Service
- Constraints and triggers
- Different syntax and capabilities
- Lesson 2823 — Heterogeneous Database Migration
- Consul
- Distributed key-value store for multi-datacenter deployments
- Lesson 2253 — Vault Architecture and ComponentsLesson 2471 — Leader Election and ConsensusLesson 2773 — Configuration Management Portability
- Consul KV
- , **etcd**, or even git-backed configuration repositories that your deployment pipeline injects as environment variables at runtime.
- Lesson 2773 — Configuration Management Portability
- consume
- a module, you reference it in your Bicep file using a special syntax that points to the registry, module path, and version.
- Lesson 929 — Module RegistriesLesson 1848 — Pipeline Variables and Parameter Passing
- consumer
- ), it doesn't call the consumer directly.
- Lesson 550 — Message Queue FundamentalsLesson 2397 — Private Link and Endpoint Services
- Consumer defines expectations
- The consumer team writes tests specifying API calls and expected responses
- Lesson 2585 — Contract Testing and API Contracts
- Consumer function
- pulls messages from the queue and does the heavy processing
- Lesson 2505 — Async Processing with Queues
- Consumer groups
- multiple consumers share topic partitions for parallel processing.
- Lesson 2609 — Kafka Producers and Consumers
- Consumer Health Monitoring
- Track each consumer's error rates, processing times, and throughput.
- Lesson 581 — Event-Driven Monitoring and Observability
- Consumer receives message
- → visibility timeout starts
- Lesson 554 — Message Visibility and TimeoutsLesson 2713 — Message Visibility and Acknowledgment
- Consumer-driven contracts
- flip the traditional approach: instead of the provider dictating the API, *consumers* specify what they need.
- Lesson 2585 — Contract Testing and API Contracts
- Consumers
- are services that subscribe to these events and take action when they occur.
- Lesson 568 — Event Producers and ConsumersLesson 2609 — Kafka Producers and ConsumersLesson 2710 — Message Queue Fundamentals Revisited
- Consumption Zone (Gold/Production)
- Lesson 2631 — Data Lake Zones and Organization
- Consumption-Based Model
- You typically pay based on usage — per user, per month, or by feature tier.
- Lesson 15 — Software as a Service (SaaS) Overview
- Contacts the registry
- using the image name and tag (or digest)
- Lesson 994 — Pulling Images from Registries
- container
- is a lightweight, standalone, executable package that bundles everything an application needs to run: the code itself, runtime environment, system tools, libraries, and settings.
- Lesson 960 — What Are Containers?Lesson 974 — Image vs Container: Key Differences
- Container characteristics
- Lesson 974 — Image vs Container: Key Differences
- container image
- .
- Lesson 472 — Function Packaging and DeploymentLesson 965 — Container Portability BenefitsLesson 973 — What is a Container Image?
- Container Insights
- on your AKS cluster, Azure automatically deploys a containerized agent (similar to the DaemonSet pattern you know) that collects stdout/stderr logs, performance metrics, and cluster events, forwarding them to your Log Analytics workspace.
- Lesson 2053 — Azure Monitor Logs
- Container Network Interface (CNI)
- plugin to implement (like Calico, Flannel, or Cilium).
- Lesson 1150 — Pod Networking Fundamentals
- Container Network Model (CNM)
- , which consists of three main building blocks:
- Lesson 1041 — Docker Network Architecture
- Container registers itself
- When a new container starts, the orchestrator tells the ALB's target group, "Hey, there's a new instance of this app running on port 32768"
- Lesson 258 — ALB and Container Integration
- Container restarts
- Check the exit code with `kubectl describe pod <pod-name>`.
- Lesson 1444 — Troubleshooting with Logs
- Container runtime
- The software responsible for actually running containers (like Docker, containerd, or CRI-O)
- Lesson 1108 — Worker Node Components IntroductionLesson 1110 — Container Runtime IntegrationLesson 1150 — Pod Networking FundamentalsLesson 1431 — Container Logging Fundamentals
- Container Scanning
- inspects Docker images for vulnerabilities in base images and installed packages.
- Lesson 1766 — Pipeline Security Scanning
- Container Security Context
- gives you this fine-grained control.
- Lesson 1390 — Container Security ContextLesson 1391 — Running as Non-Root UsersLesson 1392 — Read-Only Root FilesystemLesson 1393 — Privilege Escalation Control
- Container spec patterns
- used in multiple workloads
- Lesson 1557 — Advanced Templating with Named Templates
- Container Storage Interface (CSI)
- is an open standard that defines how container orchestrators like Kubernetes expose block and file storage systems to containerized workloads.
- Lesson 1317 — Container Storage Interface (CSI) Overview
- Container-based
- Each build runs in an isolated Docker environment
- Lesson 1812 — CodeBuild: Managed Build Service Overview
- Container-Optimized OS
- Minimal, hardened OS with automatic security updates
- Lesson 1488 — GKE Security: Private Clusters and Hardening
- containerd
- (pronounced "container-dee") is a lower-level runtime that Docker Engine itself uses under the hood.
- Lesson 962 — Container Runtime BasicsLesson 1110 — Container Runtime Integration
- Containerized workloads
- (ECS, EKS, AKS, GKE) follow a **pay-per-time** model.
- Lesson 2163 — Serverless vs Containers Cost Analysis
- containers
- , and **FaaS**.
- Lesson 461 — FaaS vs. Traditional Compute ModelsLesson 961 — Containers vs Virtual Machines
- Containers are cheaper when
- Lesson 2163 — Serverless vs Containers Cost Analysis
- Content Delivery Network (CDN)
- is a globally distributed network of servers that cache and serve your static content (images, CSS, JavaScript, videos) from locations physically closer to your users.
- Lesson 582 — What is a CDN and Why Use OneLesson 2671 — CDN Caching Fundamentals Review
- Content licensing
- Streaming services often have different rights in different countries.
- Lesson 603 — Geographic Restrictions
- Content management systems
- need to preserve uploaded images and files
- Lesson 1287 — Storage Challenges in Containers
- Content negotiation
- Different response formats based on headers
- Lesson 2571 — RESTful API Design for Microservices
- Content updates
- – After using cache invalidation strategies, repopulate quickly
- Lesson 2676 — Cache-Warming and Preloading
- Content-aware routing
- route by URL path, host headers, or HTTP methods
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Content-Based Filtering
- examines event attributes—like `event.
- Lesson 2736 — Event Filtering and Routing
- context
- the circumstances surrounding a request:
- Lesson 366 — Condition Keys and ContextLesson 466 — Function Lifecycle and ContextLesson 563 — Message Attributes and MetadataLesson 599 — Custom Headers and Origin RequestsLesson 652 — What Are Logs and Why They MatterLesson 1055 — Build Configuration and ContextLesson 1132 — Kubeconfig Files and Contexts
- Context awareness
- It considers factors like day of week, time of month, and business cycles
- Lesson 2987 — Cost Anomaly Detection Systems
- Context enrichment
- Alerts include resource tags, account IDs, and service names to speed diagnosis
- Lesson 2150 — Cost Anomaly Detection
- Context objects
- are special data structures that hold information about the workflow run, repository, environment variables, and secrets.
- Lesson 1692 — Context and Expression Syntax
- Context Propagation
- Injecting trace IDs into HTTP headers or message queues adds microseconds per operation— negligible alone, but significant at scale.
- Lesson 2071 — Instrumentation OverheadLesson 2076 — Spans, Traces, and Context PropagationLesson 2086 — OpenTelemetry in Kubernetes Environments
- Context Switching
- At minimum, organize your kubeconfig files carefully, use meaningful context names, and leverage tools that help visualize which cluster you're currently operating on.
- Lesson 1513 — Multi-Cluster Management
- Context-aware
- Factors like device health, location, time, and risk score influence access decisions
- Lesson 2393 — Zero Trust Network Access (ZTNA)
- Contexts
- Combine a cluster + user + optional namespace into a named profile
- Lesson 1132 — Kubeconfig Files and Contexts
- Contextual access
- Consider time, location, or rate limits
- Lesson 1626 — External Authorization IntegrationLesson 2848 — Continuous Verification and Contextual Access
- Contextual linking
- Automatically associating infrastructure resources (from earlier Kubernetes visualization lessons) with their deployment history and runtime behavior
- Lesson 2934 — Integrating CI/CD and Observability
- Contextual links
- and **drill-down** capabilities turn your visualizations into clickable gateways, letting users navigate from high-level overview metrics to detailed traces, logs, or related systems without leaving their investigation flow.
- Lesson 2109 — Contextual Links and Drill-Down
- contextual metadata
- that wasn't in the original log.
- Lesson 2010 — Log Parsing and EnrichmentLesson 2012 — Log Correlation and Context
- Continue pattern
- (optional): What subsequent lines look like (often indented or starting with whitespace)
- Lesson 1441 — Multi-Line Log Handling
- Continuous Authentication
- Sessions are periodically re-validated using factors like device health, location, and behavioral biometrics.
- Lesson 2402 — Continuous Verification and Monitoring
- Continuous data collection
- Agents or APIs pull CPU, memory, disk I/O, and network metrics across all resources
- Lesson 2979 — Right-Sizing at Scale with Automation
- Continuous Data Protection
- solves this by continuously capturing changes as they occur, often at the byte or transaction level.
- Lesson 2429 — Continuous Data Protection (CDP)
- Continuous Data Replication (CDC)
- DMS captures ongoing changes from the source database and applies them to the target in near real-time.
- Lesson 2821 — Database Migration Service (DMS) Fundamentals
- Continuous Delivery
- means your code is *always* in a deployable state and automatically deployed to a **staging or pre-production environment**.
- Lesson 1645 — What is Continuous Delivery and Deployment?
- Continuous Deployment
- takes it one step further: every change that passes all automated tests is **automatically deployed to production** without human intervention.
- Lesson 1645 — What is Continuous Delivery and Deployment?
- Continuous Evidence Collection
- Instead of scrambling before audits, modern compliance as code generates evidence continuously, creating an always-ready audit trail.
- Lesson 2363 — Compliance Reporting and Evidence
- Continuous improvement
- Plan-Do-Check-Act cycle for ongoing security enhancement
- Lesson 2325 — ISO 27001 Information SecurityLesson 2412 — Mean Time to Recovery (MTTR)
- Continuous improvement is mandatory
- Ship incremental value regularly.
- Lesson 2915 — Platform as Product Mindset
- Continuous Integration (CI)
- is a development practice where developers frequently merge their code changes into a shared repository—often several times a day.
- Lesson 1644 — What is Continuous Integration?
- Continuous Integration/Continuous Deployment (CI/CD)
- Connect directly to GitHub, Azure DevOps, or other repositories.
- Lesson 101 — Azure App Service Overview
- Continuous Learning
- The model adapts as your baseline changes over time
- Lesson 644 — Anomaly Detection AlarmsLesson 2952 — Building a FinOps Culture
- Continuous Monitoring
- Lesson 1074 — Scan Timing and TriggersLesson 2335 — Introduction to Compliance as Code
- Continuous Optimization Program
- establishes the rhythms, accountability frameworks, and motivational structures that keep cost efficiency alive across your organization indefinitely.
- Lesson 2989 — Continuous Optimization Programs
- Continuous or near-continuous replication
- instead of periodic backups
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Continuous Reconciliation
- The system constantly compares actual state with desired state and corrects any drift, creating self-healing infrastructure.
- Lesson 1852 — What is GitOps?Lesson 1858 — Continuous ReconciliationLesson 1865 — Pull-Based vs Push-Based GitOpsLesson 1871 — Multi-Cluster GitOpsLesson 1877 — What is ArgoCD and GitOps CD
- continuous replication
- to keep source and target databases synchronized while your application remains operational.
- Lesson 2821 — Database Migration Service (DMS) FundamentalsLesson 2822 — Homogeneous Database Migration
- Continuous validation
- Both sides test independently; contracts catch breaking changes before deployment
- Lesson 2585 — Contract Testing and API Contracts
- Continuous verification
- challenges this by constantly evaluating whether access should remain granted.
- Lesson 2848 — Continuous Verification and Contextual AccessLesson 2862 — AWS GuardDuty
- Contour
- (built on Envoy proxy) is designed for large-scale deployments.
- Lesson 1230 — Ingress Controller Options
- Contribution Guidelines
- Document exactly how developers can contribute—coding standards, testing requirements, review processes.
- Lesson 2944 — Inner Source and Contribution Models
- Contributor
- Can create and manage all resources but *cannot* grant permissions to others.
- Lesson 387 — Azure Built-in Roles
- Control
- Lesson 27 — Deployment Model Selection CriteriaLesson 171 — Virtual Network ConceptsLesson 1884 — Sync Policies and Manual vs Auto Sync
- Control access
- Use Azure RBAC to determine who can view or deploy
- Lesson 908 — Template Specs for Reusable Templates
- Control caching
- by adjusting `Cache-Control` or `Expires` headers without changing your origin server
- Lesson 604 — Response Header Customization
- Control costs
- Prevent functions from running longer than expected
- Lesson 476 — Function Timeout Configuration
- Control data flow
- between zones using firewalls, security groups, and network policies
- Lesson 2841 — Security Boundaries and Trust Zones
- Control IAM permissions
- at the ring level for multiple keys at once
- Lesson 2318 — GCP Cloud KMS Structure and Key Rings
- Control network placement
- Decide which parts of your VPC can host database instances
- Lesson 405 — Subnet Groups and Network Placement
- Control Plane
- The "brain" of the cluster.
- Lesson 1100 — Kubernetes Cluster Architecture OverviewLesson 1491 — AKS Architecture and Control Plane ManagementLesson 1505 — Managed Kubernetes OverviewLesson 1567 — Data Plane vs Control PlaneLesson 1568 — Service Discovery in MeshLesson 1570 — Service Mesh Observability BenefitsLesson 1571 — Traffic Management CapabilitiesLesson 1595 — AWS App Mesh Overview (+2 more)
- control plane health
- , **node status**, and **overall cluster metrics**.
- Lesson 1518 — Observability for Cluster OperationsLesson 1628 — Certificate Rotation and Expiry
- Control Plane Metrics
- track your API server request rates, etcd performance, scheduler queue depth, and authentication failures.
- Lesson 1518 — Observability for Cluster Operations
- Control plane operations
- `CreateKey`, `RotateKey`, `DisableKey`, `ScheduleKeyDeletion` (for administrators)
- Lesson 2289 — Key Policies and Access Control
- Control plane security patches
- – Critical vulnerabilities addressed quickly
- Lesson 1505 — Managed Kubernetes Overview
- Control plane upgrades
- – Version updates with minimal disruption
- Lesson 1505 — Managed Kubernetes Overview
- Control vs. Convenience Trade-off
- Lesson 19 — Choosing the Right Service Model
- Controller executors
- Set to 0 or 1—keep builds off the controller
- Lesson 1806 — Performance Tuning and Resource Management
- Controller Logs
- Lesson 1944 — Flux Monitoring and Troubleshooting
- Controller Manager
- (`controllerManager`): Core controller activities
- Lesson 1473 — EKS Logging and CloudWatch Integration
- Controller Plugin
- acts like a central manager.
- Lesson 1318 — CSI Architecture and ComponentsLesson 1319 — Installing and Deploying CSI Drivers
- controllers
- specialized loops that each watch a specific type of resource.
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1106 — Built-in Controllers OverviewLesson 1932 — Flux Controller Architecture
- Cookie name
- Use the ALB-generated cookie or specify your own application cookie
- Lesson 255 — Sticky Sessions (Session Affinity)
- Cookie-based affinity
- The load balancer inserts a cookie identifying the backend instance
- Lesson 2467 — Sticky Sessions and Affinity
- Cookie-based stickiness
- The load balancer inserts a special cookie (`AWSALB` for ALBs) in the response, then reads it on subsequent requests to route to the same target.
- Lesson 278 — Session Affinity and Sticky Sessions
- Cookies
- Check for `user_segment=beta-tester` cookie values
- Lesson 1608 — A/B Testing and Experimentation
- Cool/Infrequent Access
- Minutes to retrieve, medium cost (last 30-90 days)
- Lesson 2055 — Log Retention and Storage ClassesLesson 2156 — Storage Lifecycle and TieringLesson 2157 — Object Storage Cost Optimization
- Cooldown
- 300 seconds (5 minutes)
- Lesson 300 — Simple Scaling PoliciesLesson 322 — VMSS Scaling Policies and Rules
- Cooldown interactions
- Different policy types may have their own cooldown periods, but they all respect the group's overall cooldown to prevent thrashing.
- Lesson 305 — Multiple Scaling Policy Coordination
- cooldown period
- is a configurable waiting time (typically 300 seconds/5 minutes by default) that prevents Auto Scaling from initiating another scaling action immediately after a previous one completes.
- Lesson 293 — Cooldown PeriodsLesson 300 — Simple Scaling PoliciesLesson 303 — Cooldown Periods and WarmupLesson 327 — MIG Autoscaling Configuration
- Cooldown period begins
- , preventing further actions until it expires
- Lesson 300 — Simple Scaling Policies
- Cooldown periods
- (now called `behavior` configuration) define minimum wait times between scaling actions
- Lesson 1451 — HPA Scaling BehaviorLesson 2155 — Auto Scaling for Cost Efficiency
- Coordinates
- the deployment sequence (all at once, rolling, blue-green)
- Lesson 1813 — CodeDeploy: Deployment Automation Overview
- Coordination
- Passing data between functions without tight coupling
- Lesson 2515 — Workflow Orchestration Fundamentals
- Copies
- the entire file from the read-only layer up to the writable layer
- Lesson 979 — Copy-on-Write StrategyLesson 1032 — Docker Storage Architecture Overview
- Copy Activity
- Moves data between sources
- Lesson 2620 — Azure Data Factory PipelinesLesson 2650 — ADF Pipeline Activities and Control Flow
- Core functions
- Lesson 2824 — Schema Conversion Tools
- CoreDNS
- is Kubernetes' built-in DNS server that runs as a pod (usually in the `kube-system` namespace).
- Lesson 1113 — CoreDNS for Service DiscoveryLesson 1206 — Service Discovery with DNSLesson 1469 — EKS Add-ons Overview
- Correlate across instances
- when a single request touches multiple ephemeral pods
- Lesson 2046 — Cloud-Native Logging Overview
- Correlate across services
- Link logs by `trace_id` or `request_id`
- Lesson 2047 — Structured Logging in Applications
- Correlation
- Connect events across different services (user hit API Gateway, which called Lambda, which queried database)
- Lesson 657 — Centralized Logging ConceptsLesson 2043 — Datadog Logs and Log ManagementLesson 2044 — New Relic Logs in ContextLesson 2069 — Correlation with Logs and MetricsLesson 2355 — Audit Log Analysis and SearchLesson 2861 — Security Information and Event Management (SIEM)
- Correlation ID
- links related messages
- Lesson 563 — Message Attributes and MetadataLesson 661 — Correlation IDs and Request TracingLesson 2012 — Log Correlation and ContextLesson 2057 — Correlation IDs and Tracing Context
- Correlation IDs
- Each request message includes a unique identifier (correlation ID).
- Lesson 2579 — Request-Reply over Message Queues
- CORS management
- Insert `Access-Control-Allow-Origin: *` for public APIs without modifying backend code.
- Lesson 604 — Response Header Customization
- Cortex multi-tenancy
- works similarly: it allows multiple teams, business units, or even external customers to use the same horizontally scalable Prometheus infrastructure while keeping their metrics completely isolated from each other.
- Lesson 1985 — Cortex Multi-Tenancy
- Cost
- Lesson 27 — Deployment Model Selection CriteriaLesson 220 — VPC Endpoints for AWS ServicesLesson 417 — Multi-AZ vs Single-AZ Trade-offsLesson 1323 — Topology-Aware Volume ProvisioningLesson 1327 — CSI Driver Selection and ComparisonLesson 1496 — AKS Networking Models: kubenet vs Azure CNILesson 2045 — Comparing Logging Solution Trade-offsLesson 2099 — Trace Backend Selection Criteria (+3 more)
- Cost Allocation
- Lesson 92 — VM Tagging and OrganizationLesson 169 — Object Tagging and MetadataLesson 2144 — GCP Labels for Cost TrackingLesson 2156 — Storage Lifecycle and TieringLesson 2173 — Azure Cost Management and BillingLesson 2932 — Kubernetes and Cloud Resource Visualization
- Cost allocation tags
- to track which team or project generated charges
- Lesson 2138 — Cloud Billing Structure BasicsLesson 2142 — Cost Allocation Tags in AWSLesson 2147 — Multi-Account Cost ConsolidationLesson 2152 — Right-Sizing Resources
- Cost Analysis
- provides interactive charts and filters to examine your spending patterns by subscription, resource group, service, region, or custom tags.
- Lesson 2173 — Azure Cost Management and Billing
- Cost and Usage Reports
- to correlate spending with actual usage
- Lesson 2986 — Idle Resource Detection and Cleanup
- Cost anomaly tools
- Services like AWS Cost Explorer or Azure Advisor automatically highlight underutilized resources.
- Lesson 2160 — Idle Resource Detection
- Cost baseline
- documenting current spend to compare against cloud projections
- Lesson 2797 — Migration Assessment Framework
- Cost centers
- (accounting codes like "CC-12345" for Marketing)
- Lesson 2965 — Cost Centers and Business Units
- Cost components
- on-demand rates, reservation discounts, support fees
- Lesson 2962 — Cloud Billing Data Structure
- Cost constraints
- Spot instances for fault-tolerant batch jobs; reserved instances for stable production workloads
- Lesson 110 — Compute Service Selection Criteria
- Cost control
- Maximum capacity prevents surprise bills
- Lesson 310 — Capacity Limits and ConstraintsLesson 478 — Function Concurrency LimitsLesson 837 — Policy Enforcement with Sentinel
- Cost efficiency
- No wasted spend on idle resources
- Lesson 30 — Pay-as-You-Go Pricing Model FundamentalsLesson 230 — Shared VPCs and Multi-Account NetworkingLesson 1224 — Host-Based RoutingLesson 1815 — CodeArtifact: Artifact Repository ServiceLesson 2201 — AWS Direct Connect FundamentalsLesson 2208 — Transit Gateway for Hybrid NetworksLesson 2214 — Direct Connect GatewayLesson 2462 — Stateless Services and Horizontal Scaling (+1 more)
- Cost estimation
- Frequent failures (low MTBF) increase operational costs
- Lesson 2413 — Mean Time Between Failures (MTBF)
- Cost Explorer
- tools to estimate monthly savings from downsizing.
- Lesson 2152 — Right-Sizing ResourcesLesson 2153 — Reserved Instances and Savings Plans
- Cost governance
- budget limits, tagging requirements, approval workflows
- Lesson 2762 — Multicloud Governance and Operating Model
- Cost Guard
- Fire when `BudgetThreshold-80% AND UnusualSpend` both alarm, preventing false positives from expected seasonal costs.
- Lesson 645 — Composite Alarms
- Cost impact
- Will this provision expensive resources unnecessarily?
- Lesson 715 — Code Review and Peer ValidationLesson 2680 — CDN Cache Analytics and Hit Rates
- Cost Management
- Each provider has different pricing models, billing cycles, and cost optimization strategies.
- Lesson 2756 — Multicloud Challenges: Complexity and Management Overhead
- Cost Management APIs
- provide programmatic access to the same cost data, enabling custom integrations, dashboards, and automation scripts.
- Lesson 2176 — Azure Cost Exports and APIs
- Cost model
- You pay for each read and write request—no minimum commitment.
- Lesson 2532 — DynamoDB Capacity ModesLesson 2642 — Introduction to Serverless ETL
- Cost multiplier
- Running in three regions roughly triples infrastructure costs, though you can use patterns like pilot light (covered earlier) to reduce standby costs.
- Lesson 2453 — Geographic Distribution and Multi-Region Design
- Cost optimization
- private traffic avoids data transfer charges through the public internet
- Lesson 216 — VPC Peering FundamentalsLesson 1313 — StorageClass Topology ConstraintsLesson 1505 — Managed Kubernetes OverviewLesson 1690 — Self-hosted Runners OverviewLesson 1720 — Self-Hosted RunnersLesson 2209 — SD-WAN Integration with CloudLesson 2532 — DynamoDB Capacity ModesLesson 2568 — Hybrid Microservice Deployments (+4 more)
- Cost optimization strategies include
- Lesson 2224 — Private Connectivity Cost Management
- Cost per Active User
- Monthly spend divided by monthly active users (MAU).
- Lesson 2971 — Unit Economics and Metrics
- Cost per Data Unit
- Spending per TB stored, processed, or transferred.
- Lesson 2971 — Unit Economics and Metrics
- Cost per transaction
- or per user
- Lesson 37 — Measuring Cloud Business Value: KPIs and MetricsLesson 2971 — Unit Economics and Metrics
- Cost perspective
- Data events can increase logging costs 100x or more.
- Lesson 2352 — Management vs Data Event Logging
- Cost policies
- resource sizing limits, tagging requirements
- Lesson 2900 — Policy Libraries and Reusability
- Cost savings
- Automatically transition old objects from Hot storage to Cold or Archive tiers
- Lesson 158 — Object Lifecycle PoliciesLesson 309 — Mixed Instance PoliciesLesson 591 — Origin Shield and Cache HierarchiesLesson 2715 — Message Attributes and FilteringLesson 2811 — Network Optimization for Migration
- Cost tracking
- Identify which department or application is generating cloud bills (e.
- Lesson 63 — VM Tags and Resource OrganizationLesson 905 — Tags and Resource Metadata
- Cost tracking by dimension
- Project, environment, cost center, application
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Cost validation
- Verify cost estimates stay within acceptable thresholds
- Lesson 2887 — CI/CD Integration for IaC Tests
- Cost-Benefit Analysis
- Lower MTTR requires investment in better backups, automation, and failover systems.
- Lesson 2412 — Mean Time to Recovery (MTTR)
- Cost-benefit analytics
- showing savings from each lifecycle transition
- Lesson 2980 — Storage Lifecycle Optimization
- Cost-effective
- Pay only for data scanned, not for idle compute or storage duplication
- Lesson 2640 — Query Engines for Data Lakes
- Cost-effective analytics
- Organizations wanting powerful analytics without committing to always-on warehouse infrastructure
- Lesson 2656 — Serverless Query Engine Overview
- Cost-saving strategies
- Lesson 2251 — Secrets Management Cost Optimization
- Count
- Retain only the 10 most recent versions of each image
- Lesson 1082 — Image Retention and Lifecycle PoliciesLesson 2368 — AWS WAF FundamentalsLesson 2369 — AWS WAF Rules and Rule Groups
- Count your resources
- How many VMs, databases, or load balancers will this subnet hold?
- Lesson 177 — Subnet Sizing and Planning
- Count-based retention
- preserves the last N builds per branch or service.
- Lesson 1678 — Artifact Retention and Cleanup
- counter
- is a metric that only increases over time (or resets to zero).
- Lesson 627 — Metric Types: Counters and GaugesLesson 1949 — Metric Types: CounterLesson 1958 — Alerting Rules
- counters
- and **gauges** helps you choose the right metric type and interpret your data correctly.
- Lesson 627 — Metric Types: Counters and GaugesLesson 1950 — Metric Types: Gauge
- Counting and summarizing
- Lesson 677 — Kusto Query Language (KQL) Basics
- Coverage gaps
- Which workloads lack RI protection?
- Lesson 2976 — Reserved Instance Portfolio Management
- Coverage rates
- show how much of your compute uses reserved instances or savings plans versus on-demand.
- Lesson 2988 — Optimization Metrics and KPIs
- Covered Entity
- ) and your cloud provider (the **Business Associate**) share legal responsibility.
- Lesson 2327 — HIPAA for Healthcare Data
- CP systems
- (like traditional relational databases with synchronous replication) prioritize consistency over availability.
- Lesson 2466 — Stateful Services: Challenges and Trade-offs
- CPU limits
- set a ceiling on how much CPU a container can actually use.
- Lesson 1334 — Setting CPU Limits
- CPU quota system
- kicks in and forces the container to pause execution for brief periods
- Lesson 1340 — CPU Throttling Behavior
- CPU Utilization
- Lesson 290 — Scaling Triggers and MetricsLesson 304 — Scaling Metrics SelectionLesson 327 — MIG Autoscaling ConfigurationLesson 410 — Database Monitoring and MetricsLesson 446 — Database Performance Metrics and MonitoringLesson 966 — Density and Resource Efficiency
- CPU-intensive workloads
- (batch processing, scientific modeling, gaming servers) → **Compute Optimized** instances provide high-performance processors at optimal cost.
- Lesson 78 — Choosing Instance Types for Your WorkloadLesson 1508 — Node Pool Management
- CQL (Cassandra Query Language)
- , these managed services let you migrate without rewriting code.
- Lesson 443 — Keyspaces and Cassandra-Compatible Services
- CQRS
- separates reads from writes, **saga patterns** handle distributed transactions, and **event replay** lets you rebuild state or fix errors.
- Lesson 2738 — Event-Driven State Machines
- crash-consistent
- by default — they capture data as if the system suddenly lost power.
- Lesson 131 — Volume SnapshotsLesson 2421 — Application-Consistent vs. Crash-Consistent Backups
- Crash-consistent backups
- capture storage at a single point in time—like pulling the power plug on a running server.
- Lesson 2421 — Application-Consistent vs. Crash-Consistent Backups
- Crawl, Walk, Run
- that describe how sophisticated an organization is at implementing FinOps practices.
- Lesson 2955 — FinOps Maturity Model
- Crawlers
- Automated scanners that infer schemas from your data sources and populate the Data Catalog without manual intervention.
- Lesson 2643 — AWS Glue Overview
- CRDs before CRs
- Install custom resource definitions before resources that use them
- Lesson 1939 — Dependency Management
- create
- the volume by specifying its size, performance tier (remember those IOPS and throughput metrics?
- Lesson 128 — Creating and Attaching VolumesLesson 772 — Reading Plan OutputLesson 941 — Deployment Lifecycle OperationsLesson 996 — Multi-Architecture ImagesLesson 2242 — Azure Key Vault FundamentalsLesson 2245 — GCP Secret Manager Fundamentals
- Create a change set
- You submit your updated template to CloudFormation, which analyzes the differences
- Lesson 851 — Stack Updates and Change SetsLesson 878 — Stack Updates and Change Sets
- Create a monitor
- targeting specific cost allocation tags, accounts, or services
- Lesson 2171 — AWS Cost Anomaly Detection
- Create a volume
- Lesson 1036 — Creating and Managing Volumes
- Create Admin User
- Set up your administrator credentials rather than using the temporary unlock password.
- Lesson 1772 — Installing and Configuring Jenkins
- Create an AppRole
- with policies defining what secrets it can access
- Lesson 2258 — AppRole Authentication for Applications
- Create child spans
- that link back to the parent trace, even though they execute later
- Lesson 2072 — Tracing in Async and Event-Driven Systems
- Create individual administrative users
- with only the permissions they need (remember the Principle of Least Privilege from lesson 334).
- Lesson 339 — Root Account and Administrative Access
- Create individual IAM users
- for each person (even yourself)
- Lesson 377 — AWS IAM Users and Root Account
- Create new infrastructure
- from scratch (compute instances, networks, databases)
- Lesson 753 — When to Use Resources vs Data Sources
- Create vs Approve
- One team member creates IAM policies or firewall rules, another reviews and approves them before activation.
- Lesson 2835 — Separation of Duties
- CREATE_COMPLETE
- – All resources created successfully
- Lesson 850 — Stack Creation Process and EventsLesson 877 — Stack Creation and Lifecycle
- CREATE_FAILED
- – One or more resources couldn't be created
- Lesson 850 — Stack Creation Process and EventsLesson 877 — Stack Creation and Lifecycle
- CREATE_IN_PROGRESS
- – Stack creation has started
- Lesson 850 — Stack Creation Process and EventsLesson 877 — Stack Creation and Lifecycle
- Creates a destruction plan
- showing exactly what will be deleted
- Lesson 780 — terraform destroy Workflow
- Creates a standby replica
- in a different availability zone (a separate data center with independent power, networking, and infrastructure)
- Lesson 415 — Multi-AZ Deployments Fundamentals
- Creating a secret
- involves specifying a name, choosing an encryption key (default AWS-managed or your own CMK), and providing the secret value as key-value pairs or plaintext.
- Lesson 2239 — AWS Secrets Manager Fundamentals
- Creation
- Generate keys when needed for programmatic access
- Lesson 343 — Access Keys and Credential ManagementLesson 739 — Resource Blocks and the Resource Lifecycle
- Creation Schedules
- Define when snapshots are taken (hourly, daily, weekly).
- Lesson 132 — Snapshot Lifecycle Management
- Credential Domains
- filter when credentials appear based on hostnames or URLs.
- Lesson 1804 — Credential Management at Scale
- Credential Management at Scale
- is about structuring credential access through folders, domains, and external secret managers.
- Lesson 1804 — Credential Management at Scale
- Credential retrieval
- Commands to get secrets or passwords
- Lesson 1544 — NOTES.txt and User Instructions
- Credentials Plugin
- Secure credential storage and injection
- Lesson 1775 — Jenkins Plugins and ExtensibilityLesson 1777 — Jenkins Credentials Management
- Credits and incentives
- Migration credits, professional services hours, or training allowances
- Lesson 2166 — Discount Negotiation and EDP
- CRI-O
- is specifically designed for Kubernetes.
- Lesson 962 — Container Runtime BasicsLesson 1110 — Container Runtime Integration
- critical
- dependencies strictly, but allow **degraded** operation for non-critical services
- Lesson 285 — Advanced Health Check StrategiesLesson 1679 — Artifact Security ScanningLesson 2489 — Monitoring Replication Health
- Critical (9.0–10.0)
- Immediate threat, often remotely exploitable with severe impact
- Lesson 1075 — Vulnerability Severity and Prioritization
- Critical (P0/P1)
- Service-impacting issues requiring immediate response.
- Lesson 649 — Alert Severity and Prioritization
- Critical customer-facing endpoints
- Lesson 493 — Provisioned Concurrency
- Critical issue
- when you delete or scale down a StatefulSet, the PVCs are *not* automatically deleted.
- Lesson 1190 — StatefulSet and DaemonSet Troubleshooting
- Critical limitation
- Multi-attach volumes don't automatically handle file system locking or data consistency.
- Lesson 135 — Multi-Attach Volumes
- Critical rule
- The pod template labels **must match** the selector, or Kubernetes will reject your Deployment.
- Lesson 1164 — Deployment Selectors and LabelsLesson 1471 — EKS Cluster UpgradesLesson 1546 — Subcharts and Values Overrides
- Critical scenarios include
- Lesson 2676 — Cache-Warming and Preloading
- Critical services
- Lower `periodSeconds: 5` for faster failure detection
- Lesson 1426 — Probe Timing ParametersLesson 2122 — SLOs for Different Service Tiers
- Critical systems
- (APIs, payment services): 10–30s intervals for quick anomaly detection
- Lesson 1988 — Scrape Interval Optimization
- Critical tier systems
- (RTO < 1 hour): Monthly or quarterly
- Lesson 2415 — DR Testing and Validation Frequency
- Cron patterns
- provide time-based scheduling using familiar syntax like `0 2 * * *` (run daily at 2 AM) or `*/15 * * * *` (every 15 minutes).
- Lesson 2616 — Job Scheduling and Orchestration
- Cron Schedules
- run builds at specific times, regardless of code changes:
- Lesson 1789 — Triggers and Automated Execution
- CronJob
- in Kubernetes creates Jobs on a repeating schedule, just like the classic Unix cron utility.
- Lesson 1196 — CronJob Resource Fundamentals
- CronJob History and Retention
- (`successfulJobsHistoryLimit`) to balance observability with resource usage.
- Lesson 1202 — Job and CronJob Best Practices
- Cross-Account Access
- With proper IAM policies and resource-based permissions, services in Account A can retrieve secrets stored in Account B's secrets manager.
- Lesson 2249 — Cross-Service Secrets Integration
- Cross-Account Backup
- goes further by storing backups in a separate AWS/Azure/GCP account entirely—often a dedicated "backup account" managed by different IAM credentials and policies.
- Lesson 2426 — Cross-Region and Cross-Account Backup
- Cross-account DR
- (your disaster recovery account can restore from production snapshots)
- Lesson 425 — Snapshot Copying and Sharing
- Cross-Account Log Collection
- Configure each account to write audit logs to a centralized storage bucket or log repository in a dedicated "logging" or "security" account.
- Lesson 2354 — Centralized Audit Log Aggregation
- Cross-Account Pipelines
- require IAM cross-account roles.
- Lesson 1846 — Cross-Region and Cross-Account Pipelines
- Cross-account roles
- are IAM roles that allow identities in one cloud account to temporarily assume permissions in another account.
- Lesson 354 — Cross-Account Roles
- Cross-account sharing
- Are RIs applied where they deliver maximum value?
- Lesson 2976 — Reserved Instance Portfolio Management
- Cross-Cloud Connectivity
- Establishing secure, performant connections between clouds requires VPNs, direct interconnects (AWS Direct Connect, Azure ExpressRoute, GCP Cloud Interconnect), or third-party networking solutions.
- Lesson 2778 — Multicloud Networking Challenges
- Cross-cluster resource propagation
- Deploy a single manifest that gets distributed to selected clusters
- Lesson 1514 — Cluster Federation Basics
- cross-cutting concerns
- in one place.
- Lesson 520 — What is an API Gateway?Lesson 2576 — API Gateway Pattern
- Cross-database joins
- Combine operational data (RDS) with analytical data (S3/data lake)
- Lesson 2668 — Query Federation and External Data
- Cross-functional
- , involving engineers, operations, and sometimes business stakeholders
- Lesson 2499 — GameDays and Chaos Testing Practices
- Cross-referencing CVE databases
- Each package version is matched against known vulnerability databases (like the National Vulnerability Database)
- Lesson 1073 — Image Scanning Fundamentals
- Cross-region
- strategies use DNS-based routing to direct users to the nearest or healthiest region.
- Lesson 280 — Cross-Zone and Cross-Region Load BalancingLesson 2220 — Private Connectivity RedundancyLesson 2236 — Troubleshooting Network Performance Issues
- Cross-Region Backup
- copies your backup data from your primary region (e.
- Lesson 2426 — Cross-Region and Cross-Account Backup
- Cross-region controls
- Block replication, snapshots, or backups to non-compliant regions
- Lesson 2332 — Geographic and Regional Compliance
- Cross-Region Pipelines
- use S3 bucket replication to automatically copy artifacts to buckets in target regions.
- Lesson 1846 — Cross-Region and Cross-Account PipelinesLesson 1847 — Pipeline Artifacts and Artifact Stores
- Cross-region reach
- Access VPCs in any AWS region from one connection
- Lesson 2214 — Direct Connect Gateway
- Cross-region read replicas
- take this concept further by placing those copies in entirely different geographic regions—not just different availability zones within the same region.
- Lesson 421 — Cross-Region Read Replicas
- Cross-region replication
- Mirror changes from one DynamoDB table to another in a different region
- Lesson 434 — DynamoDB Streams and Change Data CaptureLesson 1086 — AWS ECR FundamentalsLesson 2422 — Cloud-Native Backup Services OverviewLesson 2423 — VM and Volume Backup StrategiesLesson 2436 — Cross-Region Replication Setup
- Cross-service testing
- validates that services still work together after changes.
- Lesson 1669 — Microservices Pipeline Orchestration
- Cross-zone
- distribution spreads traffic evenly across targets in *all* availability zones within a single region.
- Lesson 280 — Cross-Zone and Cross-Region Load Balancing
- Cross-zone load balancing
- allows each NLB node to distribute traffic evenly across **all healthy targets in all enabled availability zones**, regardless of where the traffic entered.
- Lesson 270 — Cross-Zone Load Balancing for NLB
- Cryptographic Signing
- takes this further by using digital signatures.
- Lesson 2357 — Audit Log Integrity and Validation
- Cryptomining
- Recognizing unusual compute resource consumption patterns
- Lesson 2866 — Anomaly Detection and Behavioral Analysis
- CSI driver
- is a vendor-provided piece of software that implements the CSI specification.
- Lesson 2771 — Storage Abstraction with CSI
- CSI drivers
- small pieces of software that translate between Kubernetes' storage requests and a specific storage backend.
- Lesson 1317 — Container Storage Interface (CSI) OverviewLesson 1324 — Volume Metrics and Monitoring
- CUBIC
- work well for most scenarios, while **Reno** is conservative but predictable.
- Lesson 2228 — TCP Performance Optimization
- Curated Zone (Silver/Refined)
- Lesson 2631 — Data Lake Zones and Organization
- Current build progress
- Real-time indicator when builds are active
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Current state
- How many pods are actually running
- Lesson 1165 — Replica ManagementLesson 1855 — Declarative Infrastructure
- Custom
- Only when predefined roles are too broad or too narrow
- Lesson 392 — GCP IAM Roles: Basic, Predefined, CustomLesson 1829 — Build Caching Strategies
- Custom accelerators
- Purpose-built chips (like AI processors) optimized for particular workloads
- Lesson 70 — Accelerated Computing Instance Types
- Custom analytics
- Import into data warehouses (Redshift, Athena, BigQuery) for SQL-based exploration
- Lesson 2172 — AWS Cost and Usage Reports
- Custom Authorizers
- (Lambda authorizers) give you ultimate flexibility.
- Lesson 2539 — Serverless API Authentication
- Custom business logic
- Enforce organization-specific requirements that don't fit standard Kubernetes patterns
- Lesson 1409 — Validating Admission WebhooksLesson 2064 — Span Attributes and Tags
- Custom caching logic
- Cache authenticated user content for 5 minutes but public content for 1 hour
- Lesson 621 — Edge Caching with Functions
- Custom controllers
- interpreting application-specific status conditions
- Lesson 1914 — Resource Health Customization
- Custom Diff Strategies
- Use annotations or ArgoCD configuration to apply different comparison rules per resource type.
- Lesson 1901 — Diff Customization
- Custom environments
- You need specific hardware (GPUs, ARM processors), operating systems, or software pre-installed that GitHub-hosted runners don't provide
- Lesson 1690 — Self-hosted Runners Overview
- Custom headers
- let you inject additional HTTP headers into origin requests, enabling authentication, routing logic, or contextual data your application needs.
- Lesson 599 — Custom Headers and Origin Requests
- custom images
- with your specific software stack pre-configured for faster deployments.
- Lesson 54 — Operating System Images and AMIsLesson 1812 — CodeBuild: Managed Build Service Overview
- Custom load balancing
- where your application handles distribution logic
- Lesson 1210 — Headless Services
- Custom metric scaling
- lets you publish application-specific measurements to your cloud provider's monitoring service, then create scaling policies that respond to those custom signals.
- Lesson 306 — Custom Metric Scaling
- Custom Metrics
- Lesson 290 — Scaling Triggers and MetricsLesson 304 — Scaling Metrics SelectionLesson 327 — MIG Autoscaling ConfigurationLesson 1452 — Custom Metrics for HPA
- Custom policies
- tailored to your application's specific security needs
- Lesson 2364 — What is a Web Application Firewall (WAF)
- Custom reports
- Save frequently-used views (like "production database costs" or "compute spending by team") for quick access.
- Lesson 2139 — Cost Explorer and Billing DashboardsLesson 2169 — AWS Cost Explorer Advanced Features
- Custom Resource Definition (CRD)
- extends the API with new object types.
- Lesson 1881 — ArgoCD Application Resource
- Custom Resource Definitions (CRDs)
- let you define your own resource types that the Kubernetes API Server will treat as first-class citizens.
- Lesson 1128 — Custom Resource Definitions (CRDs)Lesson 1580 — Istio Configuration Resources Overview
- Custom Resource Providers
- let you add your own dishes to that menu by teaching Azure Resource Manager how to interact with external systems, custom APIs, or specialized logic.
- Lesson 910 — Custom Resource Providers
- Custom Resource Types
- You can build your own resource types (called "private extensions") for internal tools or workflows that CloudFormation doesn't natively support.
- Lesson 892 — CloudFormation Registry and Extensions
- Custom Resources
- let you fill these gaps by invoking your own Lambda function as part of the CloudFormation lifecycle.
- Lesson 886 — Custom Resources
- Custom rules
- let you define precise conditions using match statements—checking IP addresses, HTTP headers, request body content, geographic location, or even regex patterns.
- Lesson 2369 — AWS WAF Rules and Rule Groups
- custom runtimes
- for less common languages, though you'll manage dependencies yourself.
- Lesson 471 — Function Runtime EnvironmentsLesson 484 — Custom Runtimes and Layers
- Custom Script Extension
- Runs your own PowerShell or Bash scripts
- Lesson 100 — Azure VM Extensions and Custom Script
- Custom scripts
- that parse plan output and send alerts to Slack or PagerDuty
- Lesson 842 — Drift Detection and Remediation
- Custom software
- Pre-installed tools, licensed software, or corporate compliance tooling
- Lesson 1720 — Self-Hosted Runners
- Custom SSL Certificates
- Lesson 602 — SSL/TLS Configuration
- custom variables
- at multiple levels:
- Lesson 1736 — Environment Variables in GitLab CILesson 1998 — Variables and Templating
- Customer Gateway
- – A physical device or software in your data center (your VPN router/firewall)
- Lesson 2198 — Site-to-Site VPN FundamentalsLesson 2199 — VPN Gateway Configuration
- Customer portal
- Business-critical → RTO: 2 hours, RPO: 15 min
- Lesson 2410 — Business Impact Analysis (BIA)
- Customer satisfaction
- improvements from better performance
- Lesson 37 — Measuring Cloud Business Value: KPIs and Metrics
- Customer-Managed Keys
- You create and control your own encryption keys using the provider's key management service.
- Lesson 130 — Volume Encryption
- CustomResourceDefinitions (CRDs)
- that make policy management Kubernetes-native:
- Lesson 1413 — OPA Gatekeeper Architecture
- cutover
- is the moment you flip the switch from the old system to the new one.
- Lesson 2813 — Cutover Planning and Rollback StrategiesLesson 2822 — Homogeneous Database Migration
D
- DaemonSet
- a Kubernetes resource that ensures exactly one copy of a pod runs on each node.
- Lesson 1434 — Node-Level Logging AgentsLesson 2040 — Fluent Bit for Kubernetes LoggingLesson 2051 — DaemonSet Logging AgentsLesson 2086 — OpenTelemetry in Kubernetes Environments
- DaemonSet pods
- running on each node that handle the mount operations
- Lesson 2276 — Secrets Store CSI Driver
- DaemonSets
- , ensuring one logging agent pod per node.
- Lesson 1438 — Fluentd and Fluent BitLesson 2033 — ELK/EFK on Kubernetes
- DaemonSets for Collectors
- Lesson 2033 — ELK/EFK on Kubernetes
- DAG (Directed Acyclic Graph)
- Complex branching and joining of streams for enrichment, filtering, and transformation
- Lesson 2602 — Streaming Architecture Patterns
- Daily cycles
- Traffic peaks during business hours, drops at night
- Lesson 302 — Predictive Scaling Fundamentals
- Dashboard
- A web-based UI for visualizing and managing cluster resources.
- Lesson 1112 — Add-on Components and ExtensionsLesson 1782 — Jenkins UI Navigation and Monitoring BuildsLesson 1995 — Creating Your First Dashboard
- Dashboard as Code
- means defining your entire dashboard configuration in structured files (typically JSON or YAML) that live in version control alongside your application code.
- Lesson 2111 — Dashboard as Code and Version Control
- Dashboard variables
- solve this by introducing placeholders that users can change on-the-fly, instantly updating all panels that reference them.
- Lesson 2107 — Dashboard Variables and Filters
- Dashboards
- group multiple charts together.
- Lesson 680 — Cloud Monitoring in GCPLesson 2177 — Google Cloud Cost Management
- Data
- The actual content (a photo, video, document, backup file)
- Lesson 115 — Object Storage OverviewLesson 751 — Referencing Data Source AttributesLesson 2890 — Open Policy Agent (OPA) Introduction
- Data aggregation
- Update summary tables or analytics pipelines as data changes
- Lesson 434 — DynamoDB Streams and Change Data CaptureLesson 2510 — Scheduled Job PatternLesson 2577 — Backend for Frontend (BFF) Pattern
- Data at Rest
- Configure cloud policies that enforce encryption on storage services (block storage, object storage, databases).
- Lesson 2839 — Encryption by Default
- Data breaches
- Exposed credentials lead to stolen customer data
- Lesson 2237 — Introduction to Secrets Management in Cloud
- Data Catalog
- A centralized metadata repository that automatically discovers and catalogs your data assets across S3, RDS, Redshift, and other sources.
- Lesson 2643 — AWS Glue Overview
- Data changes predictably
- (weather forecasts, stock prices, dashboards)
- Lesson 2703 — Time-Based Cache Invalidation (TTL)
- Data classification
- Tag and separate data by residency requirements
- Lesson 2332 — Geographic and Regional Compliance
- Data coming IN
- (ingress) is typically **free** across all major cloud providers.
- Lesson 199 — Internet Connectivity Costs
- Data Consistency Checks
- After failover completes, validate that data integrity is maintained—no corruption, no orphaned records, no application state mismatches.
- Lesson 2488 — Failover Testing and Validation
- Data dependencies
- What databases or file shares does an application access?
- Lesson 2798 — Application Discovery and Dependencies
- Data Encryption Key (DEK)
- The key that actually encrypts your data
- Lesson 2282 — Data Encryption Keys (DEK) and Key Encryption Keys (KEK)Lesson 2298 — Server-Side Encryption with Provider Keys
- Data exfiltration
- Large `GetObject` operations or database exports
- Lesson 2865 — CloudTrail and Audit Logging for SecurityLesson 2866 — Anomaly Detection and Behavioral Analysis
- data flow
- between jobs and steps, turning your workflow into a coordinated pipeline.
- Lesson 1711 — Workflow Output and Job OutputsLesson 2620 — Azure Data Factory Pipelines
- Data Flow Activity
- Executes visual transformations on data at scale
- Lesson 2650 — ADF Pipeline Activities and Control Flow
- Data format conversion
- Change date/time formats or number representations
- Lesson 537 — Request and Response Transformation
- Data integrity
- You always know the object hasn't been tampered with
- Lesson 145 — Object Immutability Concepts
- Data Integrity Validation
- is the systematic verification that your backed-up data hasn't been corrupted, is complete, and can be successfully restored.
- Lesson 2907 — Data Integrity Validation
- Data Key Caching Pattern
- stores DEKs in memory for a limited time or number of operations.
- Lesson 2305 — Data Key Caching Pattern
- data lake
- is a storage architecture that holds vast amounts of raw data in its native format until it's needed.
- Lesson 2627 — Data Lake Concepts and ArchitectureLesson 2628 — Data Warehouse vs Data Lake
- Data lake integration
- Export to S3, Azure Blob Storage, or GCS for warehousing
- Lesson 2151 — Custom Cost Reports and Export
- Data lakes
- Raw data for analytics and big data processing
- Lesson 115 — Object Storage OverviewLesson 123 — Comparing Storage Types: When to Use WhatLesson 143 — Object Storage Use CasesLesson 2628 — Data Warehouse vs Data Lake
- Data layer
- Encryption at rest, access controls, backups
- Lesson 48 — Security by Design and Defense in DepthLesson 2833 — Defense in Depth and Layered Security
- Data lineage
- tracking backup creation, encryption, and storage locations
- Lesson 2447 — Compliance and DR Documentation
- Data Locality
- Some regulations require data to be processed within specific geographic boundaries.
- Lesson 421 — Cross-Region Read ReplicasLesson 1351 — Pod Affinity Fundamentals
- Data loss
- When queues overflow, messages get dropped unless dead letter queues are configured
- Lesson 2740 — Understanding Backpressure in Distributed Systems
- Data movements
- Bulk downloads, unusual file sharing, or data exfiltration patterns
- Lesson 2858 — Behavioral Analytics and Anomaly Detection
- data plane
- and **workload configuration**:
- Lesson 1505 — Managed Kubernetes OverviewLesson 1567 — Data Plane vs Control PlaneLesson 1568 — Service Discovery in MeshLesson 1570 — Service Mesh Observability BenefitsLesson 1571 — Traffic Management CapabilitiesLesson 1578 — Istio Data Plane and Envoy ProxiesLesson 1595 — AWS App Mesh OverviewLesson 2352 — Management vs Data Event Logging
- Data plane operations
- `Encrypt`, `Decrypt`, `GenerateDataKey` (for application use)
- Lesson 2289 — Key Policies and Access Control
- Data portability
- Encrypted data can move between regions (via replication, backups, or user migration) without re-encryption, since the same key exists in both locations.
- Lesson 2292 — Multi-Region Keys
- Data Processing Agreements (DPAs)
- that clearly define:
- Lesson 2328 — GDPR Data Protection Requirements
- Data processing pipelines
- Transform uploaded files, process streaming data, or resize images on demand
- Lesson 470 — FaaS Use Cases and Anti-Patterns
- Data protection
- Multiple copies guard against data loss
- Lesson 2475 — Database Replication Fundamentals
- Data replication
- keeps databases synchronized in near real-time across regions (bi-directional)
- Lesson 2435 — Active-Active Multi-RegionLesson 2453 — Geographic Distribution and Multi-Region DesignLesson 2806 — Database Migration Service Fundamentals
- Data residency
- defines where data must be stored geographically.
- Lesson 2332 — Geographic and Regional Compliance
- Data residency compliance
- Keep encrypted data in-region while maintaining key management flexibility
- Lesson 2312 — AWS KMS Multi-Region Keys
- Data sharing
- Multiple containers in the same Pod can access the same files
- Lesson 1151 — Pod Storage and Volumes Basics
- data sources
- let you query and fetch information about existing infrastructure—things you didn't create with your current Terraform configuration and don't want to manage.
- Lesson 747 — Data Sources OverviewLesson 834 — State File Partitioning
- Data sovereignty
- Keeping sensitive data within specific geographic boundaries
- Lesson 21 — Private Cloud Deployment ModelLesson 160 — Cross-Region Replication Basics
- Data structures
- Memcached stores only strings/binary blobs; Redis supports complex types (lists, hashes, sorted sets)
- Lesson 2689 — Memcached Fundamentals
- Data synchronization
- Databases may need to replicate between environments
- Lesson 2195 — Hybrid Cloud Connectivity OverviewLesson 2443 — Failback ProceduresLesson 2759 — Multicloud Architecture Patterns: Active-ActiveLesson 2815 — Hybrid Operations and Coexistence
- Data synchronization is critical
- Must replicate state continuously
- Lesson 2445 — DR for Stateful vs Stateless Apps
- data transfer
- .
- Lesson 199 — Internet Connectivity CostsLesson 1820 — Pricing Model for AWS Code ServicesLesson 2553 — Cost Monitoring and Analysis
- Data Transfer Charges
- Lesson 2140 — Understanding Resource Costs
- Data transfer out (egress)
- – Per-GB charges when data leaves the cloud through the private connection
- Lesson 2224 — Private Connectivity Cost Management
- Data Transformations
- Handle complex ETL operations including aggregations, joins, windowing (though less common in pure batch), and custom business logic.
- Lesson 2621 — Google Cloud Dataflow Batch
- Data types
- Is the `age` field actually a number, not a string?
- Lesson 538 — Request ValidationLesson 1558 — Helm Schema ValidationLesson 2176 — Azure Cost Exports and APIsLesson 2808 — Heterogeneous Database MigrationLesson 2823 — Heterogeneous Database Migration
- Data validation
- Checking data quality after ETL jobs complete
- Lesson 2656 — Serverless Query Engine Overview
- Data warehouses
- use **schema-on-write**: data is transformed and structured *before* storage.
- Lesson 2628 — Data Warehouse vs Data Lake
- Data Zone
- Databases and storage with strictest controls
- Lesson 2840 — Network Segmentation ArchitectureLesson 2841 — Security Boundaries and Trust Zones
- database
- or transactional workload requiring low latency and high IOPS
- Lesson 123 — Comparing Storage Types: When to Use WhatLesson 2064 — Span Attributes and TagsLesson 2658 — Athena Data Catalogs and Databases
- Database abstraction
- Standard SQL or ORM layers instead of proprietary features
- Lesson 2764 — Application Portability Fundamentals
- Database connections
- Connect your local SQL client to a cluster database
- Lesson 1142 — kubectl port-forward for Local AccessLesson 1667 — Multi-Environment Promotion
- Database containers
- that require specific shutdown signals to flush data safely
- Lesson 1016 — STOPSIGNAL: Graceful Shutdown
- Database Conventions
- Lesson 2077 — Semantic Conventions and Standard Attributes
- Database events
- When a record changes in DynamoDB, invoke a function to update search indexes or send notifications.
- Lesson 2501 — Event-Driven Invocation Pattern
- Database Integration
- When creating an RDS instance or managed database, you can specify a secret from Secrets Manager to auto-generate and store the master password.
- Lesson 2249 — Cross-Service Secrets Integration
- Database limits
- Remember that connection pooling **multiplies** across all concurrent function instances
- Lesson 2548 — Connection Pooling and Reuse
- Database Load
- A simple metric showing how many active sessions are running.
- Lesson 412 — Performance Insights
- Database migrations
- Run schema updates before the app starts
- Lesson 1149 — Init ContainersLesson 1663 — Rollback and Recovery Patterns
- Database multi-tenancy
- Using schemas or row-level security to isolate customer data within a single database instance rather than separate database servers
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- Database Native Replication
- Lesson 2785 — Cross-Cloud Data Replication Strategies
- Database offloading
- Reducing load on expensive database queries
- Lesson 2682 — In-Memory Caching Fundamentals
- Database operators
- (like PostgreSQL Operator): checking if the database cluster is fully initialized
- Lesson 1914 — Resource Health Customization
- Database per Service Pattern
- means each microservice owns and manages its own private data store.
- Lesson 2561 — Database per Service PatternLesson 2562 — Shared Database Anti-Pattern
- Database Query Cache
- Cached query results or materialized views
- Lesson 2708 — Multi-Layer Caching Strategies
- Database read replicas
- – Maintain extra replicas so promoting one to primary doesn't eliminate all redundancy
- Lesson 2460 — Capacity Planning for High Availability
- Database replicas
- Spread primary and replicas across nodes so a node failure doesn't take down your entire database
- Lesson 1352 — Pod Anti-Affinity Basics
- Database Security Group Rule
- Allow port 3306 from `web-tier-security-group` (not specific IPs)
- Lesson 205 — Security Group Chaining and References
- Database workloads
- (SQL, NoSQL) requiring fast, consistent performance
- Lesson 125 — Block Storage vs Other Storage Types
- Database-Backed Sessions
- Lesson 2463 — Session Management in Stateless Systems
- Databases
- are specialized storage systems designed to organize and retrieve structured information quickly.
- Lesson 8 — Cloud Infrastructure ComponentsLesson 113 — Block Storage OverviewLesson 464 — Stateless Function DesignLesson 1287 — Storage Challenges in ContainersLesson 1314 — Multiple StorageClasses StrategyLesson 2253 — Vault Architecture and ComponentsLesson 2436 — Cross-Region Replication SetupLesson 2468 — State Externalization Patterns (+2 more)
- Datastore
- are fully managed, serverless NoSQL databases from Google Cloud.
- Lesson 440 — Google Cloud Firestore and Datastore
- Datastore mode
- for traditional server architectures or when migrating legacy Datastore applications.
- Lesson 440 — Google Cloud Firestore and Datastore
- Date/Time
- Most common pattern (`year`, `month`, `day`, `hour`)
- Lesson 2633 — Data Partitioning Strategies
- Date/time functions
- `CURRENT_DATE()`, `DATE_DIFF()`, `TIMESTAMP_TRUNC()`
- Lesson 2666 — BigQuery Standard SQL and Functions
- Day 31-90
- Transition to cool storage (occasional access, lower cost)
- Lesson 159 — Storage Class Transitions
- Days 8-90
- Move to cool storage for recent investigations
- Lesson 2055 — Log Retention and Storage Classes
- DB instance
- is the actual database server running in the cloud.
- Lesson 397 — RDS Architecture and Components
- DDoS cost protection
- if a DDoS attack causes your AWS resources to scale up (increased EC2 instances, CloudFront data transfer, etc.
- Lesson 2382 — AWS Shield Advanced
- DDoS mitigation
- through rate limiting and throttling (as you learned earlier)
- Lesson 284 — Load Balancer Security Best Practices
- DDoS Protection
- Many CDNs absorb malicious traffic before it reaches your infrastructure.
- Lesson 582 — What is a CDN and Why Use One
- Dead Letter Queue
- is a special holding area for messages that cannot be successfully processed after multiple delivery attempts.
- Lesson 553 — Dead Letter QueuesLesson 2714 — Dead Letter Queues
- dead letter queue (DLQ)
- is a separate queue where failed function invocations are sent after all retry attempts are exhausted.
- Lesson 500 — Dead Letter QueuesLesson 576 — Dead Letter QueuesLesson 2743 — Dead Letter Queues for Failed Messages
- Dead Peer Detection (DPD)
- intervals to detect failed connections
- Lesson 2199 — VPN Gateway Configuration
- Dead-letter queues
- (which you already know) work alongside **auto-forwarding**, **message deferral** (retrieve specific messages later), and **time-to-live** settings for fine-grained message lifecycle control.
- Lesson 560 — Azure Service Bus QueuesLesson 2551 — Asynchronous Processing Patterns
- Deadline propagation
- means each service in a call chain inherits and respects the remaining time budget from its caller.
- Lesson 2591 — Timeout and Deadline Propagation
- Debug file permissions
- `kubectl exec my-pod -- ls -la /app`
- Lesson 1140 — kubectl exec: Executing Commands in Containers
- Debug issues faster
- Trace problems through the actual call chain
- Lesson 1639 — Service Dependency Mapping
- Debug logs
- dumping entire objects with sensitive fields
- Lesson 664 — Security and Sensitive Data in Logs
- Debug mode
- – Preview data at each transformation step before full execution
- Lesson 2651 — ADF Mapping Data Flows
- Debugging
- Reproduce exactly what happened during an incident by replaying the event sequence that led to the problem.
- Lesson 579 — Event Replay and Time TravelLesson 652 — What Are Logs and Why They MatterLesson 781 — Targeting Specific ResourcesLesson 1142 — kubectl port-forward for Local AccessLesson 1315 — StorageClass Mount OptionsLesson 2508 — Event Sourcing with Functions
- Debugging authorization
- issues with specific headers or JWT claims
- Lesson 1637 — Access Logging in Service Mesh
- Debugging dashboards
- let developers drill into traces, logs, and metrics for root-cause analysis
- Lesson 2100 — Dashboard Purpose and Audience
- Debugging Needs
- Adding upstream service names, retry counts, or circuit breaker states helps diagnose failures faster.
- Lesson 1638 — Log Formats and Customization
- Debugging Specific Resources
- Lesson 1931 — Flux CLI and Troubleshooting Commands
- Debugging strategy
- Run `kubectl describe pvc <name>` to see detailed events explaining why binding failed.
- Lesson 1302 — Troubleshooting PV and PVC Issues
- Debugging Tools
- Use distributed tracing to visualize the complete journey of an event across services.
- Lesson 581 — Event-Driven Monitoring and Observability
- Decentralized Data
- Each service typically owns its database, avoiding shared state that creates tight coupling.
- Lesson 2555 — What Are Microservices?
- Decimal (base-10)
- Lesson 1331 — Memory Resource Units
- Declarative
- "I want a Caesar salad"—the chef determines all steps
- Lesson 685 — Declarative vs Imperative IaCLesson 845 — Introduction to AWS CloudFormationLesson 1135 — Creating Resources with kubectl create and applyLesson 1783 — Declarative vs Scripted Pipeline SyntaxLesson 1877 — What is ArgoCD and GitOps CD
- Declarative Application Setup
- means defining your ArgoCD Applications as Kubernetes resources (YAML manifests) stored in Git, just like any other Kubernetes object.
- Lesson 1888 — Declarative Application Setup
- Declarative Configuration
- Your entire system's desired state is described declaratively in Git (YAML, JSON, HCL, etc.
- Lesson 1852 — What is GitOps?Lesson 1862 — GitOps and Kubernetes
- Declarative IaC
- lets you define your desired end state, and the tool figures out how to get there.
- Lesson 685 — Declarative vs Imperative IaC
- Declarative Infrastructure
- Instead of writing step-by-step scripts ("create this, then that"), you declare the desired end state in JSON templates.
- Lesson 893 — Introduction to Azure Resource Manager (ARM)
- Declarative management
- Everything is defined in Git as YAML manifests
- Lesson 1919 — Introduction to Flux and GitOps Philosophy
- Declarative Pipeline syntax
- , you use the `parallel` directive inside a `stage` to define multiple sub-stages that execute at the same time.
- Lesson 1792 — Parallel Stage Execution
- Declarative specifications solve this
- Lesson 1855 — Declarative Infrastructure
- Declarative workflows
- You define *what* should happen (via pipeline configuration files stored *in* the repo itself), not manual steps someone must remember.
- Lesson 1647 — Version Control as the Source of Truth
- Decoupled Storage and Compute
- Processing engines (Spark, query services, ML frameworks) connect to the data lake when needed, rather than being tightly coupled like traditional database systems.
- Lesson 2627 — Data Lake Concepts and Architecture
- Decoupling
- The publisher doesn't need to know who's consuming the message
- Lesson 559 — SQS-SNS Fan-Out PatternLesson 567 — Event-Driven Architecture OverviewLesson 1035 — Introduction to Docker VolumesLesson 1205 — Service Selectors and LabelsLesson 2081 — OpenTelemetry Collector FundamentalsLesson 2512 — Orchestrator Pattern with Step Functions
- Decoupling microservices
- Services subscribe to topics they care about without knowing who publishes to them.
- Lesson 557 — AWS SNS Topics and Subscriptions
- Decryption happens automatically
- when authorized applications read the data
- Lesson 408 — Encryption at Rest
- Dedicated
- Higher setup fees, monthly port charges, but can be cheaper at high volumes
- Lesson 2197 — VPN vs Dedicated Connections
- Dedicated Connection
- A physical Ethernet port dedicated exclusively to you (1 Gbps, 10 Gbps, or 100 Gbps)
- Lesson 2212 — AWS Direct Connect Fundamentals
- Dedicated Connections
- (like AWS Direct Connect, Azure ExpressRoute, or GCP Cloud Interconnect) are private physical circuits leased from telecom providers.
- Lesson 2197 — VPN vs Dedicated Connections
- Dedicated hardware
- AWS Dedicated Hosts vs Azure Dedicated Hosts vs GCP Sole-Tenant Nodes
- Lesson 109 — Cross-Provider Compute Feature Comparison
- Dedicated Hosts
- provide physical server isolation, important for regulatory compliance or licensing requirements.
- Lesson 94 — AWS EC2 Launch Types and Tenancy
- Dedicated Instances
- and **Dedicated Hosts** provide physical server isolation, important for regulatory compliance or licensing requirements.
- Lesson 94 — AWS EC2 Launch Types and Tenancy
- Dedicated nodes
- `kubectl taint nodes prod-db-01 dedicated=database:NoSchedule`
- Lesson 1362 — Applying Taints to Nodes
- Dedicated Secrets Managers
- Tools like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault act as fortified vaults.
- Lesson 1654 — CI/CD Security and Secrets Management
- Dedicated SQL pools
- – Provisioned compute for traditional data warehouse workloads (think: fast BI dashboards, scheduled reports)
- Lesson 2635 — Azure Synapse Analytics
- Dedicated tenancy
- gives you physical hardware that only runs your instances.
- Lesson 94 — AWS EC2 Launch Types and Tenancy
- deduplication
- to prevent the same message from being processed multiple times.
- Lesson 556 — AWS SQS FIFO QueuesLesson 1070 — Image Manifest and Layers
- Deep layer inspection
- examines files added in each `COPY` or `ADD` instruction
- Lesson 1083 — Malware and Secret Scanning
- default
- health check type.
- Lesson 294 — Health Check TypesLesson 308 — Scale-In Protection and TerminationLesson 861 — Parameters Section Deep Dive
- Default Access
- Grafana starts on port `3000` with default credentials `admin/admin`.
- Lesson 1993 — Installing and Configuring Grafana
- default bridge network
- called `bridge`.
- Lesson 1042 — Bridge NetworksLesson 1052 — Networking in Docker Compose
- Default Deny
- (Gate 3): If there's no explicit deny *and* no explicit allow, the request is **denied by default**.
- Lesson 338 — Policy Evaluation Logic
- Default deny pattern
- Start by denying everything, then explicitly allow what passes:
- Lesson 2339 — OPA Policy Development
- Default port
- RDP listens on port **3389** (your cloud security group must allow this)
- Lesson 58 — Windows VMs and RDP Access
- Default Profile
- Lesson 1586 — Istio Configuration Profiles
- Default to stateless
- Question every stateful design decision—is it truly necessary?
- Lesson 2474 — Designing for Stateless-First Architecture
- Default values
- in variable declarations (lowest priority)
- Lesson 762 — Variable Precedence and OverridesLesson 925 — Parameters in BicepLesson 1410 — Mutating Admission Webhooks
- Defaults and Fallbacks
- Lesson 1539 — Template Functions
- defense in depth
- even if VMs share the same network, each can have different firewall rules based on its specific role and security requirements.
- Lesson 60 — Security Groups and VM FirewallsLesson 1246 — NetworkPolicy Best PracticesLesson 2834 — Principle of Least PrivilegeLesson 2836 — Security by DesignLesson 2837 — Fail Secure PrinciplesLesson 2846 — Zero Trust Security Model FundamentalsLesson 2864 — Google Security Command Center
- Defense-in-depth
- means deploying multiple protection layers that work together, each catching different attack types at the most efficient point.
- Lesson 2379 — DDoS Protection LayersLesson 2396 — Network ACLs for Subnet Isolation
- Define expected state
- based on compliance requirements (PCI DSS, HIPAA, etc.
- Lesson 2346 — Compliance Testing and Validation
- Define or select
- a built-in or custom policy definition
- Lesson 2343 — Azure Policy for Compliance Automation
- Define permissions
- (Role/ClusterRole) → **Assign them** (RoleBinding/ClusterRoleBinding).
- Lesson 1375 — RBAC API Objects Overview
- Define restart policies
- Set `restart: unless-stopped` for services that should survive reboots.
- Lesson 1059 — Compose Best Practices and Limitations
- Define the test condition
- What makes it compliant (encryption enabled)
- Lesson 2337 — Compliance Requirements Translation
- Defining a named template
- Lesson 1557 — Advanced Templating with Named Templates
- Defining compliance requirements
- in plain language (e.
- Lesson 2886 — Compliance Testing with Open Policy Agent
- Definition of "good"
- Response code 2xx or 3xx AND latency < 500ms
- Lesson 2116 — Defining SLI Specifications
- degraded
- operation for non-critical services
- Lesson 285 — Advanced Health Check StrategiesLesson 1885 — Application Health and Sync StatusLesson 1900 — Health Assessment
- Degraded state operations
- – Systems running with reduced capacity still meet SLAs
- Lesson 2460 — Capacity Planning for High Availability
- Delayed jobs
- wait a specified time period before starting automatically, giving teams a window to cancel problematic deployments.
- Lesson 1753 — Manual and Delayed Jobs
- Delays
- Inject latency to simulate slow networks or overloaded services.
- Lesson 1610 — Fault Injection for Resilience Testing
- Delegated administration
- Managers can create users, but those users cannot touch security or compliance controls
- Lesson 369 — Policy Boundaries and Guardrails
- DELETE
- Remove an object
- Lesson 144 — HTTP-Based Access ModelLesson 852 — Stack Deletion and Retention PoliciesLesson 888 — DeletionPolicy and RetainLesson 941 — Deployment Lifecycle OperationsLesson 1080 — Registry Access Control and RBACLesson 1117 — RESTful API ConventionsLesson 1294 — PV Reclaim PoliciesLesson 1479 — GKE Node Pools and Machine Types (+1 more)
- Delete old versions
- you no longer need (but keep critical baselines)
- Lesson 373 — Policy Versioning and Change Management
- Delete unused secret versions
- – Old versions still incur storage costs
- Lesson 2251 — Secrets Management Cost Optimization
- Deleted
- (resources removed from the template)
- Lesson 851 — Stack Updates and Change SetsLesson 879 — Stack Drift Detection
- Deletes
- any resources in the resource group that aren't in the template
- Lesson 901 — Template Deployment ModesLesson 912 — Deployment Modes: Complete vs Incremental
- Deleting old manual snapshots
- Automated backups expire automatically, but manual snapshots persist until you delete them.
- Lesson 426 — Backup Storage and Costs
- Deletion
- Remove keys no longer needed
- Lesson 343 — Access Keys and Credential ManagementLesson 739 — Resource Blocks and the Resource Lifecycle
- DeletionPolicy: Retain
- survive stack deletion (like keeping photos before demolishing a house).
- Lesson 877 — Stack Creation and Lifecycle
- Delivery methods
- Email, SMS, Lambda functions, or HTTP endpoints
- Lesson 1849 — Pipeline Notifications and EventBridge
- Delta detection
- System compares new scan results with previous ones
- Lesson 1085 — Continuous Vulnerability Monitoring
- Demo Profile
- Lesson 1586 — Istio Configuration Profiles
- Demonstrations
- Show API behavior in demos without needing infrastructure running
- Lesson 545 — Mock Integrations and Testing
- denies
- traffic from a certain IP range, that traffic is blocked immediately—even if rule #200 would have allowed it.
- Lesson 207 — NACL Rule Ordering and EvaluationLesson 363 — Allow vs Deny Effects
- Deny
- TCP port 22 from `198.
- Lesson 208 — NACL Allow and Deny RulesLesson 335 — IAM Policies: The Language of PermissionsLesson 337 — Effect, Action, and Resource in PoliciesLesson 363 — Allow vs Deny EffectsLesson 856 — Stack Policies for Update ProtectionLesson 880 — Stack PoliciesLesson 1408 — Dynamic Admission ControlLesson 2343 — Azure Policy for Compliance Automation (+2 more)
- Deny all inbound traffic
- (you must explicitly allow what you need)
- Lesson 202 — Security Group Fundamentals
- deny by default
- if no policy grants access to a path, access is blocked.
- Lesson 2264 — Vault Policies and Access ControlLesson 2395 — Segmentation with Security Groups
- Departments
- (teams within units, like "Mobile Team" or "Data Science")
- Lesson 2965 — Cost Centers and Business Units
- Dependencies
- (external libraries your code imports)
- Lesson 472 — Function Packaging and DeploymentLesson 701 — State File Contents and StructureLesson 775 — State File Contents and StructureLesson 1677 — Artifact Metadata and TraceabilityLesson 1923 — Kustomize Controller FundamentalsLesson 2812 — Migration Wave Planning and Execution
- Dependencies and relationships
- – Ensures connections between resources remain intact
- Lesson 702 — State Reconciliation
- Dependencies are respected
- (you can't test what hasn't been built)
- Lesson 1657 — Linear Pipeline Pattern
- dependency chain
- Stack B depends on Stack A, so Stack A must be applied first.
- Lesson 835 — Dependency Management Between StacksLesson 916 — Outputs and Cross-Template Communication
- dependency graph
- during planning.
- Lesson 752 — Data Sources and DependenciesLesson 822 — Implicit and Explicit DependenciesLesson 850 — Stack Creation Process and EventsLesson 2067 — Service Maps and Dependency Graphs
- Dependency issues
- Work around circular dependencies temporarily
- Lesson 781 — Targeting Specific Resources
- Dependency management
- Wait for a database or service to become available
- Lesson 1149 — Init ContainersLesson 1520 — What is Helm and Why Use It?Lesson 1945 — Multi-Cluster Management with FluxLesson 2546 — Package Size Optimization
- Dependency mapping
- to avoid breaking integrations during migration
- Lesson 2797 — Migration Assessment FrameworkLesson 2829 — Dependency Mapping and Migration Order
- Dependency Resolution
- Lesson 1648 — Build Automation Fundamentals
- Dependency Scanning
- examines third-party libraries and packages your project uses, checking against known vulnerability databases (like CVE lists).
- Lesson 1766 — Pipeline Security Scanning
- Dependency-aware triggering
- means downstream service pipelines automatically kick off when upstream dependencies change.
- Lesson 1669 — Microservices Pipeline Orchestration
- Dependency-based waves
- Group applications with tight dependencies together, ensuring supporting services migrate before dependent applications.
- Lesson 2802 — Migration Wave Planning
- DependsOn Carefully
- Explicit dependencies prevent race conditions but can slow deployments.
- Lesson 919 — ARM Template Best Practices and Validation
- deploy
- them to Azure.
- Lesson 902 — Deploying Templates via Portal and CLILesson 1657 — Linear Pipeline PatternLesson 1740 — Basic Pipeline Patterns: Build, Test, DeployLesson 1841 — Pipeline Actions and Action TypesLesson 2879 — Unit Testing IaC with Terratest
- Deploy Kong or Ambassador
- on your Kubernetes cluster (AWS EKS, GKE, AKS, or on-premises)
- Lesson 2772 — API Gateway Abstraction
- Deploy stage
- Push to staging or production environments
- Lesson 1786 — Stages and Steps OrganizationLesson 1818 — Integration Between AWS Code ServicesLesson 1839 — Creating a Basic PipelineLesson 1843 — Deploy Stages and Deployment Actions
- Deploy the new version
- alongside your existing version (both running simultaneously)
- Lesson 1606 — Canary Deployments with Service MeshLesson 1665 — Canary Deployment Pattern
- Deploy to `dev` stage
- Your team tests new features internally
- Lesson 532 — API Gateway Stages and Deployment
- Deploy to `prod` stage
- Only after approval, customers access it
- Lesson 532 — API Gateway Stages and Deployment
- Deploy to `test` stage
- QA validates behavior with realistic data
- Lesson 532 — API Gateway Stages and Deployment
- deployment
- is a snapshot of your API configuration at a specific moment.
- Lesson 532 — API Gateway Stages and DeploymentLesson 1160 — Understanding Deployments in KubernetesLesson 2611 — Stream Processing Frameworks
- Deployment blocking
- Configure pipeline to fail and prevent merges when tests fail
- Lesson 2887 — CI/CD Integration for IaC Tests
- Deployment configuration
- How fast to roll out (all-at-once, one-at-a-time, etc.
- Lesson 1832 — CodeDeploy Application and Deployment Groups
- Deployment Engine
- ARM processes your infrastructure requests and orchestrates resource creation in the correct order, handling dependencies automatically.
- Lesson 893 — Introduction to Azure Resource Manager (ARM)
- Deployment Group Layer
- Within each application, you define one or more deployment groups representing different environments or configurations.
- Lesson 1832 — CodeDeploy Application and Deployment Groups
- Deployment Groups
- , which define *where* your code will be deployed—the actual EC2 instances, Lambda functions, or ECS services that will receive your updates.
- Lesson 1832 — CodeDeploy Application and Deployment Groups
- Deployment Manager
- is Google's native IaC solution—it's tightly integrated with GCP, requires no installation (built into the cloud console and CLI), and manages resources through Google's APIs directly.
- Lesson 946 — Deployment Manager vs Terraform on GCP
- Deployment package size
- – Larger packages take longer to download and initialize
- Lesson 2543 — Cold Start Fundamentals
- Deployment pipelines
- Current version, rollout status, recent changes
- Lesson 2932 — Kubernetes and Cloud Resource Visualization
- Deployment scripts
- let you embed PowerShell or Bash scripts directly into your ARM template, and Azure will execute them during deployment using temporary Azure Container Instances.
- Lesson 909 — Deployment Scripts in ARM Templates
- Deployment speed
- (hours to deploy new features vs.
- Lesson 37 — Measuring Cloud Business Value: KPIs and Metrics
- Deployments
- , ensuring the right number of pod replicas are running and orchestrating rolling updates.
- Lesson 1106 — Built-in Controllers OverviewLesson 1900 — Health AssessmentLesson 2033 — ELK/EFK on Kubernetes
- Deployments for Kibana
- Lesson 2033 — ELK/EFK on Kubernetes
- deprecated
- .
- Lesson 314 — ASG Launch Templates and ConfigurationsLesson 1316 — Provisioner Selection and Configuration
- Deprovisioning
- When users leave, automated workflows immediately disable accounts, revoke cloud resource access, remove group memberships, and trigger security key rotation—all without manual coordination across dozens of systems.
- Lesson 2857 — Identity Governance and Lifecycle
- deregistration delay
- ) solves this problem by allowing in-flight requests to complete gracefully before the target is fully removed.
- Lesson 241 — Connection Draining and DeregistrationLesson 279 — Connection Draining and Graceful Shutdown
- Deregistration on shutdown
- When the container stops, it's automatically removed from the target group
- Lesson 258 — ALB and Container Integration
- Description
- explains the parameter's purpose to anyone using your template.
- Lesson 861 — Parameters Section Deep DiveLesson 1369 — PriorityClass ResourcesLesson 1531 — Release History and Status
- Description field
- What this policy does and why it exists
- Lesson 375 — Policy Documentation and Governance
- Design for Auto-Scaling
- Lesson 50 — Cost Optimization Through Architecture
- Design for Failure
- Lesson 38 — Understanding Cloud Architecture Fundamentals
- designing for failure
- and **high availability** — immutable infrastructure makes recovery faster because you're always deploying known-good configurations.
- Lesson 46 — Immutable Infrastructure PrinciplesLesson 49 — Observability and Monitoring Architecture
- Desired = 5 waiters
- (your typical weeknight sweet spot)
- Lesson 292 — Minimum, Maximum, and Desired Capacity
- Desired Capacity
- – Your starting point and target.
- Lesson 292 — Minimum, Maximum, and Desired CapacityLesson 310 — Capacity Limits and Constraints
- Desired state
- What you specified in `spec.
- Lesson 1165 — Replica ManagementLesson 1855 — Declarative Infrastructure
- Desired State Configuration (DSC)
- Ensures configuration consistency
- Lesson 100 — Azure VM Extensions and Custom Script
- Destination
- The IP address range (in CIDR notation) the traffic is trying to reach
- Lesson 180 — Route Tables BasicsLesson 1581 — VirtualService FundamentalsLesson 1637 — Access Logging in Service MeshLesson 1881 — ArgoCD Application ResourceLesson 1892 — Application Spec StructureLesson 2786 — Data Transfer Costs and Optimization
- Destination clusters
- Which Kubernetes clusters/namespaces can apps deploy to?
- Lesson 1887 — ArgoCD Projects for Multi-Tenancy
- Destination service
- Provides service discovery and routing policies to proxies
- Lesson 1591 — Linkerd Overview and Architecture
- DestinationRule
- defines traffic policies for specific services, the **Gateway** resource is your mesh's front door—it configures how external traffic enters your service mesh in the first place.
- Lesson 1583 — Gateway Resource for Ingress
- DestinationRules
- you specify traffic weights in the VirtualService routing rules.
- Lesson 1605 — Traffic Splitting and Weighted RoutingLesson 1614 — Load Balancing Algorithms
- destroy
- an existing resource.
- Lesson 772 — Reading Plan OutputLesson 2246 — GCP Secret Manager IAM and VersioningLesson 2879 — Unit Testing IaC with Terratest
- Destroyed
- Key permanently deleted (typically cannot decrypt data afterward)
- Lesson 2280 — Introduction to Key Management SystemsLesson 2320 — GCP Cloud KMS Key Rotation and Versions
- Detailed usage data
- Granular metrics down to the resource level
- Lesson 2178 — GCP Billing Exports to BigQuery
- Detect a problem
- Monitoring alerts show increased errors after a recent deployment
- Lesson 1873 — Rollback and Recovery
- Detect anomalies
- Identify unusual traffic patterns that might indicate security threats
- Lesson 213 — Network Security Logging and Monitoring
- Detect Drift
- If desired and actual states differ, drift is detected
- Lesson 1869 — GitOps Reconciliation Loop
- Detection granularity
- determines how you segment monitoring: by service, account, cost center, tag combination, or resource type.
- Lesson 2969 — Cost Anomaly Detection
- Detection Mode (Monitor)
- The WAF logs suspicious traffic but allows it through.
- Lesson 2367 — WAF Rule Types and Modes
- Determine criticality tiers
- Group systems into categories like "mission-critical," "business-critical," "important," and "non- critical.
- Lesson 2410 — Business Impact Analysis (BIA)
- Determines the correct order
- for deletion based on dependencies (reverse of creation order)
- Lesson 780 — terraform destroy Workflow
- Deterministic
- Predefined inputs produce expected outputs
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Deterministic sampling
- Use trace IDs to ensure consistent decisions across services
- Lesson 2083 — Sampling Strategies in OpenTelemetry
- Developer Advocates
- Drive adoption, gather feedback, create documentation
- Lesson 2937 — Platform Team Structure and Responsibilities
- Developer experience
- Local testing, debugging with standard IDE tools
- Lesson 2529 — Temporal and Alternative OrchestratorsLesson 2913 — Platform vs. Product Teams
- developer productivity
- and **single-machine orchestration**.
- Lesson 1047 — Docker Compose Overview and Use CasesLesson 2794 — Refactor/Re-architect Strategy
- Developer sandboxes
- Developers can create resources but never modify IAM or billing settings
- Lesson 369 — Policy Boundaries and Guardrails
- Developer Satisfaction
- captures the qualitative experience through surveys and feedback.
- Lesson 2916 — Developer Experience Goals
- Developer-friendly interfaces
- Portals, CLIs, or APIs that abstract complexity
- Lesson 2914 — Internal Developer Platform (IDP) Fundamentals
- Developers
- – Code repository access, deployment permissions
- Lesson 349 — Groups FundamentalsLesson 1288 — Kubernetes Storage AbstractionsLesson 2031 — ELK/EFK Stack SecurityLesson 2100 — Dashboard Purpose and AudienceLesson 2933 — RBAC and Portal Access Control
- Development
- Developers push newly built images to the registry after tagging them (e.
- Lesson 988 — Container Registry FundamentalsLesson 1672 — Artifact Lifecycle
- Development and test environments
- where flexibility matters more than specialization
- Lesson 66 — General Purpose Instance Types
- Development environment
- Your team member clones the code, starts the container, and it works immediately—no hunting for the right library versions.
- Lesson 965 — Container Portability BenefitsLesson 1672 — Artifact Lifecycle
- Development environments
- Preserve your IDE state, debugger breakpoints, and loaded data between work sessions
- Lesson 88 — VM HibernationLesson 1059 — Compose Best Practices and LimitationsLesson 2160 — Idle Resource Detection
- Development or testing environments
- Where interruptions are acceptable
- Lesson 1168 — Recreate Strategy
- Development speed
- trumps fine-tuned performance optimization
- Lesson 2530 — Serverless Database Concepts
- development workflows
- Lesson 1038 — Bind MountsLesson 1321 — Volume Cloning
- Development/testing
- Start with burstable or small general-purpose instances
- Lesson 399 — Database Instance ClassesLesson 425 — Snapshot Copying and Sharing
- Device posture
- Is the device managed?
- Lesson 2399 — Context-Aware Access ControlsLesson 2848 — Continuous Verification and Contextual Access
- Device Registration
- – Is this device enrolled in your management system?
- Lesson 2855 — Device Trust and Endpoint Security
- Device-specific caching
- Store separate cached versions for mobile vs desktop by adding device type to the cache key
- Lesson 621 — Edge Caching with Functions
- DHCP Options Set
- is a configuration bundle that automatically provides these network settings to every instance in your VPC.
- Lesson 227 — DHCP Options Sets
- Diagnostic settings
- on individual resources (VMs, databases, storage accounts) route their logs to your workspace
- Lesson 676 — Azure Log Analytics WorkspacesLesson 2053 — Azure Monitor LogsLesson 2359 — Azure Monitor and Activity Logs
- Different Control Planes
- Each cloud provider has its own console, CLI, and APIs.
- Lesson 2756 — Multicloud Challenges: Complexity and Management Overhead
- Different environments
- (Linux, Windows, macOS)
- Lesson 1798 — Distributed Builds and Agent Architecture
- Different lifecycles
- Your app might deploy 10 times a day, but infrastructure configs change weekly.
- Lesson 1866 — GitOps Repository Structure
- Different Network Models
- AWS uses VPCs with route tables and security groups, Azure has VNets with network security groups, and GCP has VPC networks with firewall rules.
- Lesson 2778 — Multicloud Networking Challenges
- Differential Backup
- saves all changes since the *last full backup*.
- Lesson 2419 — Full, Incremental, and Differential Backups
- digest
- .
- Lesson 983 — Image Tags vs DigestsLesson 995 — Image Manifest and DigestLesson 1066 — Pulling Images from a Registry
- Digests are immutable
- they always reference the exact same image content.
- Lesson 995 — Image Manifest and Digest
- Dimension filtering
- Slice data by user, application, or host to isolate problem sources
- Lesson 456 — Performance Insights and Diagnostics Tools
- Dimensional filtering
- Slice costs by dimensions like region (`us-east-1`), service (`EC2`, `S3`), environment tag (`production`, `development`), or cost center.
- Lesson 2139 — Cost Explorer and Billing Dashboards
- dimensions
- are the labels or tags you attach to metrics.
- Lesson 630 — Metric Cardinality and DimensionalityLesson 669 — CloudWatch Metrics and Namespaces
- Direct application export
- Applications send logs directly to a logging backend
- Lesson 2049 — Kubernetes Logging Architecture
- Direct Attachment
- Block storage volumes typically attach to a single VM at a time, acting like a dedicated external hard drive plugged into your instance.
- Lesson 113 — Block Storage Overview
- Direct attachment to VMs
- – acts like a local hard drive
- Lesson 125 — Block Storage vs Other Storage Types
- Direct compute access
- – analytics engines read directly without copying
- Lesson 2630 — Object Storage as Data Lake Foundation
- Direct Connect (AWS)
- , **ExpressRoute (Azure)**, and **Cloud Interconnect (GCP)** are dedicated private network connections between your on-premises datacenter and cloud provider.
- Lesson 2811 — Network Optimization for Migration
- Direct Connect Gateway
- is a globally available resource that acts as a central hub for your Direct Connect connection.
- Lesson 2214 — Direct Connect Gateway
- Direct data lake access
- Query data in place using formats like Parquet, ORC, JSON, or CSV without loading it into a separate database first.
- Lesson 2656 — Serverless Query Engine Overview
- Direct integration
- with external stores without intermediate Kubernetes Secrets
- Lesson 2276 — Secrets Store CSI Driver
- Direct shipping
- Applications send logs directly to a logging backend
- Lesson 2046 — Cloud-Native Logging Overview
- Direct SQL queries
- on raw files with warehouse-speed performance
- Lesson 2629 — Data Lakehouse Architecture
- Directly connect
- if your facility is in or near a Direct Connect location
- Lesson 2212 — AWS Direct Connect Fundamentals
- Directories
- Create an Application for each subdirectory matching a pattern
- Lesson 1908 — Git Generator Patterns
- Directory structure separation
- Keep shared modules in one place, with environment-specific folders that reference them with different variable values
- Lesson 712 — Environment Separation Strategies
- Directory-based promotion
- Lesson 1868 — Environment Promotion Patterns
- Disable
- a version to block access without deleting
- Lesson 2246 — GCP Secret Manager IAM and Versioning
- Disable or delete accounts
- when people leave your organization
- Lesson 346 — Creating and Managing User Identities
- Disable unnecessary features
- by default (unused APIs, protocols, or services)
- Lesson 2844 — Secure by Default Configuration
- Disabled
- Key temporarily unavailable but can be re-enabled
- Lesson 2280 — Introduction to Key Management SystemsLesson 2320 — GCP Cloud KMS Key Rotation and Versions
- Disadvantages
- Lesson 2574 — Synchronous vs Asynchronous CommunicationLesson 2697 — Cache-Aside (Lazy Loading) Pattern
- Disaster recovery
- Survive entire region outages (natural disasters, major network failures)
- Lesson 45 — Multi-AZ and Multi-Region DesignsLesson 115 — Object Storage OverviewLesson 160 — Cross-Region Replication BasicsLesson 273 — Global Load Balancing and DNS-Based RoutingLesson 420 — Promoting Read ReplicasLesson 421 — Cross-Region Read ReplicasLesson 427 — Restoring from BackupsLesson 1099 — Cross-Provider Registry Integration (+12 more)
- Disaster Recovery (DR)
- is a structured approach to quickly restore critical systems, applications, and data after a catastrophic event.
- Lesson 2405 — What is Disaster Recovery (DR)?
- Discount opportunities
- Workloads eligible for Committed Use Discounts
- Lesson 2180 — GCP Recommender and Cost Insights
- Discover
- view to explore your logs.
- Lesson 2028 — Kibana Dashboard CreationLesson 2029 — Kibana Index Patterns and DiscoverLesson 2490 — Introduction to Chaos EngineeringLesson 2868 — Vulnerability Scanning and Management
- Discover unexpected side effects
- that your blast radius didn't account for
- Lesson 2494 — Chaos Experiments in Non-Production
- Discovery
- Search across all data assets using keywords, tags, or business terms
- Lesson 2637 — Data Catalog and Metadata ManagementLesson 2645 — Glue Data Catalog Fundamentals
- Discovery scans
- using automated tools to catalog infrastructure
- Lesson 2797 — Migration Assessment Framework
- Disk I/O saturation
- when writing blocks and handling queries simultaneously
- Lesson 1977 — Challenges of Running Prometheus at Scale
- Disk size
- Boot disk capacity per node (minimum 100GB, typically).
- Lesson 1479 — GKE Node Pools and Machine Types
- Disk type
- Standard persistent disk or SSD persistent disk.
- Lesson 1479 — GKE Node Pools and Machine Types
- Disk usage monitoring
- Track which jobs consume the most space
- Lesson 1780 — Workspace Management and Build Artifacts
- Display important information
- after provisioning (like a server's public IP or a database endpoint)
- Lesson 764 — Introduction to Outputs
- Distance
- AZs are typically separated by miles (but close enough for synchronous replication)
- Lesson 2454 — Availability Zones and Data Center Distribution
- Distribute requests randomly
- across any available instance using simple load balancing
- Lesson 2462 — Stateless Services and Horizontal Scaling
- distributed cache
- is a high-speed, in-memory data store replicated across multiple nodes.
- Lesson 2469 — Distributed Caching for Stateful DataLesson 2506 — Circuit Breaker for Functions
- Distributed caches
- hold temporary session information
- Lesson 42 — Stateless Application DesignLesson 2468 — State Externalization Patterns
- Distributed cloud
- takes the resources you'd find in centralized cloud regions (like those you learned about in Regions and Availability Zones) and spreads them across many smaller locations closer to end users or devices.
- Lesson 25 — Edge and Distributed Cloud
- Distributed rate limiting
- uses a **shared state store**—typically Redis—to maintain a single source of truth for request counts.
- Lesson 2747 — Distributed Rate Limiting
- Distributed state
- Use shared storage (Redis, DynamoDB) so all consumers see the same deduplication tracking
- Lesson 2734 — Event Deduplication Strategies
- Distributed Systems Drivers
- (Ceph CSI, Longhorn, Portworx)
- Lesson 1327 — CSI Driver Selection and Comparison
- Distributed Traces
- Because proxies see both sides of service-to-service calls, they can inject trace context and forward span data to tracing backends like Jaeger or Zippo, giving you end-to-end request visibility across multiple hops.
- Lesson 1570 — Service Mesh Observability BenefitsLesson 1589 — Istio Telemetry Architecture
- Distributed tracing
- creates a complete picture of how requests move through your system by tracking them across all services involved.
- Lesson 2060 — What is Distributed Tracing
- Distributes
- your application to the target instances or services
- Lesson 1813 — CodeDeploy: Deployment Automation Overview
- Distribution
- Efficient delivery of image layers across networks
- Lesson 1060 — What is a Container Registry
- distributors
- (receive metrics), **ingesters** (buffer and write), **queriers** (execute PromQL), and **compactors** (optimize storage).
- Lesson 1986 — Mimir for Large-Scale MetricsLesson 2034 — Loki Architecture and Design Philosophy
- Diverse Authentication Models
- AWS uses IAM roles and policies, Azure uses Active Directory integration, and GCP uses service accounts.
- Lesson 2756 — Multicloud Challenges: Complexity and Management Overhead
- DMZ (Demilitarized Zone)
- Internet-facing services like load balancers and web servers
- Lesson 2841 — Security Boundaries and Trust Zones
- DMZ/Perimeter Zone
- Internet-facing services with heavy scrutiny
- Lesson 2840 — Network Segmentation Architecture
- DNS (CoreDNS or kube-dns)
- Provides internal service discovery.
- Lesson 1112 — Add-on Components and Extensions
- DNS amplification
- Exploit open DNS servers to magnify attack traffic 50-100x
- Lesson 2378 — DDoS Attack Types and Vectors
- DNS and Service Discovery
- Each cloud has its own DNS services.
- Lesson 2778 — Multicloud Networking Challenges
- DNS failures
- Test with `kubectl run busybox --image=busybox --rm -it -- nslookup kubernetes.
- Lesson 1519 — Troubleshooting Common Cluster Issues
- DNS query floods
- Overwhelm DNS services with lookup requests
- Lesson 2378 — DDoS Attack Types and Vectors
- DNS Resolution
- When you type a URL, your DNS query is answered by the CDN's intelligent DNS system, which analyzes your location, network conditions, and server health.
- Lesson 586 — CDN Request Flow and Routing
- DNS server address
- (often third IP) - For name resolution services
- Lesson 179 — Reserved IP Addresses in Subnets
- DNS Update
- The DNS record pointing to the database endpoint is updated to route traffic to the newly promoted primary
- Lesson 2483 — Automatic Failover Process
- DNS-based
- AWS Route 53, Kubernetes CoreDNS (simple but limited health checking)
- Lesson 2575 — Service Discovery Patterns
- DNS-based or API-based lookup
- Applications query the registry via DNS or API calls to get current service locations.
- Lesson 2784 — Multicloud Service Discovery
- DNS-compatible naming conventions
- Lesson 146 — Bucket Naming and Namespaces
- Docker Container
- Run Grafana in a container using `docker run -d -p 3000:3000 grafana/grafana`.
- Lesson 1993 — Installing and Configuring Grafana
- Docker Content Trust (DCT)
- is a security feature that uses digital signatures to verify both the publisher of an image and the integrity of its content.
- Lesson 1077 — Content Trust and Notary
- Docker executor
- runs each job inside a fresh Docker container, giving you a clean, isolated workspace every time.
- Lesson 1733 — Docker Executor and Images
- Docker image
- to use, and GitLab spins up a container from that image to execute your job's scripts.
- Lesson 1733 — Docker Executor and Images
- Docker images
- Your containerized applications (as you've been working with in GCR)
- Lesson 1095 — Artifact Registry Multi-Format Support
- Docker login
- Stores credentials locally using `docker login` command
- Lesson 992 — Registry Authentication and Authorization
- Docker volumes
- are storage mechanisms that exist *outside* the container's filesystem but can be mounted *into* containers.
- Lesson 1035 — Introduction to Docker Volumes
- Document Databases
- Lesson 429 — NoSQL Database Categories and Use Cases
- Document gaps
- Every test reveals weaknesses—missing runbook steps, incorrect DNS configurations, or slow database restores.
- Lesson 2442 — DR Testing Scenarios
- Document security controls
- mapped to Annex A requirements
- Lesson 2325 — ISO 27001 Information Security
- Document standards
- Maintain a tag dictionary with allowed values
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Document the impact
- What fails if this component goes down?
- Lesson 2450 — Single Points of Failure Identification
- Document thoroughly
- Include the compliance requirement being satisfied, expected inputs, and usage examples.
- Lesson 2347 — Policy Libraries and Reusability
- Document your plan
- Keep a spreadsheet showing which subnets use which CIDR blocks
- Lesson 177 — Subnet Sizing and Planning
- Documentation
- The code itself documents your infrastructure.
- Lesson 47 — Infrastructure as Code PhilosophyLesson 693 — IaC and the DevOps CultureLesson 715 — Code Review and Peer ValidationLesson 953 — Template Schemas and ValidationLesson 1007 — EXPOSE: Port DocumentationLesson 1124 — Annotations for MetadataLesson 2325 — ISO 27001 Information Security
- Documentation accuracy
- Are runbooks current and complete?
- Lesson 2902 — DR Testing Fundamentals and Objectives
- Documentation hub
- Centralized technical docs, runbooks, and guides
- Lesson 2924 — Introduction to Developer Portals
- documented proof
- .
- Lesson 2333 — Compliance Documentation and EvidenceLesson 2447 — Compliance and DR Documentation
- documents
- in **collections** (like folders containing JSON-like files).
- Lesson 440 — Google Cloud Firestore and DatastoreLesson 1007 — EXPOSE: Port DocumentationLesson 2018 — Elasticsearch Fundamentals for LoggingLesson 2535 — Google Cloud Firestore
- Domain Events
- represent meaningful business occurrences in your application.
- Lesson 569 — Event Types and Naming Conventions
- Domain-Driven Design Basics
- (lesson 2559) or implementing proper service communication patterns.
- Lesson 2562 — Shared Database Anti-Pattern
- Domain-specific flows
- Game levels completed, reports generated, videos transcoded
- Lesson 638 — Custom Metrics and Instrumentation
- domain-specific language (DSL)
- created by Microsoft specifically for deploying Azure resources.
- Lesson 920 — Introduction to BicepLesson 921 — Bicep vs ARM Templates
- Don't
- use it for regular services—those should expose metrics endpoints and be scraped normally.
- Lesson 1959 — Pushgateway for Short-Lived Jobs
- Don't accidentally expose secrets
- or sensitive data in configuration files
- Lesson 715 — Code Review and Peer Validation
- Don't log sensitive data
- like passwords or tokens, even in structured format.
- Lesson 1437 — Structured Logging Best Practices
- Don't over-index
- Each index consumes storage and CPU during writes.
- Lesson 448 — Index Design and Strategy
- Download
- the appropriate package for your OS from HashiCorp's official site
- Lesson 724 — Installing Terraform and Provider Basics
- Downloading
- a service account key (JSON file) for external applications
- Lesson 393 — GCP Service Accounts
- Downloads the image manifest
- to discover which layers are needed
- Lesson 994 — Pulling Images from Registries
- Downside
- Your application will be completely unavailable during the transition — no pods are serving traffic between the old terminating and new starting.
- Lesson 1168 — Recreate Strategy
- Downstream protection
- Prevents your functions from overwhelming databases, APIs, or third-party services with too many simultaneous connections
- Lesson 478 — Function Concurrency Limits
- DR
- is about the *entire process* of getting your business operations running again after a disaster— whether that's a data center fire, cyberattack, natural disaster, or major infrastructure failure.
- Lesson 2405 — What is Disaster Recovery (DR)?
- Draining
- Gracefully evict existing pods, which move to healthy nodes
- Lesson 1509 — Node Image Upgrades
- Draining timeout
- how long to wait (0–3600 seconds)
- Lesson 279 — Connection Draining and Graceful Shutdown
- Drawbacks
- If Server A fails or gets removed, your session is lost.
- Lesson 242 — Session Affinity (Sticky Sessions)Lesson 2472 — Active-Passive vs Active-Active for StatefulLesson 2781 — Multicloud Transit Patterns
- drift
- .
- Lesson 702 — State ReconciliationLesson 705 — State Refresh and Drift DetectionLesson 718 — Change Management and PlanningLesson 879 — Stack Drift DetectionLesson 1886 — Self-Heal and Prune Options
- drift detection
- to ensure your configuration matches reality, then manage that resource just like any other IaC- managed infrastructure.
- Lesson 706 — Import Existing ResourcesLesson 1853 — GitOps vs Traditional Operations
- drop
- Discard unwanted events entirely
- Lesson 2023 — Logstash Filter PluginsLesson 2037 — Promtail Log Collection and Pipelines
- DRY principle
- Define test logic once, apply it across all matrix dimensions
- Lesson 1660 — Matrix Build PatternLesson 1716 — Workflow Templates and Reusable Workflows
- dry-run
- policies against hypothetical scenarios.
- Lesson 371 — Policy Validation and TestingLesson 1416 — Policy Testing and Audit Mode
- Dry-run mode
- Some meshes let you log policy violations without enforcing them
- Lesson 1629 — Security Policies Best Practices
- Dual VPN gateways
- in your cloud VPC (ideally in different availability zones)
- Lesson 2200 — High Availability VPN Connections
- Dual-circuit, same location
- Two circuits to one cloud PoP on different routers—protects against device failure.
- Lesson 2220 — Private Connectivity Redundancy
- Dual-write temporarily
- Write to both monolith and new service databases during transition
- Lesson 2569 — Microservices Migration Strategies
- Duplicate alerts
- from different monitoring systems
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Durability
- answers the question: "Will my data still exist over time?
- Lesson 116 — Durability and Availability in StorageLesson 149 — Durability and Availability GuaranteesLesson 417 — Multi-AZ vs Single-AZ Trade-offsLesson 2602 — Streaming Architecture Patterns
- Durable Execution
- Step Functions (AWS), Durable Functions (Azure), and Cloud Workflows (Google) persist workflow state automatically.
- Lesson 2525 — Long-Running Workflows
- Durable Functions
- is an extension of Azure Functions that adds **state management** and **orchestration** capabilities.
- Lesson 512 — Azure Functions: Durable Functions
- Duration
- How long the stickiness lasts (1 second to 7 days)
- Lesson 255 — Sticky Sessions (Session Affinity)Lesson 278 — Session Affinity and Sticky SessionsLesson 322 — VMSS Scaling Policies and RulesLesson 639 — Introduction to Alarms and AlertingLesson 1696 — Workflow Run History and Re-runsLesson 1898 — Sync WindowsLesson 1964 — Range Vector Selectors
- During development
- Developers catch issues locally before committing
- Lesson 722 — IaC Security Scanning
- During launch
- After an instance starts but *before* it receives traffic
- Lesson 318 — ASG Lifecycle Hooks
- During termination
- After Auto Scaling decides to remove an instance but *before* it shuts down
- Lesson 318 — ASG Lifecycle Hooks
- During the event
- Lesson 2499 — GameDays and Chaos Testing Practices
- Dynamic
- PVs are automatically created on-demand when users request storage
- Lesson 1289 — PersistentVolume (PV) FundamentalsLesson 1351 — Pod Affinity FundamentalsLesson 2605 — Windowing Concepts
- Dynamic mappings with parameters
- Lesson 876 — Complex Function Nesting
- dynamic provisioning
- .
- Lesson 1303 — StorageClass FundamentalsLesson 1485 — GKE Persistent Storage with GCE PDs
- Dynamic routing
- As Pods scale up or down, the Service automatically adjusts
- Lesson 1205 — Service Selectors and Labels
- Dynamic routing protocols
- (like BGP) to automatically failover between tunnels
- Lesson 2200 — High Availability VPN Connections
- Dynamic tagging
- Lesson 737 — Conditional Expressions
- Dynamic updates
- Some platforms can update mounted secret files without restarting containers, enabling rotation without downtime.
- Lesson 2271 — Volume-Mounted Secrets
- Dynamic values
- Let CloudFormation determine resource identifiers instead of guessing
- Lesson 863 — Intrinsic Function Ref
- DynamicFrames
- (Glue's enhanced data structure) and **PySpark** (the Python API for Apache Spark).
- Lesson 2647 — Glue ETL Script Development
- DynamoDB Streams
- (which you just learned about) to capture changes.
- Lesson 435 — DynamoDB Global Tables for Multi-RegionLesson 506 — AWS Lambda: Event Sources and TriggersLesson 2511 — Stream Processing PatternLesson 2533 — DynamoDB Global Tables and Streams
E
- Each hop's IP address
- (which router handled your traffic)
- Lesson 2227 — Network Path Analysis and Traceroute
- Early detection
- Catch issues before they become outages
- Lesson 639 — Introduction to Alarms and Alerting
- Earning Credits
- When your instance uses *less* than its baseline CPU (say, 20% for a t3.
- Lesson 77 — Burstable Instance Types and Credits
- Easier disaster recovery
- Shift workloads to a different cloud when needed
- Lesson 2765 — Container-Based Portability
- Easy Rollback
- Keep the old version running until the new one is proven
- Lesson 46 — Immutable Infrastructure PrinciplesLesson 276 — Weighted Target Groups and Canary DeploymentsLesson 691 — Immutable Infrastructure Principle
- Easy updates
- – Change the group's policy once to update access for all members simultaneously
- Lesson 349 — Groups Fundamentals
- EBS Snapshot Copy
- involves creating point-in-time snapshots of EBS volumes and copying them to other regions.
- Lesson 2439 — Storage Replication Strategies
- EC2 instances
- that serve as your worker nodes.
- Lesson 1472 — EKS Security GroupsLesson 1474 — EKS Pricing and Cost ConsiderationsLesson 2052 — AWS CloudWatch Logs Integration
- EC2/On-premises
- Install agents on your servers; CodeDeploy pushes updates
- Lesson 1813 — CodeDeploy: Deployment Automation Overview
- Economy Tier
- (`slow-hdd`): Low-cost HDDs for backups, logs, archives, and cold data.
- Lesson 1314 — Multiple StorageClasses Strategy
- Ecosystem and Vendor Lock-in
- Lesson 1600 — Service Mesh Selection Criteria
- Ecosystem growth
- Third-party tools target one standard instead of many
- Lesson 1598 — Service Mesh Interface (SMI) Standard
- ECR and ACR fundamentals
- , ACR Tasks takes your registry beyond simple storage by embedding intelligent automation directly into the registry service itself.
- Lesson 1091 — ACR Tasks and Automated Builds
- ECS
- Update container task definitions with rolling or blue-green strategies
- Lesson 1813 — CodeDeploy: Deployment Automation OverviewLesson 1837 — CodeDeploy for Lambda and ECS
- ECS and Fargate
- Automatic sidecar injection and task definition integration
- Lesson 1595 — AWS App Mesh Overview
- ECS Tasks
- use the `awslogs` log driver in your task definition.
- Lesson 2052 — AWS CloudWatch Logs Integration
- edge
- , close to your users, so origin servers don't waste resources doing it repeatedly.
- Lesson 601 — Compression and Content OptimizationLesson 1565 — Service Mesh vs API GatewayLesson 2681 — Multi-Tier Caching with CDN
- Edge caching
- means storing copies of that content at CDN Points of Presence (PoPs) around the world, so users get responses from nearby locations instead of traveling all the way to the origin every time.
- Lesson 584 — Origin Servers and Edge Caching
- Edge cases
- Boundary conditions and unusual but valid inputs
- Lesson 2899 — Policy Testing and Validation
- Edge checks its cache
- Lesson 611 — Edge vs. Origin: The Request Flow
- Edge Location
- The servers within a PoP that actually cache and serve content
- Lesson 583 — CDN Architecture and Points of Presence
- Edge Locations
- are mini data centers distributed globally that:
- Lesson 10 — Edge Locations and Points of PresenceLesson 25 — Edge and Distributed CloudLesson 583 — CDN Architecture and Points of PresenceLesson 610 — Edge Computing Concepts and Use CasesLesson 611 — Edge vs. Origin: The Request FlowLesson 2671 — CDN Caching Fundamentals Review
- Edge-appropriate workloads
- Lesson 611 — Edge vs. Origin: The Request Flow
- edit
- Similar to admin but without RBAC modification privileges.
- Lesson 1385 — Default ClusterRolesLesson 2002 — Dashboard Sharing and Permissions
- Editor
- Can modify resources but can't manage access
- Lesson 392 — GCP IAM Roles: Basic, Predefined, CustomLesson 1997 — Query Builder and Query Editor
- Education and enablement
- (training teams on cost-aware architecture)
- Lesson 2954 — Shared Responsibility Model
- Effect
- Allow or Deny the action
- Lesson 164 — Bucket Policies and Access ControlLesson 335 — IAM Policies: The Language of PermissionsLesson 337 — Effect, Action, and Resource in PoliciesLesson 355 — Role Trust PoliciesLesson 361 — Policy Structure and SyntaxLesson 363 — Allow vs Deny EffectsLesson 856 — Stack Policies for Update ProtectionLesson 1363 — Defining Tolerations in Pod Specs
- Efficiency
- Network hiccups don't force you to re-upload gigabytes of data
- Lesson 151 — Object Size Limits and Multipart UploadsLesson 883 — StackSets FundamentalsLesson 1758 — Dynamic Child Pipelines
- Efficient Auto-Scaling
- Because startup is so fast, automated scaling systems can respond to load changes in near real- time, maintaining performance without over-provisioning resources.
- Lesson 967 — Fast Startup and Scaling
- Efficient parallelization
- Run all combinations simultaneously rather than sequentially
- Lesson 1660 — Matrix Build Pattern
- Efficient Resource Use
- Parallel processing maximizes throughput
- Lesson 2720 — Competing Consumers Pattern
- Efficient storage
- Common layers (like an OS base) are stored once
- Lesson 976 — Union Filesystem Mechanics
- Efficient updates
- kube-proxy and other consumers only watch affected slices
- Lesson 1212 — EndpointSlices
- Effort
- Can this be solved with better documentation versus major tooling changes?
- Lesson 2946 — Feedback Loops and User Research
- egress
- (outgoing) traffic from pods
- Lesson 1234 — NetworkPolicy FundamentalsLesson 1235 — NetworkPolicy Specification Structure
- Egress Bandwidth
- Cloud providers often throttle outbound traffic.
- Lesson 2789 — Network Performance and Latency Considerations
- egress charges
- are fees cloud providers impose when data leaves their network.
- Lesson 2159 — Network Data Transfer CostsLesson 2786 — Data Transfer Costs and Optimization
- Egress settings
- control where your function's outbound traffic goes:
- Lesson 516 — Google Cloud Functions: VPC Connectivity and Networking
- Egress-Only Internet Gateway
- is a special gateway designed specifically for IPv6 traffic.
- Lesson 198 — Egress-Only Internet Gateway
- EKS
- managed node groups let you trigger image updates that perform rolling replacements.
- Lesson 1509 — Node Image UpgradesLesson 1512 — Add-Ons and ExtensionsLesson 1595 — AWS App Mesh Overview
- EKS Clusters
- require a logging agent like Fluent Bit (which you've learned) deployed as a DaemonSet.
- Lesson 2052 — AWS CloudWatch Logs Integration
- EKS removes this burden
- by providing a fully managed, highly available control plane.
- Lesson 1460 — Introduction to Amazon EKS
- Elastic compute
- Moving to autoscaling groups instead of fixed VM counts
- Lesson 2793 — Replatform Strategy
- Elastic IP (EIP)
- is a static, public IPv4 address that you can allocate to your cloud account and assign to resources like virtual machines.
- Lesson 190 — Elastic IP Addresses
- Elastic IP attachment
- You bring your own Elastic IPs (one per AZ), giving you complete control over the exact addresses
- Lesson 266 — Static IP and Elastic IP Support
- Elastic Network Interface (ENI)
- to bridge your function into the VPC.
- Lesson 490 — Function Network Configuration
- ElastiCache for Memcached
- A simpler, multithreaded engine optimized for straightforward key-value caching with horizontal scaling across multiple nodes.
- Lesson 2690 — AWS ElastiCache Overview
- ElastiCache for Redis
- Supports advanced data structures (sets, sorted sets, hashes), pub/sub messaging, persistence, and clustering — ideal when you need Redis-specific features or multi-AZ replication.
- Lesson 2690 — AWS ElastiCache Overview
- elasticity
- (the ability to scale up and down) with the **pay-as-you-go pricing model** you learned earlier, the cost benefits become clear:
- Lesson 32 — Elasticity and Cost Benefits of Auto-ScalingLesson 34 — Business Agility: Time-to-Market Advantages
- Elasticsearch
- (search-friendly, popular choice)
- Lesson 2091 — Zipkin FundamentalsLesson 2096 — Backend Storage Considerations
- Elasticsearch Heap Size
- Lesson 2032 — ELK/EFK Performance Tuning
- Eliminate operational overhead
- no patching, no server management
- Lesson 442 — DocumentDB and MongoDB-Compatible Services
- Eliminates Persistent Threats
- Attackers who compromise a system and install backdoors lose access when that instance is replaced.
- Lesson 2838 — Immutable Infrastructure for Security
- Send alerts to an email address or distribution list
- Lesson 646 — Alarm Actions and Notifications
- Email addresses
- Lesson 557 — AWS SNS Topics and Subscriptions
- Email lists
- Simple distribution lists where alerts arrive as messages.
- Lesson 647 — Notification Channels
- Embedded binaries and libraries
- Lesson 1073 — Image Scanning Fundamentals
- Embedded feedback widgets
- in your developer portal (like Backstage) for in-context suggestions
- Lesson 2946 — Feedback Loops and User Research
- Embedded metrics
- showing adoption milestones and time-saved
- Lesson 2943 — Platform Documentation and Onboarding
- Embrace Immutable Infrastructure
- Lesson 50 — Cost Optimization Through Architecture
- enable
- it when creating or modifying your database instance and choose your preferred granularity interval.
- Lesson 411 — Enhanced MonitoringLesson 2246 — GCP Secret Manager IAM and Versioning
- Enable cluster autoscaler
- on node pools to scale down during off-hours.
- Lesson 1504 — AKS Cost Management and Cluster Sizing
- Enable CORS
- by adding `Access-Control-Allow-Origin` headers for cross-domain requests
- Lesson 604 — Response Header Customization
- Enable Drill-Down
- Surface high-level summaries first, but allow users to click through to granular details—from total cloud spend → service costs → team allocations → individual resources.
- Lesson 2970 — Cost Dashboard Design
- Enable dual-stack mode
- resources get both an IPv4 and IPv6 address simultaneously
- Lesson 184 — IPv6 Support in Virtual Networks
- Enable high availability
- Spread your database across multiple availability zones (different data centers) by including subnets from each zone
- Lesson 405 — Subnet Groups and Network Placement
- Enable node auto-provisioning
- Creates optimally-sized node pools for workload requirements
- Lesson 1489 — GKE Cost Optimization and Bin Packing
- Enable parallelism
- Multiple team members can test simultaneously in their own environments
- Lesson 2883 — Ephemeral Test Environments
- Enable permissive mode
- Services accept both plaintext AND mTLS
- Lesson 1622 — mTLS Migration Strategies
- Enable Rollback Protection
- Use deployment rollback configuration to automatically revert failed updates.
- Lesson 919 — ARM Template Best Practices and Validation
- Enable routing
- Direct traffic between different parts of your infrastructure
- Lesson 175 — Subnet Fundamentals
- Enable versioning
- Configure S3 versioning or Azure blob snapshots so you can recover from accidental deletions or corruption.
- Lesson 797 — Remote State Best Practices
- Enable Workload Identity
- on your GKE cluster (at creation or update)
- Lesson 1481 — GKE Workload Identity
- enabled
- (which is the default for ALBs), your load balancer distributes traffic evenly across **all healthy targets** in **all enabled zones**, regardless of which zone received the incoming request.
- Lesson 259 — Cross-Zone Load Balancing for ALBsLesson 2288 — Key Versioning and Backward CompatibilityLesson 2320 — GCP Cloud KMS Key Rotation and Versions
- Enables version control
- by storing configurations as code
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Enabling autonomy
- self-service within guardrails, not gates
- Lesson 2935 — Golden Paths and Paved Roads
- Enabling composition
- between modules (one module's output becomes another's input)
- Lesson 803 — Module Output Values
- Enabling real-time responses
- for applications like autonomous vehicles or factory automation
- Lesson 25 — Edge and Distributed Cloud
- Encapsulate logic
- Group related resources (like a VPC with subnets, security groups, and routing tables) into a single, coherent unit
- Lesson 798 — What Are Terraform Modules
- Encoding best practices
- into reusable templates, pipelines, and automation
- Lesson 2935 — Golden Paths and Paved Roads
- Encoding Functions
- convert between formats: `jsonencode()`, `jsondecode()`, `yamlencode()`, `base64encode()`, and `base64decode()` bridge Terraform and external systems that require specific data formats.
- Lesson 824 — Terraform Functions for Data Transformation
- Encrypt everything
- Always enable encryption at rest and in transit.
- Lesson 797 — Remote State Best Practices
- Encrypt only the DEK
- using the recipient's public key (asymmetric encryption)
- Lesson 2307 — Hybrid Encryption for Large Data
- Encrypt traffic
- All service-to-service communication is encrypted by default
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- Encrypt your actual data
- with this DEK (happens locally, very fast)
- Lesson 2296 — Envelope Encryption Pattern
- Encrypt your large dataset
- with the DEK using fast symmetric encryption (AES-256)
- Lesson 2307 — Hybrid Encryption for Large Data
- encrypted
- enables encryption at rest
- Lesson 1304 — StorageClass ParametersLesson 1310 — AWS EBS StorageClasses
- Encrypted communication
- proceeds with verified identities
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- Encrypted parameter stores
- Cloud providers offer encrypted storage that your IaC can reference by name, not value
- Lesson 714 — Secrets Management in IaC
- Encryption
- All data traveling between components is encrypted, preventing eavesdropping
- Lesson 1115 — Component Communication and SecurityLesson 1564 — What is a Service Mesh?Lesson 1847 — Pipeline Artifacts and Artifact StoresLesson 2326 — PCI DSS for Payment Card DataLesson 2639 — Data Lake Security and Access Control
- Encryption at rest
- protects your stored data when it's sitting on physical disks.
- Lesson 122 — Storage Security BasicsLesson 408 — Encryption at RestLesson 792 — State Encryption at RestLesson 1654 — CI/CD Security and Secrets ManagementLesson 2294 — Encryption at Rest vs. Encryption in TransitLesson 2327 — HIPAA for Healthcare DataLesson 2696 — Cache Security and Access ControlLesson 2722 — Queue Security and Access Control
- encryption by default
- (lesson 2839) for buckets/volumes
- Lesson 2843 — Security Baseline and HardeningLesson 2844 — Secure by Default Configuration
- encryption context
- additional authenticated data that must match during decryption—to ensure keys are only used in their intended context (e.
- Lesson 2289 — Key Policies and Access ControlLesson 2308 — Encryption in Multi-Region Architectures
- Encryption in transit
- protects data while it travels between your application and the storage service.
- Lesson 122 — Storage Security BasicsLesson 409 — Encryption in TransitLesson 1517 — Cluster Security HardeningLesson 1572 — Security Through mTLSLesson 2294 — Encryption at Rest vs. Encryption in TransitLesson 2696 — Cache Security and Access ControlLesson 2722 — Queue Security and Access Control
- Encryption overhead
- Manually configuring TLS for every connection is error-prone
- Lesson 1617 — Service Mesh Security Overview
- Encryption settings
- IPsec parameters (must match on both sides)
- Lesson 2779 — Cross-Cloud VPN Connections
- EncryptionConfiguration
- file on the Kubernetes API server that specifies:
- Lesson 1268 — Secret Encryption at Rest
- Encrypts the data locally
- using that DEK (typically with symmetric encryption like AES-256)
- Lesson 2297 — Client-Side Encryption
- End Users
- Request content from their nearest edge location
- Lesson 583 — CDN Architecture and Points of Presence
- End-to-End Tests (Top)
- Lesson 2876 — Testing Pyramid for Infrastructure
- End-to-end validation
- confirming deployed infrastructure meets requirements
- Lesson 2875 — Introduction to Infrastructure Testing
- Endpoint
- A virtual network interface that connects a sandbox to a network.
- Lesson 1041 — Docker Network Architecture
- Endpoint Controller
- maintains service endpoint lists.
- Lesson 1105 — Controller Manager: Maintaining Desired State
- Endpoint Protection
- – Is antivirus/EDR running and up-to-date?
- Lesson 2855 — Device Trust and Endpoint Security
- Endpoint Services
- are the receiving end: they expose a service (like an API, database, or application) so others can connect via Private Link.
- Lesson 2397 — Private Link and Endpoint ServicesLesson 2483 — Automatic Failover Process
- endpoints
- for accessing deployed services
- Lesson 899 — Outputs for Template ResultsLesson 1211 — Endpoints ObjectsLesson 1212 — EndpointSlicesLesson 1218 — Service Debugging and Troubleshooting
- EndpointSlices
- solve this scalability problem by breaking endpoints into smaller, manageable chunks.
- Lesson 1212 — EndpointSlices
- Enforce different access policies
- per zone (public internet, internal services, databases, admin consoles)
- Lesson 2841 — Security Boundaries and Trust Zones
- Enforce MFA
- to add an extra security layer beyond passwords
- Lesson 346 — Creating and Managing User Identities
- Enforce performance standards
- Functions that exceed reasonable limits signal optimization needs
- Lesson 476 — Function Timeout Configuration
- Enforce registry allowlists
- (only permitting images from approved registries)
- Lesson 1078 — Admission Controllers for Image Policy
- Enforce security boundaries
- Keep databases in private subnets, away from direct internet access
- Lesson 405 — Subnet Groups and Network Placement
- Enforce strong authentication
- (require MFA, deny password-only access)
- Lesson 2844 — Secure by Default Configuration
- Enforce with policy
- Use cloud-native tools (AWS Organizations policies, Azure Policy, GCP Organization Policies) to require tags at resource creation
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Enforcement points
- Gates that prevent violations from being deployed
- Lesson 2335 — Introduction to Compliance as Code
- Enforcement policies
- Compliance-heavy environments requiring guaranteed encryption
- Lesson 2303 — Object Storage Encryption Options
- Enforces Auditable Changes
- All modifications flow through your CI/CD pipeline and image-building process, creating an audit trail.
- Lesson 2838 — Immutable Infrastructure for Security
- Enforces intentions
- (authorization policies) without touching your app code
- Lesson 1594 — Consul Connect and Sidecar Proxies
- Enforcing compliance
- Guarantee certain ports can never reach specific subnets
- Lesson 2396 — Network ACLs for Subnet Isolation
- Engine Selection
- Choose from your supported database engines (MySQL, PostgreSQL, SQL Server, etc.
- Lesson 402 — Creating and Launching RDS Instances
- Enhance security
- by adding headers like `Strict-Transport-Security` (forces HTTPS) or `X-Content-Type-Options` (prevents MIME sniffing)
- Lesson 604 — Response Header Customization
- Enhanced Monitoring
- goes a layer deeper by collecting detailed *operating system-level* metrics directly from the instance running your database.
- Lesson 411 — Enhanced Monitoring
- Enhanced scanning
- (Inspector v2): Provides continuous monitoring, deeper analysis, and covers more languages and package managers
- Lesson 1089 — ECR Image Scanning with Inspector
- Enhanced Security
- Traffic never leaves your cloud provider's network backbone
- Lesson 1098 — Private Registry EndpointsLesson 2212 — AWS Direct Connect FundamentalsLesson 2811 — Network Optimization for Migration
- Enhanced security and compliance
- Banking, healthcare, and government often have strict regulations about where data lives
- Lesson 21 — Private Cloud Deployment Model
- enrich
- them with additional context.
- Lesson 2010 — Log Parsing and EnrichmentLesson 2040 — Fluent Bit for Kubernetes Logging
- Enriched logs are intelligence
- Filters transform timestamps into searchable dates, IPs into maps, and messy strings into structured fields ready for analysis.
- Lesson 2023 — Logstash Filter Plugins
- Enrichment
- means adding extra information that wasn't in the original log—like the server's hostname, geographic region, environment name, or even looking up a user's email from their ID.
- Lesson 660 — Log Parsing and EnrichmentLesson 665 — Log Aggregation Pipelines
- Enrichment pipelines
- Combine API cost data with your resource tagging metadata (from lesson 2963) to calculate unit economics per customer, team, or feature.
- Lesson 2973 — Cost Allocation APIs and Automation
- Ensure compliance across jurisdictions
- Different clouds may have different compliance certifications.
- Lesson 2755 — Multicloud Benefits: Geographic and Regulatory Coverage
- Ensure consistency
- Every test starts from a known, clean state
- Lesson 2883 — Ephemeral Test Environments
- Ensure fair resource distribution
- across all users
- Lesson 282 — Rate Limiting and Throttling at Load Balancer
- Ensures consistency
- by creating resources in the correct order with proper dependencies
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Enterprise
- Redis Enterprise features including active geo-replication and advanced modules
- Lesson 2691 — Azure Cache for Redis
- Enterprise Agreement
- or **Management Groups** can roll up subscription costs.
- Lesson 2147 — Multi-Account Cost Consolidation
- Enterprise Applications
- ERP, CRM systems requiring structured, reliable storage
- Lesson 113 — Block Storage Overview
- Enterprise Discount Program
- is a contractual agreement between your organization and a cloud provider that offers reduced rates in exchange for a spending commitment over a defined period (typically 1-3 years).
- Lesson 2166 — Discount Negotiation and EDP
- Enterprise Security
- Built-in integration with Azure's security tools, including Azure Policy for governance, Microsoft Defender for container security, and Azure Private Link for network isolation.
- Lesson 1490 — Introduction to Azure Kubernetes Service (AKS)
- ENV
- Runtime variables; persist in containers; used for application configuration
- Lesson 1006 — ARG: Build-Time Variables
- envelope encryption
- (remember: your data encryption key wrapped by a key encryption key from KMS).
- Lesson 2302 — Storage Volume EncryptionLesson 2304 — Encryption Key Rotation Strategies
- Environment
- Add "production" or "staging" labels
- Lesson 660 — Log Parsing and EnrichmentLesson 713 — Naming Conventions and StandardsLesson 2143 — Azure Cost Management Tags
- Environment branches
- work better when you need explicit promotion gates, manual approvals, or regulatory separation between environments.
- Lesson 1867 — Branching Strategies for GitOps
- Environment cloning
- Spin up development or staging environments with production-like data
- Lesson 427 — Restoring from Backups
- Environment Deployment
- Each environment pulls the artifact using the appropriate tag
- Lesson 1676 — Artifact Promotion Patterns
- Environment Isolation
- Production, staging, and development networks completely separated
- Lesson 2390 — Network Segmentation Fundamentals
- Environment Management
- You can use the same Chart across environments by supplying different configuration values—no need to maintain separate YAML files for each environment.
- Lesson 1520 — What is Helm and Why Use It?
- Environment Promotion
- After merging to the dev branch, automation detects successful deployments and can automatically promote by opening PRs to staging and production branches based on your defined strategy
- Lesson 1876 — GitOps Workflow Automation
- Environment Separation
- Lesson 832 — Workspace Strategies for Scale
- Environment Splitting
- Promote a replica to create an independent database for testing, development, or to split a monolithic application into separate services.
- Lesson 420 — Promoting Read Replicas
- Environment tags
- `dev`, `staging`, `prod`
- Lesson 1064 — Image Naming and Tagging ConventionsLesson 1087 — ECR Repository ConfigurationLesson 2010 — Log Parsing and Enrichment
- Environment targeting
- Is the correct environment being modified?
- Lesson 715 — Code Review and Peer Validation
- Environment tiers
- Dev pipelines write to `dev` repositories; production can only read from `prod-releases`
- Lesson 1680 — Artifact Repository Access Control
- Environment Variables
- are set in your Lambda configuration and appear as system environment variables in your function's runtime.
- Lesson 508 — AWS Lambda: Environment Variables and SecretsLesson 714 — Secrets Management in IaCLesson 762 — Variable Precedence and OverridesLesson 1253 — ConfigMap Update Behavior and Pod RestartLesson 1266 — Mounting Secrets as VolumesLesson 1654 — CI/CD Security and Secrets ManagementLesson 1661 — Conditional Execution PatternLesson 2086 — OpenTelemetry in Kubernetes Environments (+2 more)
- Environment-based separation
- Lesson 833 — Repository Structure for Large Projects
- Environment-specific values
- derived from parameters
- Lesson 898 — Variables for Template SimplificationLesson 1247 — ConfigMap Fundamentals and Use Cases
- Envoy proxies
- deployed as sidecar containers alongside each application pod.
- Lesson 1578 — Istio Data Plane and Envoy ProxiesLesson 1595 — AWS App Mesh OverviewLesson 1596 — Open Service Mesh (OSM) Basics
- Envoy proxy
- The recommended production-grade option, offering advanced load balancing, retries, and observability features
- Lesson 1594 — Consul Connect and Sidecar Proxies
- ephemeral
- (also called volatile).
- Lesson 111 — Storage Fundamentals: Persistence and VolatilityLesson 474 — FaaS Observability BasicsLesson 1034 — Container Writable Layer
- Ephemeral storage
- vanishes when the VM stops or terminates.
- Lesson 111 — Storage Fundamentals: Persistence and VolatilityLesson 121 — Ephemeral vs Persistent Volumes in CloudLesson 505 — AWS Lambda: Core Features and Configuration
- Ephemeral volumes
- (also called instance storage or local storage) are physically attached to the host machine running your VM.
- Lesson 121 — Ephemeral vs Persistent Volumes in Cloud
- Equal split
- Divide costs equally among all consuming teams (simple, but often unfair)
- Lesson 2149 — Shared Services Cost Allocation
- Equality-based
- `app=web`, `environment!
- Lesson 1123 — Labels and SelectorsLesson 1139 — Filtering Resources with Labels and Selectors
- error budget
- is the inverse of your SLO—it's the maximum amount of unreliability you're allowed before breaking your service level promise.
- Lesson 2118 — The Concept of Error BudgetsLesson 2129 — Incident Severity Levels
- error budget policies
- your team defined and makes them actionable rather than advisory.
- Lesson 2124 — SLO-Based Deployment GatingLesson 2125 — Iterating and Refining SLOs Over Time
- Error budget remaining
- Do we have at least 20% of our monthly error budget left?
- Lesson 2124 — SLO-Based Deployment Gating
- Error Budget Tracking
- Calculate remaining error budget as a percentage: `(Observed Reliability - SLO Target) / (100% - SLO Target)`.
- Lesson 2123 — Measuring and Reporting SLO Compliance
- Error handling
- Retry failed functions with exponential backoff
- Lesson 2512 — Orchestrator Pattern with Step FunctionsLesson 2515 — Workflow Orchestration Fundamentals
- Error rates
- 4xx (client errors) and 5xx (server errors)—critical for detecting issues
- Lesson 535 — API Gateway Monitoring and LogsLesson 608 — Performance Monitoring and AnalyticsLesson 1642 — Alerting on Service Mesh MetricsLesson 2191 — NAT Gateway MonitoringLesson 2500 — Measuring and Improving ResilienceLesson 2554 — Performance Testing and Benchmarking
- Escalation policies
- (critical alerts escalate if not acknowledged quickly)
- Lesson 649 — Alert Severity and PrioritizationLesson 2127 — On-Call Rotation StructuresLesson 2869 — Security Alerts and Notification Workflows
- escape hatches
- so users can move down when they outgrow simpler abstractions, but defaults guide them to appropriate levels.
- Lesson 2920 — Abstraction Levels and User PersonasLesson 2940 — Golden Paths and Paved RoadsLesson 2945 — Platform Abstractions and Escape Hatches
- Estimate the blast radius
- How many users or services are affected?
- Lesson 2450 — Single Points of Failure Identification
- ETag
- (Entity Tag) is a unique identifier—typically a hash or version string—that represents a specific version of a resource.
- Lesson 2674 — ETag and Conditional Requests
- etcd
- comes in.
- Lesson 1103 — etcd: The Cluster DatabaseLesson 1256 — ConfigMap Size Limits and Best PracticesLesson 2273 — Kubernetes Secrets Security LimitationsLesson 2471 — Leader Election and ConsensusLesson 2773 — Configuration Management Portability
- Etcd encryption at rest
- Encrypts sensitive data (Secrets, ConfigMaps) stored in etcd
- Lesson 1517 — Cluster Security Hardening
- ETL Jobs
- Python or Scala scripts (often auto-generated) that transform your data.
- Lesson 2643 — AWS Glue Overview
- ETL pipelines
- Nightly database extracts, transformation, and loading
- Lesson 2614 — Batch Processing Fundamentals
- Evaluate
- resources continuously; Azure marks compliant/non-compliant status
- Lesson 2343 — Azure Policy for Compliance Automation
- Evaluate configurations
- against security benchmarks (like CIS standards)
- Lesson 2868 — Vulnerability Scanning and Management
- Evaluation frequency
- How often to check (1, 5, 15 minutes)
- Lesson 675 — Azure Monitor Metrics and Alerts
- evaluation periods
- wisely (avoid flapping between states on temporary spikes)
- Lesson 640 — Alarm States and TransitionsLesson 642 — Alarm Evaluation Periods and DatapointsLesson 670 — CloudWatch Alarms and Actions
- Even distribution
- Prevent hot spots and overloaded targets
- Lesson 280 — Cross-Zone and Cross-Region Load Balancing
- event
- is any action or occurrence that signals your function to execute.
- Lesson 462 — Event-Driven Execution ModelLesson 466 — Function Lifecycle and Context
- Event Broadcasting
- Notifies other components (like the scheduler and controllers) about cluster changes through watch mechanisms
- Lesson 1116 — Kubernetes API Server OverviewLesson 2685 — Redis Pub/Sub and Messaging
- Event Deduplication Strategies
- ensure compensations aren't applied twice if messages are replayed.
- Lesson 2735 — Compensating Transactions
- Event handlers
- subscribe to these events and update specialized read models (CQRS read side)
- Lesson 2728 — Combining Event Sourcing and CQRS
- Event Hub/Event Grid triggers
- Process streaming events
- Lesson 511 — Azure Functions: Bindings and Triggers
- Event replay
- Rebuild state if your database corrupts
- Lesson 2596 — Event Sourcing FundamentalsLesson 2726 — Event Sourcing FundamentalsLesson 2731 — Event Replay and ReprocessingLesson 2738 — Event-Driven State Machines
- Event Sourcing
- takes a different approach: instead of storing the current value, you store *every event* that led to that state.
- Lesson 573 — Event Sourcing FundamentalsLesson 2738 — Event-Driven State Machines
- Event Stream
- Events flow from the command side to one or more read models through message queues or topics you learned earlier.
- Lesson 574 — CQRS Pattern with Events
- Event Time
- is the timestamp when the event actually happened in the real world (when the user clicked, when the sensor read the temperature, when the transaction occurred).
- Lesson 2604 — Event Time vs Processing TimeLesson 2605 — Windowing Concepts
- Event transformation
- Deploy intermediate processors that translate between schema versions, isolating producers from consumers.
- Lesson 2732 — Event Schema Evolution
- Event type
- What happened (e.
- Lesson 570 — Event Schema DesignLesson 2633 — Data Partitioning Strategies
- Event-Based Cache Invalidation
- takes a surgical approach: when the source data changes, an event notification immediately triggers removal or update of affected cache entries.
- Lesson 2704 — Event-Based Cache Invalidation
- Event-Driven
- Service A announces "something happened" to a message queue or topic.
- Lesson 567 — Event-Driven Architecture OverviewLesson 1682 — What is GitHub Actions and Why Use ItLesson 2600 — What is Streaming Data?Lesson 2738 — Event-Driven State Machines
- Event-driven communication
- flips this: services publish events to a message broker when something happens, and interested services subscribe to those events.
- Lesson 2578 — Event-Driven Communication
- Event-driven integration
- Other systems can subscribe to your event stream and react to changes in real-time.
- Lesson 573 — Event Sourcing Fundamentals
- Event-Driven Invocation Pattern
- is a serverless architecture approach where functions execute automatically when specific events occur, rather than being continuously running or manually triggered.
- Lesson 2501 — Event-Driven Invocation PatternLesson 2503 — Fan-Out/Fan-In Pattern
- Event-driven processing
- Trigger automation when budgets exceed thresholds or anomalies are detected (tying back to your budget management and alerts from lesson 2972).
- Lesson 2973 — Cost Allocation APIs and Automation
- Event-Driven Replication
- Lesson 2785 — Cross-Cloud Data Replication Strategies
- Event-driven workflows
- Trigger actions when specific items change (e.
- Lesson 434 — DynamoDB Streams and Change Data Capture
- Eventarc
- acts as a routing layer, delivering events from over 60 Google Cloud sources to your functions.
- Lesson 515 — Google Cloud Functions: Event-Driven Architecture
- EventBridge
- Scheduled or event-driven invocations (async)
- Lesson 506 — AWS Lambda: Event Sources and TriggersLesson 1818 — Integration Between AWS Code ServicesLesson 1849 — Pipeline Notifications and EventBridgeLesson 2511 — Stream Processing Pattern
- EventBridge integration
- transform CloudTrail from a passive recorder into an intelligent compliance and security engine.
- Lesson 2358 — AWS CloudTrail Deep Dive
- EventBridge rules
- that match event patterns and route them to targets like Lambda functions, Step Functions, SNS topics, or even other pipelines.
- Lesson 1849 — Pipeline Notifications and EventBridge
- events
- .
- Lesson 17 — Function as a Service (FaaS) IntroductionLesson 567 — Event-Driven Architecture OverviewLesson 618 — Edge Function Triggers and EventsLesson 850 — Stack Creation Process and EventsLesson 857 — CloudFormation Console and Stack ManagementLesson 1430 — Debugging Failed ProbesLesson 1652 — Pipeline Triggers and EventsLesson 2079 — Creating and Managing Spans Programmatically
- eventual consistency
- Lesson 150 — Consistency Models in Object StorageLesson 419 — Read Replica Lag and ConsistencyLesson 435 — DynamoDB Global Tables for Multi-RegionLesson 533 — API Gateway CachingLesson 574 — CQRS Pattern with EventsLesson 2477 — Replication Lag and ConsistencyLesson 2527 — Saga Pattern in ServerlessLesson 2586 — Saga Pattern for Distributed Transactions (+1 more)
- Eventually disable or delete
- the old key after migration
- Lesson 2311 — AWS KMS Key Rotation and Aliasing
- Every deployment starts fresh
- from a known, tested baseline
- Lesson 691 — Immutable Infrastructure Principle
- everything
- directly in your Terraform code:
- Lesson 791 — Partial Backend ConfigurationLesson 1023 — Using .dockerignore
- Evidence
- Configuration snapshot + encryption verification
- Lesson 2337 — Compliance Requirements TranslationLesson 2349 — Audit Logging Fundamentals
- Evidence artifacts
- (configuration snapshots, scan outputs)
- Lesson 2348 — Compliance Reporting and EvidenceLesson 2363 — Compliance Reporting and Evidence
- Evidence of implementation
- proves you *actually do* what your policies claim.
- Lesson 2333 — Compliance Documentation and Evidence
- Evolves with feedback
- continuous improvement based on developer experience
- Lesson 2935 — Golden Paths and Paved Roads
- Exact
- Matches only if the URL path is *exactly* the specified path
- Lesson 1223 — Basic Ingress Rules and PathsLesson 1228 — Path Types and Matching
- exactly
- what was approved and scanned earlier—no substitutions, no modifications.
- Lesson 1076 — Image Signing and VerificationLesson 2264 — Vault Policies and Access Control
- Exactly-Once
- The holy grail—each message delivers precisely one time, no loss, no duplicates.
- Lesson 552 — Message Delivery GuaranteesLesson 2603 — At-Least-Once vs Exactly-Once SemanticsLesson 2711 — Queue Types and SemanticsLesson 2712 — Message Delivery Guarantees
- Exactly-once processing
- Each message handled by one consumer only
- Lesson 551 — Queue vs Topic PatternLesson 2711 — Queue Types and Semantics
- Examine logs
- VPN gateway logs, flow logs, and firewall rules
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Example .dockerignore
- Lesson 1023 — Using .dockerignore
- Example analogy
- A restaurant tracks "cost per meal served"—ingredients, labor, utilities divided by meals.
- Lesson 2953 — Unit Economics in Cloud
- Example context fields
- Lesson 2012 — Log Correlation and Context
- Example flow
- Lesson 221 — PrivateLink and Service EndpointsLesson 636 — Metric Collection MethodsLesson 1068 — Registry Authentication MethodsLesson 2580 — Saga Pattern for Distributed TransactionsLesson 2648 — Glue Job Triggers and Workflows
- Example hierarchy
- Lesson 2063 — Spans and Span Relationships
- Example output
- Lesson 1531 — Release History and Status
- Example pattern
- Return HTTP 200 for healthy, 503 for unhealthy.
- Lesson 1427 — Designing Effective Health Check Endpoints
- Example pattern (conceptual)
- Lesson 367 — Policy Variables and Dynamic Policies
- Example scenario
- A database writing thousands of small customer records benefits from storage offering 10,000+ IOPS.
- Lesson 112 — Storage Performance Metrics: IOPS, Throughput, and LatencyLesson 161 — Replication Rules and FilteringLesson 208 — NACL Allow and Deny RulesLesson 219 — Transit Gateway Route TablesLesson 246 — ALB Listeners and RulesLesson 248 — Host-Based RoutingLesson 259 — Cross-Zone Load Balancing for ALBsLesson 268 — NLB Health Checks (+8 more)
- Example structure
- Lesson 951 — Python Templates for Dynamic Logic
- Example thinking
- Instead of reading the same configuration file three times during execution, read it once and store the result in memory.
- Lesson 495 — Execution Duration Optimization
- Example use case
- A table partitioned by `UserId` with sort key `OrderDate` could have an LSI with sort key `OrderStatus` to quickly find all orders for a user by status.
- Lesson 433 — DynamoDB Secondary Indexes: GSI and LSILesson 1355 — Inter-Pod Affinity Patterns
- Example use cases
- Lesson 870 — Mappings Section
- Example workflow
- Lesson 1559 — Chart Repositories and OCI Registries
- except
- `203.
- Lesson 1241 — IP Block RulesLesson 1749 — Only and Except (Legacy)Lesson 1963 — Instant Vector Selectors
- Exception process
- How to override policies in emergencies
- Lesson 2120 — Error Budget Policies and Decision Making
- Exclude specific branches
- Lesson 1737 — Job Rules: Basic Conditional Execution
- Exclude unnecessary files
- – Test files, documentation, `.
- Lesson 485 — Function Packaging and Deployment Size
- Exec form
- `RUN ["apt-get", "update"]` (direct execution, no shell)
- Lesson 1002 — RUN: Executing CommandsLesson 1008 — CMD: Default Container Command
- Execute a task
- (invoke a Lambda function, call an API, run a batch job)
- Lesson 2516 — Step Functions and State Machines
- Execute coordinated cutover
- Update production configurations during maintenance window
- Lesson 2828 — Connection String and Configuration Updates
- Execute initialization code
- – Run code outside your handler function
- Lesson 2543 — Cold Start Fundamentals
- Execute or delete
- You either apply the change set (making the changes real) or delete it (abandoning the update)
- Lesson 851 — Stack Updates and Change Sets
- Execute shell
- (Linux/Mac) or **Execute Windows batch command**: Run custom scripts
- Lesson 1776 — Build Steps and Post-Build Actions
- Execute the change set
- if everything looks correct, or discard it if not
- Lesson 878 — Stack Updates and Change Sets
- Executes
- your build commands defined in a `buildspec.
- Lesson 1812 — CodeBuild: Managed Build Service Overview
- Executes API calls
- to create new resources, modify existing ones, or delete obsolete infrastructure
- Lesson 699 — Apply and Provisioning
- execution duration
- , and **number of invocations**.
- Lesson 504 — Cost Optimization StrategiesLesson 2553 — Cost Monitoring and Analysis
- Execution environment
- Edge functions are more constrained (limited CPU time, memory, and available APIs) to maintain fast startup
- Lesson 612 — Introduction to Edge Functions
- Execution flow
- Defining sequences, parallel branches, and conditional logic
- Lesson 2515 — Workflow Orchestration Fundamentals
- Execution location
- Edge functions run at CDN PoPs worldwide; regional functions run in one or a few selected regions
- Lesson 612 — Introduction to Edge Functions
- Execution logs
- (or debug logs) show the step-by-step journey of a request through the gateway—transformations, backend calls, authorization checks.
- Lesson 535 — API Gateway Monitoring and LogsLesson 2623 — Batch Job Monitoring and Logging
- Execution order
- (which resources Terraform can create in parallel)
- Lesson 829 — Terraform Graph and Visualization
- Execution policies
- Control behavior for missed runs, concurrent executions, and success/failure history
- Lesson 1196 — CronJob Resource Fundamentals
- Execution Time Limits
- set the maximum duration a function can run before being forcibly terminated.
- Lesson 469 — Function Timeouts and Limits
- Executive dashboards
- provide high-level health and SLO compliance at a glance
- Lesson 2100 — Dashboard Purpose and Audience
- Executives
- want traffic lights: green/yellow/red status indicators, SLO burn rates, and business KPIs.
- Lesson 2100 — Dashboard Purpose and AudienceLesson 2818 — Migration Progress Tracking and Reporting
- Exemptions and overrides
- Special cases that should bypass normal rules
- Lesson 2899 — Policy Testing and Validation
- Existing connections
- remain open so active requests can finish
- Lesson 241 — Connection Draining and Deregistration
- Existing multi-platform expertise
- or capacity to hire/train
- Lesson 2763 — Evaluating When Multicloud is the Right Strategy
- Expand geographic reach
- If your primary cloud lacks presence in emerging markets, add a second provider with data centers there to reduce latency and meet local requirements.
- Lesson 2755 — Multicloud Benefits: Geographic and Regulatory Coverage
- Expand scope
- gradually—test bigger blast radius or combine failure modes
- Lesson 2500 — Measuring and Improving Resilience
- Expected Range
- Creates a dynamic "band" of expected values (often visualized as upper/lower bounds)
- Lesson 644 — Anomaly Detection Alarms
- Expensive aggregations or joins
- that take seconds to compute
- Lesson 2694 — Database Query Result Caching
- Expiration policies
- Auto-flag policies untouched for 6+ months
- Lesson 375 — Policy Documentation and Governance
- Expire
- (delete) non-current versions after a set period (remove versions older than 90 days)
- Lesson 157 — Versioning Lifecycle and MFA Delete
- Explicit Allow
- (Gate 2): If no explicit deny exists, the system looks for an explicit `Allow`.
- Lesson 338 — Policy Evaluation Logic
- Explicit Deny
- (Gate 1): First, the system checks *all* policies for an explicit `Deny`.
- Lesson 338 — Policy Evaluation Logic
- Explicit deny rules
- Unlike security groups, ACLs support explicit DENY rules, processed in order by rule number
- Lesson 2396 — Network ACLs for Subnet Isolation
- explicit dependencies
- using `depends_on` to handle hidden relationships Terraform can't detect.
- Lesson 822 — Implicit and Explicit DependenciesLesson 829 — Terraform Graph and VisualizationLesson 1059 — Compose Best Practices and Limitations
- Exploitability
- Is there a known exploit in the wild?
- Lesson 1075 — Vulnerability Severity and Prioritization
- Exploratory
- Discovers unknown failure modes in complex systems
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Exponential Back-off
- Instead of retrying instantly, wait progressively longer between attempts.
- Lesson 2749 — Back-off and Retry Strategies
- exponential backoff
- (10s, 20s, 40s.
- Lesson 1193 — Job Restart and Backoff PoliciesLesson 1611 — Timeouts and Retry PoliciesLesson 2456 — Failover Mechanisms and AutomationLesson 2551 — Asynchronous Processing PatternsLesson 2582 — Retry and Timeout StrategiesLesson 2590 — Retry Pattern with Exponential BackoffLesson 2714 — Dead Letter Queues
- Export and Batching
- Sending traces to a collector uses network I/O and can block application threads if not handled asynchronously.
- Lesson 2071 — Instrumentation Overhead
- Exporters
- are the translators.
- Lesson 1947 — Prometheus Architecture ComponentsLesson 1954 — Exporters and InstrumentationLesson 2074 — OpenTelemetry Architecture and ComponentsLesson 2081 — OpenTelemetry Collector FundamentalsLesson 2082 — Collector Pipeline: Receivers, Processors, Exporters
- Exports
- enable automated delivery of detailed cost data to storage accounts for custom reporting, integration with BI tools, or long-term archival.
- Lesson 2173 — Azure Cost Management and Billing
- Exposes
- these metrics through the Kubernetes API Server via the **Metrics API**
- Lesson 1445 — Metrics Server Architecture
- Exposure
- Is the vulnerable component actually used in your running containers?
- Lesson 1075 — Vulnerability Severity and Prioritization
- Express Workflows
- prioritize high throughput and low cost for short-duration tasks (up to 5 minutes).
- Lesson 2517 — AWS Step Functions Overview
- ExpressRoute (Azure)
- , and **Cloud Interconnect (GCP)** are dedicated private network connections between your on- premises datacenter and cloud provider.
- Lesson 2811 — Network Optimization for Migration
- ExpressRoute circuit
- is the fundamental resource that represents your dedicated connection.
- Lesson 2203 — Azure ExpressRoute Fundamentals
- ExpressRoute Gateway
- acts as the entry point for your Azure virtual network when connecting via ExpressRoute.
- Lesson 2217 — ExpressRoute Gateway and FastPath
- Extensibility
- Add-ons can extend existing permission sets without modifying core ClusterRoles
- Lesson 1386 — Aggregated ClusterRolesLesson 1770 — Introduction to Jenkins and CI/CD Automation
- External
- Customer notifications, regulatory reporting timelines, PR statements
- Lesson 2870 — Incident Response Planning
- External access
- Resources shared with accounts, users, or services outside your organization
- Lesson 372 — Access Analyzer for Policy Review
- External Caches
- like Redis or DynamoDB provide shared, distributed caching across all function instances.
- Lesson 2549 — Caching Strategies in Functions
- External Configuration Files
- Read a JSON, YAML, or other config file that defines which jobs to run, which environments to target, or which tests to execute.
- Lesson 1723 — Dynamic Workflow Generation
- External configuration stores
- act as a vendor-neutral layer between your application and cloud-specific configuration services.
- Lesson 2773 — Configuration Management Portability
- External dependencies
- Can the application reach third-party APIs, payment gateways, or external services?
- Lesson 2908 — Application Recovery Testing
- External integrations
- Jump from Grafana to Jaeger traces, CloudWatch Logs, or GitHub commits
- Lesson 2109 — Contextual Links and Drill-DownLesson 2798 — Application Discovery and Dependencies
- External metrics
- let HPA pull data from any monitoring system or cloud service that exposes metrics, making scaling decisions based on real business and operational signals rather than just pod-level resource usage.
- Lesson 1453 — External Metrics and HPA
- External Metrics API
- connects your cluster to external data sources through adapters.
- Lesson 1453 — External Metrics and HPA
- External names
- Public domain names are forwarded to public DNS servers on the internet (if your subnet has internet connectivity via an Internet Gateway or NAT Gateway)
- Lesson 223 — DNS Resolution in VPCs
- External Secrets Operator
- acts as a **bridge** between Kubernetes and your external secret vault.
- Lesson 1275 — External Secrets OverviewLesson 1941 — Secrets Management in FluxLesson 2278 — Container Registry Authentication
- External Secrets Operator (ESO)
- is a Kubernetes operator that acts as a synchronization bridge.
- Lesson 2274 — External Secrets Operator Pattern
- External stores
- Best for dynamic secrets and fine-grained access control
- Lesson 1870 — Handling Secrets in GitOps
- External tables
- let you create table-like abstractions over file collections:
- Lesson 2667 — Azure Synapse Serverless SQL Pool
- Externalize configurations
- Move hard-coded values to environment variables or config services
- Lesson 2828 — Connection String and Configuration Updates
- ExternalName Service
- is a special type of Kubernetes Service that doesn't route traffic to Pods like ClusterIP, NodePort, or LoadBalancer Services do.
- Lesson 1209 — ExternalName Services
- ExternalSecret
- resource that automatically fetches secrets from external stores and syncs them into Kubernetes Secrets.
- Lesson 1280 — ExternalSecret Resource
- Extract context from headers
- when consuming messages
- Lesson 2072 — Tracing in Async and Event-Driven Systems
- Extract the control
- Identify what must be protected (buckets with customer data)
- Lesson 2337 — Compliance Requirements Translation
- Extreme performance
- Millions of requests per second with microsecond latency
- Lesson 261 — What is a Network Load Balancer (NLB)?
- Extreme Performance Needs
- Applications handling millions of requests per second with strict latency requirements (financial trading platforms, video streaming origins) benefit from NLB's ability to handle massive concurrent connections with microsecond-level latency.
- Lesson 271 — NLB Use Cases and Patterns
F
- F-Pattern and Z-Pattern
- Users scan left-to-right, top-to-bottom.
- Lesson 2101 — Information Hierarchy and Layout
- FaaS
- You manage only individual function code
- Lesson 17 — Function as a Service (FaaS) IntroductionLesson 461 — FaaS vs. Traditional Compute Models
- Facilitating
- Lesson 2941 — Platform Team Interaction Modes
- Fail-fast insight
- Quickly identify which specific combinations break
- Lesson 1660 — Matrix Build Pattern
- Failback
- is the process of migrating workloads, data, and traffic back to your primary region once it's been repaired and validated.
- Lesson 2443 — Failback Procedures
- failed
- Jobs are kept.
- Lesson 1199 — CronJob History and RetentionLesson 1299 — PV and PVC Lifecycle States
- Failover procedures
- Automated or manual steps to switch to standby systems
- Lesson 2405 — What is Disaster Recovery (DR)?
- Failover scenarios
- – When one availability zone or region goes down, surviving infrastructure must handle 100% of the traffic
- Lesson 2460 — Capacity Planning for High Availability
- Failure Detection
- Health checks identify that the primary is unresponsive (covered in earlier lessons on detection mechanisms)
- Lesson 2483 — Automatic Failover ProcessLesson 2623 — Batch Job Monitoring and Logging
- Failure handling
- Built-in retry logic and dead-letter queues for poison messages
- Lesson 2511 — Stream Processing PatternLesson 2720 — Competing Consumers Pattern
- Failure Isolation
- When one microservice fails, others continue functioning—users might lose one feature but keep access to the rest
- Lesson 41 — Loose Coupling and Service IndependenceLesson 1786 — Stages and Steps OrganizationLesson 2561 — Database per Service Pattern
- Failure policy
- What happens if the webhook is unreachable (`Ignore` or `Fail`)
- Lesson 1411 — Webhook Configuration and Registration
- Failure thresholds
- How many consecutive failures trigger unhealthy status
- Lesson 329 — MIG Health Checks and Autohealing
- Failure tolerance percentage
- "Stop if 10% of deployments fail"
- Lesson 884 — StackSet Deployment Strategies
- Failures are caught early
- (a failed build never reaches deployment)
- Lesson 1657 — Linear Pipeline Pattern
- Fall back to regional
- – If local capacity is exhausted, try other zones in the same region
- Lesson 1615 — Locality-Aware Load Balancing
- Fallback Logic
- Design each component with a degraded-mode response.
- Lesson 2458 — Graceful Degradation Patterns
- False positives
- legitimate traffic blocked by overly aggressive rules
- Lesson 2374 — WAF Logging and MonitoringLesson 2376 — WAF Tuning and False Positive Management
- families
- each optimized for specific kinds of work.
- Lesson 65 — Understanding Instance Type FamiliesLesson 93 — AWS EC2 Instance Families OverviewLesson 102 — GCP Compute Engine Machine Types
- Fan-In
- As each worker function completes, it writes its result to a shared location (like object storage or a database).
- Lesson 499 — Fan-Out/Fan-In PatternLesson 2503 — Fan-Out/Fan-In PatternLesson 2602 — Streaming Architecture Patterns
- Fan-Out
- A coordinator function receives a large dataset or task list and splits it into smaller chunks.
- Lesson 499 — Fan-Out/Fan-In PatternLesson 2503 — Fan-Out/Fan-In PatternLesson 2602 — Streaming Architecture Patterns
- Fan-out architecture
- Publish one message to SNS, which then delivers it to multiple SQS queues for parallel processing by different systems.
- Lesson 557 — AWS SNS Topics and Subscriptions
- fan-out pattern
- combines SNS and SQS to solve a common problem: delivering the same message to multiple processing pipelines at once.
- Lesson 559 — SQS-SNS Fan-Out PatternLesson 1845 — Parallel and Sequential Stage Execution
- Fan-out/Fan-in
- Start multiple functions in parallel, wait for all to complete, then aggregate results (like processing 100 orders simultaneously, then generating a summary report)
- Lesson 512 — Azure Functions: Durable FunctionsLesson 2523 — Azure Durable Functions
- Fan-Out/Fan-In pattern
- is a serverless architecture technique where you distribute a single large task across multiple concurrent function invocations (fan-out), then aggregate all their results back into a single output (fan-in).
- Lesson 499 — Fan-Out/Fan-In PatternLesson 1659 — Fan-Out/Fan-In Pattern
- Fargate for EKS
- bills based on vCPU and memory requested by your pods (not the whole node).
- Lesson 1474 — EKS Pricing and Cost Considerations
- Fast burns
- A catastrophic failure might consume 10% of your monthly error budget in 10 minutes
- Lesson 2121 — Multi-Window and Multi-Burn-Rate Alerting
- Fast container creation
- No need to copy entire images when starting containers
- Lesson 979 — Copy-on-Write Strategy
- Fast failover
- – Since data isn't tied to one server, failed instances don't cause data loss.
- Lesson 2469 — Distributed Caching for Stateful Data
- Fast feedback first
- Run Terraform validation and linting immediately on every commit
- Lesson 2887 — CI/CD Integration for IaC Tests
- Fast rollback
- Instant revert to the previous version
- Lesson 277 — Blue-Green Deployments with Load BalancersLesson 1664 — Blue-Green Deployment Pattern
- Fast starts
- No need to copy gigabytes; just mount existing layers
- Lesson 976 — Union Filesystem Mechanics
- Fast startup time
- Lesson 2038 — Fluentd and Fluent Bit Overview
- Faster builds
- – smaller context uploads in seconds instead of minutes
- Lesson 1023 — Using .dockerignoreLesson 1719 — Caching Dependencies and Build Artifacts
- Faster deployments
- Update function logic without re-uploading heavy libraries
- Lesson 507 — AWS Lambda: Layers and Dependencies
- Faster execution
- More CPU power means your code runs faster, reducing execution time
- Lesson 2545 — Function Memory and CPU Optimization
- Faster pipelines
- Jobs run immediately when dependencies are satisfied
- Lesson 1760 — Pipeline DAG and Needs
- Faster recovery
- since new instances start serving traffic immediately
- Lesson 2462 — Stateless Services and Horizontal Scaling
- Faster response
- Engineers get notified immediately, not hours later
- Lesson 639 — Introduction to Alarms and Alerting
- Faster response times
- Content served from geographically closer locations
- Lesson 584 — Origin Servers and Edge Caching
- Fastest
- to execute, lowest initial risk, but you miss cloud-native benefits like auto-scaling or managed backups.
- Lesson 2819 — Database Migration Strategies Overview
- Fastly
- focuses on real-time content purging and programmable edge logic through VCL (Varnish Configuration Language).
- Lesson 594 — Popular CDN Providers Overview
- FastPath
- is a feature that bypasses the ExpressRoute gateway for the data plane while keeping the control plane intact.
- Lesson 2217 — ExpressRoute Gateway and FastPath
- Fault tolerance
- Survive zone or region failures
- Lesson 280 — Cross-Zone and Cross-Region Load BalancingLesson 315 — ASG Instance Distribution and Availability ZonesLesson 2720 — Competing Consumers Pattern
- Feature Comparison
- reveals capabilities: Does the backend support tail-based sampling?
- Lesson 2099 — Trace Backend Selection Criteria
- Feature flags
- (also called feature toggles) are conditional switches in your code that let you enable or disable functionality without redeploying.
- Lesson 1666 — Feature Flag IntegrationLesson 1667 — Multi-Environment PromotionLesson 1872 — Progressive Delivery with GitOpsLesson 2084 — Baggage and Cross-Cutting ConcernsLesson 2569 — Microservices Migration Strategies
- Feature gaps are acceptable
- or outweighed by SaaS benefits (automatic updates, reliability, integrations)
- Lesson 2795 — Repurchase Strategy
- Feature Requirements
- Lesson 1600 — Service Mesh Selection Criteria
- Feature support
- Some drivers don't support all Docker capabilities
- Lesson 1033 — Docker Storage Drivers
- Features
- Multi-AZ deployments double your infrastructure cost but provide automatic failover.
- Lesson 458 — Cost vs Performance Trade-offsLesson 1327 — CSI Driver Selection and Comparison
- Federated Control Planes
- Some solutions provide a "super control plane" that coordinates multiple clusters, letting you deploy workloads and policies once that propagate everywhere.
- Lesson 1513 — Multi-Cluster Management
- Federation
- is Prometheus's built-in mechanism for one Prometheus server to scrape and store metrics from another Prometheus server.
- Lesson 1961 — Federation for Multi-Cluster MonitoringLesson 1979 — Prometheus Federation Basics
- feedback loop
- high utilization triggers more replicas, which lowers utilization, which eventually stabilizes the replica count.
- Lesson 1449 — Horizontal Pod Autoscaler (HPA) FundamentalsLesson 1655 — Pipeline Observability and FeedbackLesson 2124 — SLO-Based Deployment Gating
- Fencing
- forcibly prevents a node from accessing shared resources when it's suspected of being split- brained.
- Lesson 2485 — Split-Brain Prevention
- fetch
- a resource type, select a **metric**, apply **filters**, then **group** and **aggregate** the data.
- Lesson 682 — GCP Monitoring Query LanguageLesson 1858 — Continuous Reconciliation
- Fetch dynamic information
- like AMI IDs, availability zones, or DNS records
- Lesson 753 — When to Use Resources vs Data Sources
- Fetches
- your source code from repositories like CodeCommit, GitHub, or S3
- Lesson 1812 — CodeBuild: Managed Build Service Overview
- Fetches cluster details
- retrieves the API server endpoint and cluster CA certificate
- Lesson 1497 — Connecting to AKS with kubectl
- Fewer origin requests
- → Lower server load, faster responses
- Lesson 587 — TTL and Cache Control Headers
- Field filters
- Click field values to instantly filter (include/exclude)
- Lesson 2029 — Kibana Index Patterns and Discover
- Field mapping
- Rename fields (`customer_name` → `name`)
- Lesson 537 — Request and Response Transformation
- Field-based indexing
- Only specific structured fields are indexed (faster, smaller, but limited scope)
- Lesson 2011 — Log Indexing Fundamentals
- Field-based rules
- Sample based on HTTP status codes, user IDs, or custom labels
- Lesson 1443 — Log Sampling and Filtering
- Field-specific queries
- Filter by user, resource, action, or IP
- Lesson 2355 — Audit Log Analysis and Search
- Fields
- Which details to capture (method, path, status code, user agent, duration, etc.
- Lesson 1637 — Access Logging in Service Mesh
- FIFO (First-In-First-Out) queue
- is a specialized SQS queue type that preserves the exact order messages are sent and guarantees that each message is processed exactly once.
- Lesson 556 — AWS SQS FIFO Queues
- FIFO Queues
- Exactly-once processing, strict ordering, 300 msg/sec (3,000 with batching)
- Lesson 2725 — Provider-Specific Queue Services
- File
- Pre-configured filesystem, multi-VM sharing, slightly lower performance, managed by cloud provider
- Lesson 114 — File Storage OverviewLesson 123 — Comparing Storage Types: When to Use WhatLesson 140 — Object Storage vs. Block vs. File
- File formats
- Typically CSV or Parquet for compatibility with analytics tools
- Lesson 2151 — Custom Cost Reports and ExportLesson 2631 — Data Lake Zones and Organization
- File parameters
- let users upload configuration files or scripts:
- Lesson 1788 — Parameters and User Input
- File paths changed
- (rebuild frontend only if `src/ui/` changed)
- Lesson 1661 — Conditional Execution Pattern
- file storage
- is network-attached and shareable:
- Lesson 114 — File Storage OverviewLesson 116 — Durability and Availability in StorageLesson 125 — Block Storage vs Other Storage TypesLesson 140 — Object Storage vs. Block vs. File
- File-level versioning
- Store schema metadata in file headers (Avro, Parquet support this natively)
- Lesson 2638 — Schema Evolution and Versioning
- Filebeat
- (part of the Elastic Stack) is a lightweight shipper specifically designed for forwarding log files.
- Lesson 658 — Log Collection Agents
- filesystem
- (the default) or as a **raw block device**.
- Lesson 1295 — Volume Modes: Filesystem vs BlockLesson 1325 — Raw Block Volumes
- Filesystem Functions
- access local data: `file()` reads file contents, `templatefile()` renders templates with variables, and `fileexists()` checks for file presence before reading.
- Lesson 824 — Terraform Functions for Data Transformation
- Filesystem-specific
- Options like `discard` for SSD trim support
- Lesson 1315 — StorageClass Mount Options
- Filter
- Rules defining which traffic to copy (all traffic, specific protocols, or certain port ranges)
- Lesson 229 — VPC Traffic MirroringLesson 1435 — Logging with Sidecar ContainersLesson 1955 — Labels and DimensionalityLesson 2026 — Fluentd Configuration and ParsingLesson 2039 — Fluentd Plugins and Output ConfigurationLesson 2174 — Azure Cost Analysis and Views
- Filter efficiently
- Search by exact log level, event type, or any field
- Lesson 654 — Structured vs Unstructured LogsLesson 2047 — Structured Logging in Applications
- Filter plugins
- are the processing stations that clean, parse, and enrich the data
- Lesson 2021 — Logstash Architecture and PipelinesLesson 2024 — Fluentd Architecture and Design
- Filtering
- SNS topics use attributes to decide which subscribers receive which messages.
- Lesson 563 — Message Attributes and MetadataLesson 663 — Log Sampling and FilteringLesson 665 — Log Aggregation PipelinesLesson 1438 — Fluentd and Fluent BitLesson 1443 — Log Sampling and FilteringLesson 2056 — Log Sampling and FilteringLesson 2064 — Span Attributes and TagsLesson 2715 — Message Attributes and Filtering
- Filtering and correlation
- Attach a `user_tier=premium` baggage item to filter logs or traces for premium customers across all services, even those that don't directly know about user tiers.
- Lesson 2084 — Baggage and Cross-Cutting Concerns
- Filtering at Source
- Configure agents to drop noisy, low-value logs *before* processing them.
- Lesson 1442 — Logging Performance and Overhead
- Filtering specific conditions
- Lesson 677 — Kusto Query Language (KQL) Basics
- Filters
- out noise and sensitive data
- Lesson 665 — Log Aggregation PipelinesLesson 682 — GCP Monitoring Query LanguageLesson 2026 — Fluentd Configuration and ParsingLesson 2040 — Fluent Bit for Kubernetes Logging
- Finally invoke your handler
- – Execute your actual business logic
- Lesson 2543 — Cold Start Fundamentals
- Finance
- PCI-DSS governs payment card information; SOX controls financial reporting
- Lesson 2322 — Introduction to Compliance in CloudLesson 2948 — What is FinOps?
- Financial modeling
- Complex calculations that benefit from parallel processing
- Lesson 70 — Accelerated Computing Instance Types
- Finding Existing VPCs
- Lesson 749 — Common Data Source Patterns
- Finding generation
- It creates "findings" for any policy that grants access beyond your defined trust boundary
- Lesson 372 — Access Analyzer for Policy Review
- Fine-grained access control
- means granting permissions at the file, folder, or even column level rather than blanket access.
- Lesson 2639 — Data Lake Security and Access Control
- Fine-Grained Authorization Policies
- Lesson 2398 — Service Mesh for Zero Trust Communication
- fine-grained control
- (many, small segments) that follows workloads even as they move or scale.
- Lesson 2391 — Micro-Segmentation vs Traditional SegmentationLesson 2530 — Serverless Database ConceptsLesson 2568 — Hybrid Microservice Deployments
- FinOps
- (Financial Operations) is an operational framework and cultural practice that brings financial accountability to the variable spending model of cloud computing.
- Lesson 2948 — What is FinOps?
- FIPS 140-2/3 Certification
- Production HSMs meet rigorous federal standards for cryptographic security, providing validated protection levels (Level 2, 3, or 4).
- Lesson 2285 — Key Storage and Hardware Security Modules
- Firestore
- and **Datastore** are fully managed, serverless NoSQL databases from Google Cloud.
- Lesson 440 — Google Cloud Firestore and Datastore
- Firestore Triggers
- React to document changes in Firestore—creates, updates, or deletes.
- Lesson 515 — Google Cloud Functions: Event-Driven Architecture
- Firewall Insights
- (identifies shadowed or unused firewall rules).
- Lesson 2194 — Provider-Specific Network Insights
- firewall rules
- blocking traffic
- Lesson 1046 — Network Troubleshooting and InspectionLesson 1081 — Network Security for Registries
- Firewall whitelisting
- Partners can add your NLB's IPs to their allow-lists without worry
- Lesson 266 — Static IP and Elastic IP Support
- First Request (Cache Miss)
- User requests content → Edge location checks its cache → Content not found → Edge fetches from origin → Edge stores copy and serves to user
- Lesson 584 — Origin Servers and Edge Caching
- Fix processing logic
- , then replay messages from DLQ back to main queue
- Lesson 2714 — Dead Letter Queues
- Fixed budgets
- Hard dollar amounts ("$50,000/month maximum")
- Lesson 2972 — Budget Management and Alerts
- Fixed percentage
- Split costs evenly or by predetermined ratios (simple but often unfair).
- Lesson 2967 — Shared Cost Allocation
- Fixed window
- Count requests in time blocks (simple but can allow bursts at boundaries)
- Lesson 2592 — Rate Limiting and Throttling
- Flaky tests
- Tests that randomly fail destroy trust.
- Lesson 1656 — CI/CD Best Practices and Anti-patterns
- Flannel
- (in basic mode) do **not** support NetworkPolicies.
- Lesson 1244 — NetworkPolicy CNI Requirements
- Flexibility
- Scale up during peak demand, scale down afterward
- Lesson 30 — Pay-as-You-Go Pricing Model FundamentalsLesson 567 — Event-Driven Architecture OverviewLesson 1205 — Service Selectors and LabelsLesson 1758 — Dynamic Child PipelinesLesson 1770 — Introduction to Jenkins and CI/CD AutomationLesson 1783 — Declarative vs Scripted Pipeline SyntaxLesson 1801 — Kubernetes Plugin for Dynamic AgentsLesson 2050 — Sidecar Pattern for Logging (+1 more)
- Flexible
- when you need custom dependencies, specific language versions, or require persistent disk writes.
- Lesson 105 — GCP App Engine Standard and Flexible
- Flexible environment
- runs your application in Docker containers on Compute Engine VMs, allowing custom runtimes and configurations.
- Lesson 105 — GCP App Engine Standard and Flexible
- Flexible mode
- Allows mixing different VM sizes and types within the same scale set.
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) FundamentalsLesson 325 — VMSS Instance Protection and Orchestration Modes
- Flow logs
- are the equivalent for your cloud network—they record traffic metadata about every connection passing through your network interfaces, subnets, or entire virtual networks.
- Lesson 213 — Network Security Logging and Monitoring
- Fluent Bit
- is lightweight and optimized for resource-constrained environments—ideal for Kubernetes nodes where efficiency matters.
- Lesson 1438 — Fluentd and Fluent BitLesson 1440 — Logging Labels and MetadataLesson 1441 — Multi- Line Log HandlingLesson 2038 — Fluentd and Fluent Bit OverviewLesson 2040 — Fluent Bit for Kubernetes LoggingLesson 2051 — DaemonSet Logging Agents
- Fluentd
- is an open-source data collector that can read logs from files, system journals, or application outputs.
- Lesson 658 — Log Collection AgentsLesson 1438 — Fluentd and Fluent BitLesson 1440 — Logging Labels and MetadataLesson 1441 — Multi-Line Log HandlingLesson 2025 — Fluentd vs Logstash Trade-offsLesson 2038 — Fluentd and Fluent Bit OverviewLesson 2048 — Container Logging DriversLesson 2051 — DaemonSet Logging Agents
- Flux
- (specifically Flux v2) is a CNCF project that embeds GitOps deeply into Kubernetes using custom resources.
- Lesson 1863 — GitOps Tooling Landscape
- Flux CLI Tools
- Lesson 1944 — Flux Monitoring and Troubleshooting
- Fn::Join
- and **Fn::Split** are complementary intrinsic functions for string manipulation.
- Lesson 866 — Fn::Join and Fn::Split
- Fn::Split
- are complementary intrinsic functions for string manipulation.
- Lesson 866 — Fn::Join and Fn::Split
- Folders
- come next — these are like departments or divisions.
- Lesson 391 — GCP IAM Overview and HierarchyLesson 1804 — Credential Management at ScaleLesson 1995 — Creating Your First DashboardLesson 2002 — Dashboard Sharing and Permissions
- Folders Plugin
- combined with plugins like **Role-Based Authorization Strategy** enable this.
- Lesson 1805 — Folder-Based Organization and RBAC
- Follow-the-sun
- Different engineers cover their local business hours across time zones.
- Lesson 2127 — On-Call Rotation Structures
- Follow-through Rate
- Percentage of postmortem action items actually completed.
- Lesson 2135 — Incident Metrics and Learning
- For low-RPO workloads
- Schedule frequent snapshots (hourly or more).
- Lesson 2423 — VM and Volume Backup Strategies
- For stateless VMs
- Focus on volume snapshots only; VM configuration can be redeployed via infrastructure-as-code.
- Lesson 2423 — VM and Volume Backup Strategies
- Forcing Reconciliation
- Lesson 1931 — Flux CLI and Troubleshooting Commands
- Forecast-based budgets
- Projected spending based on historical trends
- Lesson 2972 — Budget Management and Alerts
- Forecasted costs
- Warn if AWS predicts you'll exceed your budget based on current trends
- Lesson 2170 — AWS Budgets and Alerts
- Forecasting
- Use historical data to predict next month's bill and plan budgets accordingly.
- Lesson 2139 — Cost Explorer and Billing DashboardsLesson 2169 — AWS Cost Explorer Advanced Features
- Foreground deletion
- Parent waits until all children are deleted first
- Lesson 1125 — Owner References and Garbage Collection
- Format Flexibility
- Data lakes accept any data type—JSON logs, CSV files, images, videos, sensor data, Parquet files, database dumps—without transformation.
- Lesson 2627 — Data Lake Concepts and Architecture
- Format Standards
- Teams often standardize on JSON with specific field names so logs feed cleanly into Elasticsearch, Splunk, or other analysis tools.
- Lesson 1638 — Log Formats and Customization
- Formatting (Creating a Filesystem)
- Lesson 129 — Volume Initialization and Formatting
- Formula
- `(good requests / total requests) × 100`
- Lesson 2116 — Defining SLI SpecificationsLesson 2695 — Cache Monitoring and Performance Metrics
- Forward
- to backends like Loki, Elasticsearch, or cloud storage
- Lesson 2040 — Fluent Bit for Kubernetes Logging
- Forward compatibility
- means old readers can handle new schemas (usually by ignoring unknown fields).
- Lesson 2638 — Schema Evolution and VersioningLesson 2732 — Event Schema Evolution
- Forward no cookies
- to origin for static assets (CSS, images)
- Lesson 2678 — Query String and Cookie Handling
- Forwarders
- collect logs from sources (applications, servers, network devices) and ship them to indexers— similar to Fluentd or Promtail, but Splunk-specific.
- Lesson 2042 — Splunk Cloud and Enterprise Logging
- Foundation first
- Migrate shared infrastructure (DNS, identity providers, monitoring) before applications that depend on them
- Lesson 2829 — Dependency Mapping and Migration Order
- Four Golden Signals
- (from Google's Site Reliability Engineering) cut through the noise by focusing on what truly indicates system health.
- Lesson 626 — The Four Golden Signals
- FPGA instances
- Programmable chips you can customize for ultra-specific acceleration
- Lesson 70 — Accelerated Computing Instance Types
- Fraud Detection
- Lesson 2601 — Streaming Use Cases
- free
- across all major cloud providers.
- Lesson 199 — Internet Connectivity CostsLesson 1491 — AKS Architecture and Control Plane Management
- Free Minutes
- GitHub provides free compute minutes for public repositories and generous allowances for private ones, reducing infrastructure costs.
- Lesson 1682 — What is GitHub Actions and Why Use It
- Free tier
- Most providers give you backup storage equal to your provisioned database storage at no extra charge.
- Lesson 426 — Backup Storage and CostsLesson 539 — API Gateway Throttling and Rate LimitsLesson 540 — API Keys and Usage Plans
- Freestyle project
- (the simplest type) through the web UI:
- Lesson 1773 — Jenkins Jobs and Build Triggers
- Freestyle Projects
- are the traditional, GUI-based approach.
- Lesson 1774 — Freestyle Projects vs Pipeline Jobs
- From hours to minutes
- What once required scheduling, manual configuration, and multiple handoffs now runs as an automated script.
- Lesson 688 — IaC Benefits: Speed and Efficiency
- From sources
- Which pods, namespaces, or IP addresses can send traffic
- Lesson 1237 — Ingress Rules Basics
- FSGroupPolicy
- in CSI drivers can be `ReadWriteOnceWithFSType`, `File`, or `None`
- Lesson 1328 — CSI Security and Access Modes
- Full autonomy
- sounds appealing—developers can choose any tool, configure any setting, and deploy anywhere.
- Lesson 2918 — Self-Service vs. Full Autonomy
- Full Control
- You choose the operating system, install your software, and configure security exactly how you need it.
- Lesson 13 — Infrastructure as a Service (IaaS) OverviewLesson 1805 — Folder-Based Organization and RBAC
- Full failover tests
- execute the complete DR procedure, shifting actual workloads to your recovery environment.
- Lesson 2902 — DR Testing Fundamentals and Objectives
- Full OS images
- (`ubuntu`, `debian`) provide familiar environments but are larger
- Lesson 1001 — FROM: Base Image Selection
- Full rollback
- Restore exact previous state (release inventory)
- Lesson 2735 — Compensating Transactions
- Full testing
- Validate everything before users see it
- Lesson 277 — Blue-Green Deployments with Load BalancersLesson 1664 — Blue-Green Deployment Pattern
- Full-text indexing
- Every word becomes searchable (great for free-text searches, but expensive)
- Lesson 2011 — Log Indexing Fundamentals
- Fully Managed Platform
- Azure maintains the operating system, runtime frameworks (like .
- Lesson 101 — Azure App Service Overview
- Function B
- receives Function A's output, transforms it further
- Lesson 2504 — Function Chaining Pattern
- Function C
- takes Function B's result and completes the workflow
- Lesson 2504 — Function Chaining Pattern
- Function chaining
- (sequential steps)
- Lesson 2523 — Azure Durable FunctionsLesson 2544 — Cold Start Mitigation Strategies
- Function Concurrency Limits
- , which cap how many instances can run simultaneously.
- Lesson 479 — Reserved and Provisioned Concurrency
- Function-based microservices
- mean your User Service might be `createUser()`, `getUser()`, and `updateUser()` functions rather than a single always-running application.
- Lesson 2567 — Microservices on Serverless
- Functional sharding
- divides targets by their *function* or *type*.
- Lesson 1980 — Horizontal Sharding Strategies
- Functional Testing
- Run your complete test suite against deployments on each cloud.
- Lesson 2776 — Portability Testing and Validation
- Functionality validation
- Do all critical services operate correctly post-recovery?
- Lesson 2902 — DR Testing Fundamentals and Objectives
- Functions and operators
- String concatenation, date math
- Lesson 2823 — Heterogeneous Database Migration
- Functions, triggers, and constraints
- that use engine-specific syntax
- Lesson 2808 — Heterogeneous Database Migration
G
- GameDay
- is a scheduled, controlled chaos testing event where teams intentionally break production-like systems to validate their resilience.
- Lesson 2499 — GameDays and Chaos Testing Practices
- Gaming Applications
- Multiplayer games need consistent, predictable latency for real-time player interactions.
- Lesson 271 — NLB Use Cases and Patterns
- garbage collection
- the automatic cleanup of dependent resources.
- Lesson 1125 — Owner References and Garbage CollectionLesson 1806 — Performance Tuning and Resource Management
- Gateway
- (managed by cluster operators) defines listeners and infrastructure, while **HTTPRoute** resources (managed by application teams) define routing rules.
- Lesson 1233 — Gateway API IntroductionLesson 1583 — Gateway Resource for Ingress
- Gateway addresses
- The public IPs where VPN endpoints terminate
- Lesson 2779 — Cross-Cloud VPN Connections
- Gathers technical requirements
- – CPU, memory, storage, network bandwidth, OS versions
- Lesson 2797 — Migration Assessment Framework
- gauge
- is a metric that represents a value at a specific moment—it can go up or down freely.
- Lesson 627 — Metric Types: Counters and GaugesLesson 1950 — Metric Types: GaugeLesson 1958 — Alerting Rules
- gauges
- helps you choose the right metric type and interpret your data correctly.
- Lesson 627 — Metric Types: Counters and GaugesLesson 1950 — Metric Types: GaugeLesson 2103 — Visualization Types and Best Practices
- GCP
- rounds to the nearest 100ms (Gen 1) or uses granular billing (Gen 2).
- Lesson 517 — Cross-Provider Function ComparisonLesson 2147 — Multi-Account Cost ConsolidationLesson 2153 — Reserved Instances and Savings PlansLesson 2154 — Spot Instances and Preemptible VMsLesson 2181 — Cross-Provider Cost Tool ComparisonLesson 2389 — DDoS Testing and SimulationLesson 2962 — Cloud Billing Data Structure
- GCP Billing Accounts
- can link multiple projects and sub-accounts
- Lesson 2968 — Multi-Account Cost Aggregation
- GCP Cloud Logging
- provides query filters and custom log-based metrics
- Lesson 2355 — Audit Log Analysis and Search
- GCP Functions
- connects seamlessly with Pub/Sub, Cloud Storage, and Eventarc.
- Lesson 517 — Cross-Provider Function Comparison
- GCP Gen 2
- has improved cold starts through Cloud Run's architecture.
- Lesson 517 — Cross-Provider Function Comparison
- GCP Interconnect
- comes in two flavors: Dedicated Interconnect (direct physical connection) and Partner Interconnect (through supported service providers).
- Lesson 2780 — Direct Connect vs ExpressRoute vs Interconnect
- GCP MIGs
- excel at rolling updates with built-in canary deployment support.
- Lesson 330 — Cross-Provider Auto Scaling Comparison
- GCP Network Intelligence Center
- Offers connectivity tests between endpoints
- Lesson 2188 — Network Path Analysis ToolsLesson 2232 — Network Load Testing Tools
- GCP Organization Policy Service
- , and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
- Lesson 2345 — Continuous Compliance Scanning
- GCP VM Manager
- Coordinates shutdown, snapshot promotion, and startup sequences
- Lesson 2440 — Automated DR Orchestration
- GCP's approach
- leverages BigQuery for cost data analysis, offering unparalleled flexibility for custom queries and ML-based analysis.
- Lesson 2181 — Cross-Provider Cost Tool Comparison
- GDPR
- , **HIPAA**, **PCI-DSS**, and **SOC 2** mandate specific log retention periods, encryption standards, and data handling practices.
- Lesson 2014 — Log Security and ComplianceLesson 2329 — Cloud Provider Compliance CertificationsLesson 2330 — Compliance Inheritance ModelLesson 2353 — Audit Log Storage and Retention
- General Purpose
- instances balance CPU, memory, and storage?
- Lesson 69 — Storage Optimized Instance TypesLesson 78 — Choosing Instance Types for Your WorkloadLesson 109 — Cross-Provider Compute Feature ComparisonLesson 399 — Database Instance Classes
- General Purpose Instance Types
- balance CPU, memory, and networking?
- Lesson 67 — Compute Optimized Instance Types
- General Purpose SSD
- Balanced IOPS and cost, suitable for most workloads
- Lesson 454 — Database Storage Performance
- Generate
- a unique ID (UUID) at the system's entry point
- Lesson 2057 — Correlation IDs and Tracing ContextLesson 2260 — Vault Secrets Engines Concepts
- Generate a SecretID
- (dynamic, time-limited credential)
- Lesson 2258 — AppRole Authentication for Applications
- Generate compliance reports
- showing pass/fail evidence
- Lesson 2346 — Compliance Testing and Validation
- Generate contract file
- Pact creates a JSON contract capturing these interactions
- Lesson 2585 — Contract Testing and API Contracts
- Generate reports
- filtered by tag—now you see exactly what each department spent
- Lesson 2145 — Cost Centers and Business Units
- Generation
- KMS creates the key using cryptographically secure methods
- Lesson 2280 — Introduction to Key Management Systems
- generators
- to create multiple Application resources from one definition.
- Lesson 1903 — ApplicationSets for Multi-EnvironmentLesson 1907 — ApplicationSets for Dynamic Applications
- Geo-blocking
- means preventing access from specific countries or regions entirely.
- Lesson 592 — Geographic Restrictions and Content BlockingLesson 2373 — Geo-Blocking and IP Reputation
- Geo-Targeting
- Serve different content based on the user's country or region—pricing in local currency, language variations, or region-specific promotions
- Lesson 610 — Edge Computing Concepts and Use Cases
- Geographic
- US customers on one shard, EU customers on another
- Lesson 455 — Partitioning and Sharding StrategiesLesson 2633 — Data Partitioning Strategies
- Geographic coverage
- Some regions may be better served by one provider over another, enabling global performance optimization.
- Lesson 2751 — What is Multicloud and Why Organizations Adopt It
- geographic distribution
- from lesson 2453)
- Lesson 2457 — Load Distribution for AvailabilityLesson 2474 — Designing for Stateless-First ArchitectureLesson 2475 — Database Replication FundamentalsLesson 2480 — Asynchronous Replication Patterns
- Geographic diversity
- Connections terminating in different metros or regions
- Lesson 2220 — Private Connectivity Redundancy
- Geographic expansion
- – Prime new edge locations before announcing availability
- Lesson 2676 — Cache-Warming and PreloadingLesson 2790 — Introduction to Cloud Migration
- Geographic optimization
- Deploy closer to end-users by pulling from the nearest cloud region
- Lesson 1099 — Cross-Provider Registry Integration
- Geographic patterns
- unexpected traffic sources indicating reconnaissance
- Lesson 2374 — WAF Logging and MonitoringLesson 2680 — CDN Cache Analytics and Hit Rates
- Geographic proximity
- Route users to nearest healthy instance (supports **geographic distribution** from lesson 2453)
- Lesson 2457 — Load Distribution for Availability
- Geographic Routing
- The DNS returns the IP address of the edge location nearest to you—not just geographically, but also considering network topology and server load.
- Lesson 586 — CDN Request Flow and Routing
- GET
- Retrieve (read) an object from a bucket
- Lesson 144 — HTTP-Based Access ModelLesson 1117 — RESTful API ConventionsLesson 1380 — Creating a Basic RoleLesson 2242 — Azure Key Vault Fundamentals
- Getting Started Guides
- Oriented around Golden Paths, these guide new users through their first deployment in 15-30 minutes.
- Lesson 2943 — Platform Documentation and Onboarding
- Git
- or other version control systems.
- Lesson 687 — IaC Benefits: Version Control and CollaborationLesson 804 — Module Sources and Versioning
- Git commit SHA
- `abc123f` for traceability
- Lesson 1087 — ECR Repository ConfigurationLesson 1904 — Application Tracking and History
- Git commit SHAs
- `abc123f` (traceable to source code)
- Lesson 1064 — Image Naming and Tagging Conventions
- Git Compatibility
- CodeCommit speaks standard Git protocol.
- Lesson 1811 — CodeCommit: Git Repository Service
- Git Generator
- Read environment configs from Git directory structure
- Lesson 1903 — ApplicationSets for Multi-EnvironmentLesson 1907 — ApplicationSets for Dynamic Applications
- GitFlow
- uses multiple long-lived branches: a `main` branch for production, a `develop` branch for integration, and separate feature branches that may exist for days or weeks.
- Lesson 1668 — Trunk-Based vs GitFlow Patterns
- GitHub
- , **Bitbucket**, and **S3** (for pre-packaged code archives).
- Lesson 1826 — Source Providers and IntegrationLesson 1840 — Source Stage Configuration
- GitHub and Bitbucket
- require OAuth or personal access tokens for authentication.
- Lesson 1826 — Source Providers and Integration
- GitHub Container Registry
- allow anyone to pull (download) images without authentication.
- Lesson 1062 — Public vs Private Registries
- GitLab Server (Control Plane)
- Lesson 1727 — GitLab CI/CD Architecture Overview
- GitOps for GitOps
- your application configurations live in Git, can be reviewed through pull requests, and ArgoCD can even manage its own applications (the "App of Apps" pattern).
- Lesson 1891 — ArgoCD Application CRDLesson 1913 — App of Apps Pattern
- GitOps operator
- for Kubernetes that automates the deployment and management of applications by continuously synchronizing your cluster state with Git repositories.
- Lesson 1919 — Introduction to Flux and GitOps Philosophy
- GitOps Pull Model
- Lesson 1857 — Pull-Based Deployment Model
- GitOps workflow automation
- uses CI/CD pipelines to generate manifests programmatically, automatically create pull requests, and orchestrate environment promotions from dev through production.
- Lesson 1876 — GitOps Workflow Automation
- GitRepository
- Connects to Git repositories (GitHub, GitLab, Bitbucket, etc.
- Lesson 1933 — Source Controller
- GKE
- , you can enable **node auto-upgrade** tied to release channels.
- Lesson 1509 — Node Image UpgradesLesson 1512 — Add-Ons and Extensions
- GKE audit logging
- through Cloud Monitoring for forensics
- Lesson 1488 — GKE Security: Private Clusters and Hardening
- GKE Autopilot
- (which you learned about earlier) automatically manages nodes and charges you *only for the resources your Pods request*, not for entire VMs.
- Lesson 1489 — GKE Cost Optimization and Bin Packing
- Global Accelerators
- Lesson 2233 — Multi-Region Latency Optimization
- Global applications
- spanning multiple geographic locations
- Lesson 821 — Provider Aliases and Multi-Region DeploymentsLesson 2292 — Multi-Region KeysLesson 2312 — AWS KMS Multi-Region Keys
- Global defaults
- in the Istio installation configuration profile
- Lesson 1588 — Istio Proxy Configuration
- Global load balancers
- (DNS-based or anycast) distribute traffic across all regions
- Lesson 2435 — Active-Active Multi-Region
- global load balancing
- .
- Lesson 238 — Global Load BalancingLesson 273 — Global Load Balancing and DNS-Based Routing
- Global reach
- – access to worldwide Regions and Availability Zones (concepts you learned earlier)
- Lesson 20 — Public Cloud Deployment Model
- Global Read Performance
- Users in Europe can query a replica hosted in an EU region rather than waiting for data to travel from a US-based primary database.
- Lesson 421 — Cross-Region Read ReplicasLesson 2486 — Cross-Region Replication
- global scope
- (outside your handler function).
- Lesson 497 — Connection Pooling and ReuseLesson 1777 — Jenkins Credentials Management
- Global Secondary Index
- can use *completely different* partition and sort keys from your base table.
- Lesson 433 — DynamoDB Secondary Indexes: GSI and LSI
- Global settings
- define defaults that apply to all scrape jobs:
- Lesson 1956 — Prometheus Configuration Basics
- Global Tables
- turn a single DynamoDB table into a multi-region, fully replicated database.
- Lesson 435 — DynamoDB Global Tables for Multi-RegionLesson 2533 — DynamoDB Global Tables and Streams
- Global tool configuration
- Locations of Java, Git, Maven, etc.
- Lesson 1772 — Installing and Configuring Jenkins
- Global vs Regional Resources
- Lesson 340 — IAM Service Boundaries and Scope
- Go
- `--mount=type=cache,target=/go/pkg/mod`
- Lesson 1027 — Cache Mounts for DependenciesLesson 2078 — Installing and Configuring OpenTelemetry SDKs
- Golden Paths
- and **Paved Roads** (covered in previous lessons), you create pre-approved, automated workflows.
- Lesson 2918 — Self-Service vs. Full AutonomyLesson 2945 — Platform Abstractions and Escape Hatches
- Golden Signals
- are four essential metrics that, when monitored together, give you a complete picture of your system's health.
- Lesson 2108 — Golden Signals and Key Metrics
- Good
- "95% of API requests complete in under 500ms"
- Lesson 2113 — What Makes a Good SLILesson 2571 — RESTful API Design for Microservices
- Good encapsulation
- Exposing 5-7 meaningful variables like `environment`, `app_name`, and `enable_monitoring` that abstract away the complexity.
- Lesson 807 — Module Encapsulation and Abstraction
- Good examples
- Lesson 146 — Bucket Naming and Namespaces
- Google BigQuery
- supports federated queries through external data sources like Cloud SQL, Cloud Spanner, or Google Sheets.
- Lesson 2668 — Query Federation and External Data
- Google Cloud Audit Logs
- (Admin Activity and Data Access logs) record every interaction with Cloud KMS keys.
- Lesson 2290 — Audit Logging for Key Usage
- Google Cloud Billing API
- Export billing data and query by labels or projects
- Lesson 2973 — Cost Allocation APIs and Automation
- Google Cloud Dataplex
- automatically crawl your data sources (S3 buckets, database tables, BigQuery datasets) to extract **metadata**—information *about* your data.
- Lesson 2637 — Data Catalog and Metadata Management
- Google Cloud DNS
- provides low-latency resolution with global anycast
- Lesson 2782 — Cross-Cloud DNS Management
- Google Cloud Functions
- Node.
- Lesson 471 — Function Runtime EnvironmentsLesson 517 — Cross-Provider Function Comparison
- Google Cloud Logging
- uses bucket retention combined with Cloud Storage lifecycle policies.
- Lesson 2055 — Log Retention and Storage Classes
- Google Cloud Operations
- (formerly Stackdriver) integrates seamlessly across GCP services and offers sophisticated monitoring query language.
- Lesson 683 — Cross-Provider Monitoring Comparison
- Google Cloud Secret Manager
- focuses on simplicity and version control, allowing you to store multiple versions of secrets and manage them through IAM policies.
- Lesson 2238 — Cloud-Native Secrets Services Overview
- Google Cloud Storage
- Object versioning with lifecycle conditions based on age and version count
- Lesson 2425 — Object Storage Versioning and LifecycleLesson 2630 — Object Storage as Data Lake Foundation
- Google Cloud Storage (GCS)
- supports Cloud KMS-managed encryption keys for bucket-level or object-level encryption.
- Lesson 2321 — GCP Cloud KMS Integration and HSM
- Google Container Registry (GCR)
- as its container-specific storage solution, similar to how AWS has ECR and Azure has ACR.
- Lesson 1094 — Google Container Registry (GCR) and Artifact Registry
- Google Database Migration Service
- Supports schema translation to Cloud SQL
- Lesson 2824 — Schema Conversion Tools
- Google Dataproc
- emphasizes speed—clusters start in 90 seconds or less.
- Lesson 2618 — Spark on Cloud Platforms
- Google Kubernetes Engine (GKE)
- GKE clusters automatically send container logs to Cloud Logging when you enable the logging agent.
- Lesson 2054 — Google Cloud Logging (Operations)Lesson 2094 — Google Cloud Trace
- Google Transfer Appliance
- works similarly—a rackable storage device for massive datasets that bypasses network limitations entirely.
- Lesson 2810 — Large-Scale Data Transfer Services
- Google's network edge
- , meaning attacks are detected and mitigated before they ever reach your applications or infrastructure.
- Lesson 2384 — GCP Cloud Armor DDoS Protection
- Governance
- Prevent public access to sensitive resources
- Lesson 837 — Policy Enforcement with SentinelLesson 883 — StackSets FundamentalsLesson 2645 — Glue Data Catalog FundamentalsLesson 2925 — Service Catalog Fundamentals
- Governance and guardrails
- (budget policies, approval workflows)
- Lesson 2954 — Shared Responsibility Model
- Government
- FedRAMP, ITAR, and other frameworks control federal data
- Lesson 2322 — Introduction to Compliance in Cloud
- GPU instances
- Contain one or more graphics cards for parallel processing
- Lesson 70 — Accelerated Computing Instance Types
- GPU/specialized processing
- (machine learning, video rendering) → **Accelerated Computing** instances deliver specialized hardware.
- Lesson 78 — Choosing Instance Types for Your Workload
- grace period
- after an instance launches before health checks begin.
- Lesson 329 — MIG Health Checks and AutohealingLesson 2606 — Watermarks and Late Data
- Grace periods
- Allow brief recovery windows before failover
- Lesson 2456 — Failover Mechanisms and Automation
- Graceful degradation
- Performance may slow slightly under failure, but service continues
- Lesson 2457 — Load Distribution for AvailabilityLesson 2459 — Circuit Breaker Pattern for ResilienceLesson 2497 — Application and State Chaos
- Graceful rollover
- New encryptions use the latest version while old data remains decryptable with previous versions
- Lesson 2316 — Azure Key Vault Key Management
- Graceful termination
- Selected pods receive a termination signal and respect their `terminationGracePeriodSeconds`.
- Lesson 1371 — Pod Preemption BehaviorLesson 2470 — Stateful Set Patterns in Kubernetes
- Gradual confidence building
- before progressing to canary or blue-green deployments.
- Lesson 1609 — Traffic Mirroring (Shadowing)
- Gradual Expansion
- Systematically cover remaining namespaces
- Lesson 1601 — Service Mesh Adoption Patterns
- Gradual rollout
- observe real-world behavior before full deployment
- Lesson 276 — Weighted Target Groups and Canary Deployments
- Gradually increase traffic
- to the new version if metrics look healthy (10%, 25%, 50%, 100%)
- Lesson 1665 — Canary Deployment Pattern
- Gradually shift traffic
- if metrics are healthy (10% → 25% → 50% → 100%)
- Lesson 1606 — Canary Deployments with Service Mesh
- Grafana
- complements Kiali by focusing on time-series metrics visualization.
- Lesson 1634 — Service Mesh Dashboards
- Grafana server
- , a single binary (typically written in Go) that handles everything:
- Lesson 1992 — Grafana Architecture and Components
- Grants
- provide programmatic, temporary access without modifying the key policy.
- Lesson 2310 — AWS KMS Key Policies and Grants
- Granular Control
- Instead of all-or-nothing access, IAM lets you specify exactly what each identity can do.
- Lesson 331 — What is IAM and Why It Matters
- Granular Tagging and Attribution
- Every resource should be tagged with metadata (team, project, environment, cost center).
- Lesson 2961 — Cost Visibility Fundamentals
- Graph Databases
- Lesson 429 — NoSQL Database Categories and Use Cases
- GraphQL Schema
- You define types, queries, mutations, and subscriptions that describe your API's capabilities—just like defining a contract.
- Lesson 2537 — Serverless GraphQL APIs
- greater than
- 75°F" or "alert me when it's **less than** 60°F.
- Lesson 643 — Comparison Operators and ThresholdsLesson 1349 — Node Affinity Operators
- GreaterThan (>)
- Alarm when metric exceeds threshold (e.
- Lesson 643 — Comparison Operators and Thresholds
- GreaterThanOrEqual (≥)
- Alarm when metric reaches or exceeds threshold (e.
- Lesson 643 — Comparison Operators and Thresholds
- Green
- Normal operating range (CPU < 70%, response time < 200ms)
- Lesson 2106 — Threshold Indicators and Alerts
- Green (+)
- New resources to be created
- Lesson 903 — Template Validation and What-If OperationsLesson 917 — Deployment What-If Operations
- Green environment
- (currently receiving no traffic)
- Lesson 277 — Blue-Green Deployments with Load BalancersLesson 1664 — Blue-Green Deployment PatternLesson 1835 — Blue/Green Deployments with CodeDeploy
- Gremlin API
- For graph databases — nodes, edges, and relationships
- Lesson 436 — Azure Cosmos DB: Architecture and APIsLesson 2534 — Azure Cosmos DB Serverless
- Ground floor
- (lowest abstraction): Direct infrastructure access via IaC for maximum flexibility
- Lesson 2920 — Abstraction Levels and User Personas
- group
- (inherited by members)
- Lesson 352 — Roles vs PoliciesLesson 682 — GCP Monitoring Query LanguageLesson 1728 — GitLab Runners: Shared vs SpecificLesson 1955 — Labels and Dimensionality
- Group by
- dimensions like resource group, service name, location, or any tag you've applied
- Lesson 2174 — Azure Cost Analysis and Views
- Group costs
- by labels (similar to tags in AWS/Azure) you've applied to resources
- Lesson 2177 — Google Cloud Cost Management
- Group related keys
- by environment (prod-keyring, dev-keyring)
- Lesson 2318 — GCP Cloud KMS Structure and Key Rings
- Group-level
- Applied to all projects within a group
- Lesson 1763 — Custom CI/CD Variables and Inheritance
- Grouping and Proximity
- Cluster related metrics together (all database metrics in one panel group, all API metrics in another).
- Lesson 2101 — Information Hierarchy and Layout
- Groups
- Collections of users managed as a unit
- Lesson 333 — IAM Core Concepts: Identities and ResourcesLesson 349 — Groups FundamentalsLesson 359 — Group and Role Naming ConventionsLesson 1376 — Subjects in RBACLesson 1381 — RoleBinding Fundamentals
- GSI
- when you need entirely different query dimensions.
- Lesson 433 — DynamoDB Secondary Indexes: GSI and LSI
- guardrails
- that apply across multiple AWS accounts within an AWS Organization.
- Lesson 370 — Service Control Policies (SCPs)Lesson 2925 — Service Catalog Fundamentals
- Guardrails and policies
- Built-in compliance, security baselines, and cost controls
- Lesson 2914 — Internal Developer Platform (IDP) Fundamentals
- Guidelines for right-sizing
- Lesson 2564 — Service Size and Granularity
H
- Half-Open
- Testing phase, allows limited requests to check recovery
- Lesson 501 — Circuit Breaker PatternLesson 2459 — Circuit Breaker Pattern for ResilienceLesson 2506 — Circuit Breaker for Functions
- Half-Open (Testing)
- After a cooldown period, the breaker allows limited test requests.
- Lesson 1612 — Circuit Breaking PatternsLesson 2581 — Circuit Breaker PatternLesson 2588 — Circuit Breaker Pattern
- Handle errors
- (retry logic, catch blocks, fallback states)
- Lesson 2516 — Step Functions and State Machines
- Handle orphaned spans gracefully
- when context is missing or corrupted
- Lesson 2072 — Tracing in Async and Event-Driven Systems
- Handles
- incoming HTTP/HTTPS traffic based on those rules
- Lesson 1221 — Ingress Controller Architecture
- Handles failures
- Restarts failed containers based on restart policies
- Lesson 1109 — Kubelet: The Node Agent
- Handles mutual TLS (mTLS)
- authentication and encryption transparently
- Lesson 1594 — Consul Connect and Sidecar Proxies
- Handling schema differences
- when performing heterogeneous migrations
- Lesson 2809 — Continuous Data Replication and CDC
- HAProxy Ingress
- brings decades of load balancing expertise to Kubernetes.
- Lesson 1230 — Ingress Controller Options
- Hard-mandatory
- – blocks unconditionally, no exceptions
- Lesson 2894 — Sentinel for Terraform IntroductionLesson 2895 — Sentinel Policy LanguageLesson 2896 — Terraform Sentinel Integration
- Hard-to-rotate credentials
- Secrets hardcoded in applications can't be easily changed after exposure
- Lesson 2237 — Introduction to Secrets Management in Cloud
- Hardening
- is the process of removing unnecessary features, closing ports, patching vulnerabilities, and configuring systems to minimize attack surface.
- Lesson 2843 — Security Baseline and Hardening
- Hardware events
- Mouse movements, keyboard timings, disk seek times
- Lesson 2284 — Key Generation and Randomness
- Hardware security
- Keys protected by HSMs (Hardware Security Modules)
- Lesson 2280 — Introduction to Key Management Systems
- Hardware Security Modules (HSMs)
- become essential.
- Lesson 2285 — Key Storage and Hardware Security Modules
- Hardware token
- A physical device that generates codes or must be inserted (like a USB security key)
- Lesson 342 — Multi-Factor Authentication (MFA) Basics
- Hardware-specific
- `kubectl taint nodes ssd-node-01 disk-type=ssd:NoSchedule`
- Lesson 1362 — Applying Taints to Nodes
- Hash partitioning
- Apply a hash function to the key (e.
- Lesson 2607 — Stream Partitioning and Parallelism
- Hash selects target
- → Connection forwarded to specific backend server
- Lesson 264 — NLB Connection Handling
- Hash-based
- Apply a hash function to user IDs to distribute evenly
- Lesson 455 — Partitioning and Sharding Strategies
- Hashes
- Objects with fields (`HSET user:123 name "Alice" age 30`) — perfect for storing user profiles or session data
- Lesson 2684 — Redis Architecture and Data Structures
- HashiCorp Configuration Language (HCL)
- , a human-readable format that maps paths to **capabilities**—the actions allowed on those paths.
- Lesson 2264 — Vault Policies and Access Control
- HashiCorp Vault
- , **AWS Secrets Manager**, or **Azure Key Vault** provide:
- Lesson 1274 — Secret Security Best PracticesLesson 1804 — Credential Management at ScaleLesson 1870 — Handling Secrets in GitOpsLesson 2773 — Configuration Management Portability
- Hashmod sharding
- uses a mathematical hash function to distribute targets evenly across Prometheus instances.
- Lesson 1980 — Horizontal Sharding Strategies
- Head-based sampling
- makes the decision at the trace's start: "capture this trace or don't.
- Lesson 1636 — Trace Sampling StrategiesLesson 2066 — Sampling StrategiesLesson 2083 — Sampling Strategies in OpenTelemetry
- Header manipulation
- Add authentication tokens or modify content types
- Lesson 537 — Request and Response Transformation
- Header normalization
- Standardize `Accept-Encoding` or `User-Agent` values that don't affect content
- Lesson 607 — Cache Key Normalization
- Header versioning
- `Accept: application/vnd.
- Lesson 2563 — API-First Design for MicroservicesLesson 2571 — RESTful API Design for Microservices
- Headers
- Require specific `X-API-Version` or `X-Tenant-ID` values
- Lesson 1624 — Request-Level AuthorizationLesson 2375 — Custom Rules and Request Inspection
- headless service
- is a Kubernetes service with `ClusterIP: None`.
- Lesson 1181 — Headless Services for StatefulSetsLesson 1210 — Headless Services
- Health checking
- The registry must continuously verify service availability across cloud boundaries using cross- cloud network paths you've established (VPNs, interconnects).
- Lesson 2784 — Multicloud Service Discovery
- Health checks
- Replace unhealthy instances automatically
- Lesson 103 — GCP Instance Groups and TemplatesLesson 262 — NLB Architecture and ComponentsLesson 289 — Auto Scaling ComponentsLesson 313 — AWS Auto Scaling Groups (ASG) OverviewLesson 317 — ASG Health Checks and Instance ReplacementLesson 597 — Origin Settings and FailoverLesson 1578 — Istio Data Plane and Envoy ProxiesLesson 1902 — Application Dependencies (+7 more)
- Health checks adapt
- ALB performs health checks on whatever port the container is actually using
- Lesson 258 — ALB and Container Integration
- Health checks run
- → Load balancer verifies the instance is healthy
- Lesson 320 — ASG Integration with Elastic Load Balancing
- Health metrics
- Volume condition, errors, provisioning status
- Lesson 1324 — Volume Metrics and Monitoring
- Health probes
- How Azure determines if an instance is healthy
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- Healthcare
- HIPAA mandates how patient data is protected
- Lesson 2322 — Introduction to Compliance in Cloud
- healthy
- .
- Lesson 239 — Health Checks and Target MonitoringLesson 247 — Target Groups FundamentalsLesson 1885 — Application Health and Sync StatusLesson 1900 — Health AssessmentLesson 1939 — Dependency ManagementLesson 2465 — Stateless Service Health Checks
- Healthy threshold
- Consecutive successes needed to mark target healthy
- Lesson 239 — Health Checks and Target MonitoringLesson 251 — Health Check Configuration for ALBsLesson 268 — NLB Health Checks
- Heap size
- Start with `-Xms2g -Xmx4g` for medium installations (scales with job count and plugin usage)
- Lesson 1806 — Performance Tuning and Resource Management
- Heartbeat/extend visibility
- Long-running tasks can request timeout extensions while actively processing.
- Lesson 2713 — Message Visibility and Acknowledgment
- Heatmaps
- for time-of-day patterns
- Lesson 2028 — Kibana Dashboard CreationLesson 2103 — Visualization Types and Best Practices
- Helm chart
- is Helm's packaging format—a collection of files organized in a specific directory structure that describes a complete set of Kubernetes resources needed to run an application, service, or tool inside a Kubernetes cluster.
- Lesson 1522 — Charts: Helm's Packaging Format
- Helm charts
- Kubernetes package definitions for deploying applications
- Lesson 1095 — Artifact Registry Multi-Format Support
- Helm Controller
- bridges GitOps with Helm, letting you declare chart installations as Kubernetes resources that Flux continuously reconciles.
- Lesson 1927 — Helm Releases with FluxLesson 1932 — Flux Controller ArchitectureLesson 1935 — Helm Controller
- Helm Diff
- (a plugin) can show you what has changed, or you can use monitoring solutions that track resource modifications.
- Lesson 1562 — Helm Release Monitoring and Drift Detection
- helm-secrets
- (manage encrypted values), and **helm-s3** (use S3 as a chart repository).
- Lesson 1554 — Helm Plugins and ExtensionsLesson 1560 — Helm Secrets Management Integration
- Heredocs
- let you write multi-line strings without escape characters, perfect for scripts or configuration files.
- Lesson 732 — String Literals and String Interpolation
- Heterogeneous migration
- is the challenging cousin: moving data *and structure* between **different** database engines.
- Lesson 2808 — Heterogeneous Database Migration
- Heterogeneous support
- Cross-engine migrations with automatic conversions
- Lesson 2806 — Database Migration Service Fundamentals
- Heuristic detection
- identifies suspicious patterns even without exact signature matches
- Lesson 1083 — Malware and Secret Scanning
- Hibernation
- is like putting your laptop to sleep with all your programs still open.
- Lesson 88 — VM Hibernation
- Hidden cost drivers
- A service cheap in one cloud might have expensive data egress fees when talking to resources in another cloud
- Lesson 2757 — Multicloud Challenges: Cost Management and Visibility
- Hidden costs
- Hardware refresh cycles (typically every 3-5 years), over-provisioning for peak capacity, maintenance contracts, and downtime costs
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the CloudLesson 2799 — TCO Analysis for Migration
- Hierarchical configs
- Base configurations with cluster-specific overlays
- Lesson 1871 — Multi-Cluster GitOps
- Hierarchical Dimensions
- Lesson 2963 — Tagging Strategy for Cost Allocation
- Hierarchical federation
- creates layers: edge Prometheus instances → regional aggregators → global view.
- Lesson 1961 — Federation for Multi-Cluster Monitoring
- High (7.0–8.9)
- Serious risk requiring prompt attention
- Lesson 1075 — Vulnerability Severity and Prioritization
- high availability
- without the complexity of managing distant locations
- Lesson 45 — Multi-AZ and Multi-Region DesignsLesson 46 — Immutable Infrastructure PrinciplesLesson 107 — Azure VM Scale Sets IntroductionLesson 192 — NAT Gateway OverviewLesson 396 — Introduction to Managed Relational DatabasesLesson 435 — DynamoDB Global Tables for Multi-RegionLesson 1057 — Scaling Services with ComposeLesson 1099 — Cross-Provider Registry Integration (+4 more)
- High availability isn't critical
- Your application can tolerate brief downtime
- Lesson 1168 — Recreate Strategy
- High availability VPN connections
- use multiple redundant components:
- Lesson 2200 — High Availability VPN Connections
- high cardinality
- , which can overwhelm Prometheus.
- Lesson 1955 — Labels and DimensionalityLesson 1978 — High Cardinality and Label Design
- High cohesion within
- – related functions grouped together
- Lesson 2560 — Service Boundaries and Decomposition
- High evictions
- Increase cache size or implement better eviction policies
- Lesson 2695 — Cache Monitoring and Performance Metrics
- high IOPS
- and low latency—perfect for performance-sensitive applications.
- Lesson 113 — Block Storage OverviewLesson 125 — Block Storage vs Other Storage Types
- High IOPS (thousands+)
- Essential for production workloads with heavy traffic
- Lesson 454 — Database Storage Performance
- High latency
- Your data path might be geographically inefficient or traversing too many network hops.
- Lesson 2226 — Bandwidth vs Throughput vs Latency
- High performance
- Low latency for databases (MySQL, PostgreSQL, MongoDB)
- Lesson 124 — Block Storage OverviewLesson 2027 — Fluent Bit for Edge CollectionLesson 2038 — Fluentd and Fluent Bit Overview
- High resolution
- (1-second intervals): Keep for 1 hour
- Lesson 634 — Metric Aggregation and ResolutionLesson 669 — CloudWatch Metrics and Namespaces
- High Throughput
- NLBs can handle millions of requests per second while maintaining static IP addresses.
- Lesson 235 — Network Load Balancers (Layer 4)Lesson 441 — Cloud Bigtable for Wide-Column StorageLesson 555 — AWS SQS Standard Queues
- High transaction volume
- Larger CPU counts with sufficient memory
- Lesson 399 — Database Instance Classes
- High write throughput
- across distributed nodes
- Lesson 443 — Keyspaces and Cassandra-Compatible Services
- High-availability configurations
- where multiple instances need simultaneous read/write access
- Lesson 135 — Multi-Attach Volumes
- High-Availability Tier
- (`replicated-storage`): Multi-zone replication for critical data requiring disaster recovery guarantees.
- Lesson 1314 — Multiple StorageClasses Strategy
- High-cardinality targets
- Longer intervals reduce storage pressure
- Lesson 1988 — Scrape Interval Optimization
- High-frequency, predictable loads
- If your function runs constantly 24/7, you're paying premium prices for convenience—dedicated servers become cheaper
- Lesson 470 — FaaS Use Cases and Anti-Patterns
- High-performance processors
- (latest generation CPUs with higher clock speeds)
- Lesson 67 — Compute Optimized Instance Types
- High-performance web servers
- handling thousands of requests per second
- Lesson 67 — Compute Optimized Instance Types
- High-risk changes
- Database migrations or infrastructure modifications
- Lesson 1662 — Manual Approval Gates
- High-scale, critical production
- → custom configuration based on `default` or use platform-specific guidance
- Lesson 1586 — Istio Configuration Profiles
- High-traffic user-facing services
- after thorough testing
- Lesson 1575 — Service Mesh Adoption Strategies
- High-Value Targets
- Roll out to services that benefit most from mesh features (complex routing, security requirements)
- Lesson 1601 — Service Mesh Adoption PatternsLesson 2237 — Introduction to Secrets Management in Cloud
- high-value, low-risk
- improvements that don't require architectural changes.
- Lesson 2793 — Replatform StrategyLesson 2801 — Prioritizing Applications for Migration
- Higher `maxSurge`
- More new Pods spin up before old ones terminate → faster updates, more resources used temporarily
- Lesson 1167 — Rolling Update Strategy
- Higher availability
- Multiple independent failure domains
- Lesson 280 — Cross-Zone and Cross-Region Load Balancing
- Higher bandwidth
- Dedicated capacity that isn't shared with public traffic
- Lesson 2211 — Private Connectivity OverviewLesson 2230 — Network Placement GroupsLesson 2231 — Enhanced Networking and SR-IOV
- Higher bandwidth options
- Connections from 50 Mbps up to 100 Gbps
- Lesson 2212 — AWS Direct Connect Fundamentals
- Higher Costs
- Duplicated tools, cross-cloud data transfer fees, and specialized staff
- Lesson 23 — Multi-Cloud Strategy Fundamentals
- Higher memory usage
- on nodes holding multiple Pods with the same Secret
- Lesson 1273 — Secret Size and Performance Limits
- Higher packet-per-second (PPS) performance
- Up to millions of packets per second instead of hundreds of thousands
- Lesson 2231 — Enhanced Networking and SR-IOV
- Higher parallelism
- when deploying many independent resources
- Lesson 839 — Parallel Execution and Performance
- Higher per-millisecond cost
- Each millisecond costs more at higher memory tiers
- Lesson 2545 — Function Memory and CPU Optimization
- Higher storage costs
- – you're charged for storing these packages
- Lesson 485 — Function Packaging and Deployment Size
- Higher vCPU-to-memory ratio
- (more CPU cores relative to RAM)
- Lesson 67 — Compute Optimized Instance Types
- Higher-performance storage
- with faster write capabilities
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Highest effort
- and risk, but maximizes cloud benefits: elasticity, cost efficiency, and modern features.
- Lesson 2819 — Database Migration Strategies Overview
- HIPAA
- , **PCI-DSS**, and **SOC 2** mandate specific log retention periods, encryption standards, and data handling practices.
- Lesson 2014 — Log Security and ComplianceLesson 2329 — Cloud Provider Compliance CertificationsLesson 2330 — Compliance Inheritance ModelLesson 2353 — Audit Log Storage and Retention
- histogram
- groups observations into predefined buckets (ranges).
- Lesson 628 — Metric Types: Histograms and SummariesLesson 1951 — Metric Types: Histogram
- histograms
- when you need flexible querying and can aggregate across instances.
- Lesson 628 — Metric Types: Histograms and SummariesLesson 1640 — Performance Metrics and Histograms
- Historical Data
- Compare current performance against past trends to spot degradation over time.
- Lesson 412 — Performance Insights
- Historical trending
- Compare performance across time windows to spot degradation
- Lesson 456 — Performance Insights and Diagnostics Tools
- History
- How each layer was created (which command generated it)
- Lesson 980 — Image Manifest and Metadata
- homogeneous migration
- means moving a database from one environment to another while keeping the same database engine (e.
- Lesson 2807 — Homogeneous Database MigrationLesson 2808 — Heterogeneous Database Migration
- Hooks
- are temporary resources that run at specific sync lifecycle points:
- Lesson 1911 — Sync Waves and Resource Hooks
- Horizontal partitioning
- (often called **sharding**) splits a table by *rows*.
- Lesson 455 — Partitioning and Sharding Strategies
- Horizontal Pod Autoscaler (HPA)
- Scales pod replicas based on CPU/memory/custom metrics
- Lesson 2984 — Container Cost Optimization
- Horizontal scaling
- Open multiple cooking stations or franchise locations—distribute the work across many kitchens
- Lesson 39 — Scalability: Vertical vs Horizontal ScalingLesson 41 — Loose Coupling and Service IndependenceLesson 42 — Stateless Application DesignLesson 1771 — Jenkins Architecture: Master and AgentsLesson 1798 — Distributed Builds and Agent ArchitectureLesson 2018 — Elasticsearch Fundamentals for LoggingLesson 2464 — Stateless HA Patterns: Load BalancingLesson 2469 — Distributed Caching for Stateful Data (+1 more)
- Horizontal Scaling (Scaling Out)
- means adding more resources to distribute the load.
- Lesson 39 — Scalability: Vertical vs Horizontal Scaling
- Host mode
- removes network isolation between the container and the Docker host.
- Lesson 1043 — Host and None Network Modes
- Host-based IDS (HIDS)
- runs on individual instances or containers, monitoring system calls, file integrity, and process behavior—like a motion sensor inside each room.
- Lesson 2867 — Intrusion Detection Systems (IDS) in Cloud
- Hosted
- At a third-party facility, but still dedicated hardware just for you (sometimes called "hosted private cloud")
- Lesson 21 — Private Cloud Deployment Model
- Hosted Connection
- Provided through an AWS Partner with flexible bandwidth from 50 Mbps to 10 Gbps
- Lesson 2212 — AWS Direct Connect Fundamentals
- hostname
- in the HTTP request's `Host` header.
- Lesson 248 — Host-Based RoutingLesson 250 — HTTP Header and Method-Based Routing
- Hostname/region
- Tag each log with which server or datacenter it came from
- Lesson 660 — Log Parsing and Enrichment
- Hostnames
- Direct `api.
- Lesson 236 — Application Load Balancers (Layer 7)Lesson 245 — Introduction to Application Load Balancers (ALB)
- Hot data exists
- A small subset of data gets requested repeatedly (e.
- Lesson 2682 — In-Memory Caching Fundamentals
- Hot standby infrastructure
- running 24/7 instead of cold backups
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Hot Storage
- (or Standard tier) is optimized for data you access frequently—daily or even hourly.
- Lesson 118 — Hot, Warm, and Cold Storage Tiers
- hot tier
- costs more than **cold storage** because high-performance infrastructure is more expensive to maintain.
- Lesson 120 — Storage Cost ConsiderationsLesson 2980 — Storage Lifecycle Optimization
- Hot/Standard
- Instant access, highest cost (today's logs)
- Lesson 2055 — Log Retention and Storage ClassesLesson 2156 — Storage Lifecycle and TieringLesson 2157 — Object Storage Cost Optimization
- Hot/Standard storage
- Optimized for frequently accessed data.
- Lesson 148 — Storage Classes Introduction
- how
- your Auto Scaling Group should launch instances, and which one you should use today.
- Lesson 314 — ASG Launch Templates and ConfigurationsLesson 331 — What is IAM and Why It MattersLesson 1717 — Environment Protection RulesLesson 1767 — Deployment Strategies and EnvironmentsLesson 1854 — The Four Principles of GitOpsLesson 1883 — Creating Your First ApplicationLesson 1994 — Data Sources in GrafanaLesson 2115 — Request-Based vs. Window-Based SLIs (+2 more)
- How it works
- Lesson 2575 — Service Discovery PatternsLesson 2783 — Global Load Balancing Across Clouds
- how often
- to check for changes.
- Lesson 1922 — Source Controller and Git RepositoriesLesson 1925 — Managing Applications with FluxLesson 1934 — Kustomize ControllerLesson 1956 — Prometheus Configuration Basics
- How-To Guides
- Task-focused instructions for common operations like "requesting a new environment" or "configuring observability" within your self-service capabilities.
- Lesson 2943 — Platform Documentation and Onboarding
- HPA adds replicas
- based on CPU/memory usage, but VPA might be changing those very thresholds
- Lesson 1457 — VPA and HPA Interaction
- HSM-protected keys
- (Premium tier) are generated, stored, and processed entirely within FIPS 140-2 Level 2 validated Hardware Security Modules.
- Lesson 2316 — Azure Key Vault Key Management
- HTTP 5xx errors
- (backend failures) versus **4xx errors** (client issues).
- Lesson 2187 — Load Balancer Health and Metrics
- HTTP APIs
- cost significantly less than **REST APIs** (often 70% cheaper) for basic routing needs.
- Lesson 549 — API Gateway Cost Optimization
- HTTP checks
- Sends an HTTP request and expects a specific status code (typically 200).
- Lesson 268 — NLB Health Checks
- HTTP Conventions
- Lesson 2077 — Semantic Conventions and Standard Attributes
- HTTP endpoint
- The specific path the ALB should request (e.
- Lesson 251 — Health Check Configuration for ALBs
- HTTP headers
- Route mobile users (detected via User-Agent header) to mobile-optimized backends
- Lesson 236 — Application Load Balancers (Layer 7)Lesson 245 — Introduction to Application Load Balancers (ALB)Lesson 250 — HTTP Header and Method-Based RoutingLesson 275 — Content-Based Routing and Path RulesLesson 1423 — HTTP Probe ConfigurationLesson 1608 — A/B Testing and Experimentation
- HTTP methods
- Send GET requests to read-only servers, POST/PUT to write-enabled servers
- Lesson 236 — Application Load Balancers (Layer 7)Lesson 250 — HTTP Header and Method-Based RoutingLesson 524 — REST API Gateway BasicsLesson 1624 — Request-Level Authorization
- HTTP request/response bodies
- containing tokens or PII
- Lesson 664 — Security and Sensitive Data in Logs
- HTTP requests
- – A user visits a URL
- Lesson 462 — Event-Driven Execution ModelLesson 1420 — Liveness Probes Fundamentals
- HTTP verbs
- (GET, POST, PUT, DELETE) combined with **resource paths** to express actions on data.
- Lesson 524 — REST API Gateway Basics
- HTTP(S) Load Balancers
- (global and regional) and **TCP/SSL Proxy Load Balancers**.
- Lesson 2371 — Google Cloud Armor Fundamentals
- HTTP(S) Load Balancing Metrics
- Lesson 327 — MIG Autoscaling Configuration
- HTTP/2
- allows **multiplexing**—sending multiple requests and responses simultaneously over one TCP connection, rather than opening separate connections for each resource.
- Lesson 254 — WebSocket and HTTP/2 SupportLesson 2572 — gRPC for High-Performance Communication
- HTTP/HTTPS
- when you need to verify application logic (checking a `/health` endpoint).
- Lesson 268 — NLB Health Checks
- HTTPRoute
- resources (managed by application teams) define routing rules.
- Lesson 1233 — Gateway API Introduction
- Hub-and-spoke
- One management cluster deploys agents to workload clusters
- Lesson 1871 — Multi-Cluster GitOpsLesson 2781 — Multicloud Transit Patterns
- Human error increases
- Teams forget to enable encryption on new resources
- Lesson 2839 — Encryption by Default
- Human Interaction
- Pause a workflow waiting for external approval or input (like waiting for a manager to approve an expense report)
- Lesson 512 — Azure Functions: Durable FunctionsLesson 2523 — Azure Durable Functions
- Human requirement
- "All S3 buckets containing customer data must have encryption enabled.
- Lesson 2337 — Compliance Requirements Translation
- Human-Readable Syntax
- Configuration files use HashiCorp Configuration Language (HCL), which is designed to be clear and maintainable.
- Lesson 723 — What is Terraform and Why Use It
- Hybrid
- Combine methods—split base costs equally, then allocate overage by usage
- Lesson 2149 — Shared Services Cost AllocationLesson 2365 — WAF Deployment ModelsLesson 2570 — Service Communication Overview
- hybrid approaches
- are common.
- Lesson 636 — Metric Collection MethodsLesson 2614 — Batch Processing Fundamentals
- Hybrid Architecture
- Seamlessly integrate on-premises systems with cloud resources as if they were on the same network.
- Lesson 2201 — AWS Direct Connect Fundamentals
- hybrid cloud
- is like having both a home office and a coworking space.
- Lesson 22 — Hybrid Cloud Deployment ModelLesson 2195 — Hybrid Cloud Connectivity OverviewLesson 2752 — Multicloud vs Hybrid Cloud vs Multi-Region
- Hybrid Connectivity
- Lesson 2649 — Azure Data Factory Overview
- Hybrid deployments
- let you run some services on Kubernetes (containers) while others run serverless (functions), optimizing for each service's behavior rather than forcing everything onto one platform.
- Lesson 2568 — Hybrid Microservice Deployments
- Hybrid encryption
- solves this by using the best of both worlds.
- Lesson 2307 — Hybrid Encryption for Large Data
- Hybrid Flexibility
- AKS supports Azure Arc for extending Kubernetes management to on-premises and multi-cloud environments, giving you a consistent operational model.
- Lesson 1490 — Introduction to Azure Kubernetes Service (AKS)
- Hybrid models
- Combine methods: base costs split evenly, variable costs by usage.
- Lesson 2967 — Shared Cost Allocation
- Hybrid operations
- is the discipline of managing both environments simultaneously with consistent processes, tooling, and governance during this transition period (which might last months or years).
- Lesson 2815 — Hybrid Operations and Coexistence
- Hybrid policies
- combine these approaches: keep all production artifacts for 1 year, the last 5 non-production builds, and anything tagged as `critical-release` indefinitely.
- Lesson 1678 — Artifact Retention and Cleanup
- Hypothesis-driven experimentation
- is at the heart of chaos engineering.
- Lesson 2490 — Introduction to Chaos Engineering
I
- IaaS
- You manage applications, runtime, and OS
- Lesson 17 — Function as a Service (FaaS) IntroductionLesson 18 — Container as a Service (CaaS) IntroductionLesson 2842 — Shared Responsibility Model
- IaC-based test environments
- use Terraform or similar tools to spin up isolated replicas of your infrastructure where DR procedures can run safely.
- Lesson 2906 — Automated DR Test Frameworks
- IAM
- for authentication and authorization (similar to IRSA in EKS)
- Lesson 1475 — GKE Overview and ArchitectureLesson 2539 — Serverless API Authentication
- IAM Authentication
- uses AWS Signature Version 4 (or equivalent cloud provider IAM) to sign requests.
- Lesson 2539 — Serverless API Authentication
- IAM integration
- for identity-based access control
- Lesson 2238 — Cloud-Native Secrets Services Overview
- IAM permissions
- for CodePipeline to execute the deployment
- Lesson 1843 — Deploy Stages and Deployment ActionsLesson 1844 — Manual Approval Actions
- IAM policies
- attached to that identity.
- Lesson 348 — Access Keys and Programmatic AccessLesson 2223 — Private Connectivity Security
- IAM roles
- that you attach to your function.
- Lesson 519 — Provider-Specific Security and IAMLesson 880 — Stack PoliciesLesson 1096 — GCP Registry Authentication and IAMLesson 2538 — API Gateway with Database Integration
- IAM users
- are individual identities you create *within* your AWS account.
- Lesson 377 — AWS IAM Users and Root Account
- ID lookup
- Retrieve a resource when you know its unique identifier
- Lesson 750 — Data Source Arguments and Filters
- Ideal for
- Time-series data, IoT telemetry, financial ticks, analytics pipelines
- Lesson 441 — Cloud Bigtable for Wide-Column Storage
- Idempotency
- running the same template multiple times produces the same result
- Lesson 893 — Introduction to Azure Resource Manager (ARM)Lesson 2528 — Workflow Best PracticesLesson 2551 — Asynchronous Processing PatternsLesson 2624 — Data Quality in Batch Pipelines
- idempotent
- (safe to retry)
- Lesson 2587 — Compensating TransactionsLesson 2729 — Saga Pattern for Distributed TransactionsLesson 2735 — Compensating Transactions
- Idempotent operations
- Ensure failover actions can safely run multiple times
- Lesson 2456 — Failover Mechanisms and AutomationLesson 2713 — Message Visibility and AcknowledgmentLesson 2734 — Event Deduplication Strategies
- Identifies constraints
- – licensing restrictions, compliance requirements, performance SLAs
- Lesson 2797 — Migration Assessment Framework
- Identify a boundary
- Choose a well-defined piece of functionality (using domain-driven design principles)
- Lesson 2598 — Strangler Fig Pattern for Migration
- Identify bottlenecks
- Spot heavily-used services that need scaling
- Lesson 1639 — Service Dependency Mapping
- Identify business processes
- What does your organization actually *do*?
- Lesson 2410 — Business Impact Analysis (BIA)
- Identify one feature
- to extract and build as serverless functions
- Lesson 2514 — Strangler Fig Pattern for Migration
- Identify the bad commit
- Review recent Git history to find the problematic change
- Lesson 1873 — Rollback and Recovery
- Identify the commitment
- $10,000 upfront for a 1-year RI
- Lesson 2148 — Amortizing Reserved Instance Costs
- Identify the source
- Use specific IP addresses or security group references instead of "anywhere"
- Lesson 212 — Least Privilege Network Access
- Identifying mismatches
- – Spot instances running at 10% CPU when you're paying for 100% capacity
- Lesson 79 — Cost Optimization with Right-Sizing
- Identifying packages
- It catalogs all installed software, libraries, and dependencies (OS packages, language-specific libraries like npm or pip packages)
- Lesson 1073 — Image Scanning Fundamentals
- Identifying the resource
- you want to import (like an existing EC2 instance or S3 bucket)
- Lesson 891 — Stack Import Operations
- Identities
- are the people with key cards (users, applications, services), and **resources** are the rooms, equipment, and data they might need to access (databases, storage, virtual machines, networks).
- Lesson 333 — IAM Core Concepts: Identities and Resources
- identity
- is anything that can request access to cloud resources:
- Lesson 333 — IAM Core Concepts: Identities and ResourcesLesson 2399 — Context-Aware Access ControlsLesson 2865 — CloudTrail and Audit Logging for SecurityLesson 2928 — Software Catalog in Backstage
- Identity as the Perimeter
- changes this fundamentally: instead of asking *"Where are you connecting from?
- Lesson 2394 — Identity as the PerimeterLesson 2399 — Context-Aware Access ControlsLesson 2400 — Software-Defined Perimeter (SDP)
- Identity Federation
- means establishing trust relationships between different identity providers (IdPs) and service providers (SPs), allowing users authenticated in one system to access resources in another without re-authenticating.
- Lesson 2852 — Identity Federation and SSO
- Identity information
- Which user or service account acted
- Lesson 344 — IAM Audit and Compliance Logging
- Identity layer
- Multi-factor authentication, least-privilege access
- Lesson 48 — Security by Design and Defense in DepthLesson 2833 — Defense in Depth and Layered Security
- Identity management complexity
- How does Service A know Service B is legitimate?
- Lesson 1617 — Service Mesh Security Overview
- Identity Provider Integration
- connects your registry to enterprise systems like LDAP, Active Directory, OAuth providers (GitHub, Google), or OIDC.
- Lesson 1079 — Private Registry Authentication
- Identity service
- Issues and manages mTLS certificates for secure pod-to-pod communication
- Lesson 1591 — Linkerd Overview and Architecture
- Identity-based
- Your library card lists what sections you're allowed to enter (children's area, reference room, archives).
- Lesson 336 — Identity-Based vs Resource-Based Policies
- Identity-based access
- rather than IP-based rules
- Lesson 2391 — Micro-Segmentation vs Traditional Segmentation
- Identity-based access control
- Each service gets a cryptographic identity
- Lesson 1617 — Service Mesh Security Overview
- Identity-based example
- "Alice can read all storage buckets"
- Lesson 336 — Identity-Based vs Resource-Based Policies
- Identity-based policies
- (specific users or roles)
- Lesson 122 — Storage Security BasicsLesson 336 — Identity-Based vs Resource-Based PoliciesLesson 362 — Principal, Action, and Resource ElementsLesson 2669 — Serverless Query Engine Security
- Identity-Based, Not Network-Based
- Lesson 2398 — Service Mesh for Zero Trust Communication
- Identity-centric
- Access decisions are based on *who* (user identity, device posture) rather than *where* (network location)
- Lesson 2393 — Zero Trust Network Access (ZTNA)
- Idle or underutilized resources
- VMs running at 2% CPU for weeks
- Lesson 2180 — GCP Recommender and Cost Insights
- Idle Timeout
- is how long the ALB keeps a connection open when no data flows.
- Lesson 252 — ALB Connection Handling and TimeoutsLesson 450 — Connection Pooling and ManagementLesson 2234 — Connection Pooling and Keep-Alive
- If Condition
- Branch execution based on expressions (e.
- Lesson 2650 — ADF Pipeline Activities and Control Flow
- If one AZ fails
- (power loss, hardware failure), your application continues running in other AZs
- Lesson 45 — Multi-AZ and Multi-Region Designs
- If the ETag differs
- (content changed): The server sends **200 OK** with the new content and updated ETag.
- Lesson 2674 — ETag and Conditional Requests
- If the ETag matches
- (content unchanged): The server responds with **304 Not Modified** and *no body*—saving bandwidth dramatically.
- Lesson 2674 — ETag and Conditional Requests
- IgnoredDuringExecution
- If node labels change after the Pod is running, it stays put
- Lesson 1347 — Required Node Affinity Rules
- Ignoring alarm testing
- if you can't validate it fires correctly, it's unreliable
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Ignoring context propagation cost
- Serializing/deserializing context adds latency—keep baggage minimal
- Lesson 2087 — Best Practices and Performance Considerations
- Ignoring Fields
- You can tell ArgoCD to ignore specific JSON paths during comparison.
- Lesson 1901 — Diff Customization
- Ignoring pipeline performance
- A 2-hour pipeline kills momentum.
- Lesson 1656 — CI/CD Best Practices and Anti-patterns
- Image characteristics
- Lesson 974 — Image vs Container: Key Differences
- Image configuration
- Default environment, working directory, user
- Lesson 980 — Image Manifest and Metadata
- image digest
- is a cryptographic hash like `sha256:a1b2c3d4.
- Lesson 983 — Image Tags vs DigestsLesson 1067 — Image Digests and Immutability
- Image immutability
- Original layers never change, ensuring consistency
- Lesson 976 — Union Filesystem Mechanics
- Image integrity
- Original images never change, so multiple containers can safely share them
- Lesson 979 — Copy-on-Write Strategy
- image manifest
- a JSON document that serves as the blueprint describing all the layers, configuration, and metadata that make up your image.
- Lesson 980 — Image Manifest and MetadataLesson 995 — Image Manifest and DigestLesson 1070 — Image Manifest and Layers
- Image registry validation
- Reject pods using images from untrusted registries
- Lesson 1409 — Validating Admission Webhooks
- Image replication workflows
- Automated pipelines that copy images between ECR, ACR, and Artifact Registry after builds
- Lesson 1099 — Cross-Provider Registry Integration
- Image scanning
- Built-in vulnerability scanning examines your images for known security issues automatically.
- Lesson 1086 — AWS ECR Fundamentals
- image tag
- is a label like `nginx:latest` or `myapp:v1.
- Lesson 983 — Image Tags vs DigestsLesson 1061 — Registry vs Repository Terminology
- Image/video processing
- Different functions handle different transformations
- Lesson 2503 — Fan-Out/Fan-In Pattern
- ImagePolicy
- specifying which tags to consider (latest semantic version, alphabetical, etc.
- Lesson 1929 — Image Automation with FluxLesson 1937 — Image Automation Controllers
- ImagePullSecret
- is a special type of Secret (`kubernetes.
- Lesson 1271 — ImagePullSecrets for Private Registries
- ImageRepository
- resource pointing to your container registry, an **ImagePolicy** specifying which tags to consider (latest semantic version, alphabetical, etc.
- Lesson 1929 — Image Automation with FluxLesson 1937 — Image Automation Controllers
- ImageUpdateAutomation
- that tells Flux where and how to commit changes.
- Lesson 1929 — Image Automation with FluxLesson 1937 — Image Automation Controllers
- Immediate
- binding mode (the default), Kubernetes binds a PVC to a PV as soon as the PVC is created, before any Pod uses it.
- Lesson 1305 — Volume Binding ModesLesson 2489 — Monitoring Replication Health
- Immediate rollback
- When a deployment fails health checks, rollback quickly to restore service
- Lesson 1556 — Helm Rollback Strategies
- immediately blocked
- no exceptions.
- Lesson 338 — Policy Evaluation LogicLesson 364 — Policy Evaluation LogicLesson 381 — AWS IAM Policy Evaluation Logic
- immutability
- the object is unchangeable after creation.
- Lesson 145 — Object Immutability ConceptsLesson 1070 — Image Manifest and Layers
- Immutable
- means "unchangeable.
- Lesson 46 — Immutable Infrastructure PrinciplesLesson 103 — GCP Instance Groups and TemplatesLesson 314 — ASG Launch Templates and ConfigurationsLesson 968 — Immutable Infrastructure PatternLesson 973 — What is a Container Image?Lesson 982 — Image Digest and Content AddressingLesson 983 — Image Tags vs DigestsLesson 1067 — Image Digests and Immutability (+2 more)
- Immutable audit trails
- Log every migration action (database replications, cutover triggers, configuration changes) to support forensic analysis if recovery is needed.
- Lesson 2817 — Disaster Recovery During Migration
- Immutable Blobs
- (Azure): WORM (Write Once, Read Many) policies at the container level
- Lesson 2353 — Audit Log Storage and Retention
- Immutable Infrastructure
- Lesson 46 — Immutable Infrastructure PrinciplesLesson 720 — Rollback Strategies
- Immutable Infrastructure Pattern
- takes a radically different approach: you never modify running infrastructure.
- Lesson 968 — Immutable Infrastructure PatternLesson 973 — What is a Container Image?Lesson 1034 — Container Writable Layer
- Immutable Storage
- Store it in an artifact repository with a unique version identifier
- Lesson 1676 — Artifact Promotion Patterns
- Immutable tags
- Enable tag immutability to prevent overwriting (especially for production)
- Lesson 1087 — ECR Repository Configuration
- Impact
- Which users/services are affected
- Lesson 2128 — Alerting Best Practices for IncidentsLesson 2803 — Risk Assessment and MitigationLesson 2946 — Feedback Loops and User Research
- Impact assessment
- Quantify the effect on SLOs, users affected, revenue impact, and error budget consumption.
- Lesson 2134 — Post-Incident Reviews and Blameless Postmortems
- Imperative
- "Chop romaine, add dressing, grate parmesan, add croutons"—you control every action
- Lesson 685 — Declarative vs Imperative IaCLesson 1135 — Creating Resources with kubectl create and apply
- Imperative IaC
- requires you to write explicit, step-by-step instructions—the *how*.
- Lesson 685 — Declarative vs Imperative IaC
- Imperative scripts have problems
- Lesson 1855 — Declarative Infrastructure
- Imperva
- , **Cloudflare**, and **AWS Partner Network** providers offer sanctioned testing that simulates various attack vectors (volumetric floods, application-layer attacks, protocol exploits) without risking account termination.
- Lesson 2389 — DDoS Testing and Simulation
- Implement chargeback or showback
- by sending reports (or invoices) to team leads
- Lesson 2145 — Cost Centers and Business Units
- Implement proper severity levels
- Not everything is critical.
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Implement Retry Logic
- Network hiccups happen—build retry capability into your deployment scripts.
- Lesson 919 — ARM Template Best Practices and Validation
- Implement sidecar patterns
- that handle caching and rotation centrally
- Lesson 2251 — Secrets Management Cost Optimization
- Implement state locking
- Always use DynamoDB (S3) or native locking (GCS, Azure) to prevent concurrent modifications.
- Lesson 797 — Remote State Best Practices
- Implementation pattern
- Separate logs into tiers—hot storage for recent logs (fast access), cold storage for archived logs (compliance retention).
- Lesson 2353 — Audit Log Storage and Retention
- ImplementationSpecific
- leaves the matching logic entirely up to your Ingress controller.
- Lesson 1228 — Path Types and Matching
- Implicit Deny (Default)
- – If there's no explicit allow and no explicit deny, AWS **defaults to deny**.
- Lesson 381 — AWS IAM Policy Evaluation Logic
- implicit dependencies
- when one resource references another's attributes.
- Lesson 822 — Implicit and Explicit DependenciesLesson 829 — Terraform Graph and Visualization
- implicit dependency
- it automatically determines the creation order.
- Lesson 746 — Resource Addressing and ReferencesLesson 752 — Data Sources and DependenciesLesson 942 — Resource References and Dependencies
- import
- capability lets you take resources that already exist in your cloud provider and add them to your Terraform state, allowing you to manage them going forward.
- Lesson 826 — Import Existing InfrastructureLesson 873 — Fn::ImportValue and Cross-Stack ReferencesLesson 950 — Template Imports and Organization
- Important caveat
- Terraform documentation recommends avoiding provisioners when possible, because they break the declarative model and make your infrastructure harder to manage.
- Lesson 823 — Null Resources and Provisioners
- Importing
- is the process of telling your IaC tool about resources that already exist, so it can add them to its state file and manage them going forward.
- Lesson 706 — Import Existing Resources
- Impossible travel
- Logins from different continents minutes apart
- Lesson 2865 — CloudTrail and Audit Logging for Security
- Improve network performance
- Smaller broadcast domains mean less network noise
- Lesson 175 — Subnet Fundamentals
- Improved Availability
- If your origin goes down, cached content remains available from CDN edge servers.
- Lesson 582 — What is a CDN and Why Use One
- Improved cash flow
- Preserve capital for core business activities
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud Computing
- Improved reliability
- Smaller uploads are less likely to fail
- Lesson 166 — Multipart UploadLesson 591 — Origin Shield and Cache Hierarchies
- Improving availability
- If one region experiences issues, others continue serving images
- Lesson 1093 — ACR Geo-Replication
- Improving readability
- Code looks more like modern programming languages
- Lesson 920 — Introduction to Bicep
- in parallel
- unless you specify otherwise.
- Lesson 1702 — Jobs: Definition and DependenciesLesson 1841 — Pipeline Actions and Action Types
- in transit
- (as they flow from applications to your log aggregator) and **at rest** (when stored).
- Lesson 2014 — Log Security and ComplianceLesson 2294 — Encryption at Rest vs. Encryption in TransitLesson 2669 — Serverless Query Engine Security
- In version control
- Automated checks in your repository on every pull request
- Lesson 722 — IaC Security Scanning
- In-Memory Caching
- stores data in global variables outside your function handler.
- Lesson 2549 — Caching Strategies in Functions
- In-Memory Databases
- Systems like Redis, Memcached, or SAP HANA that store entire datasets in RAM for lightning- fast queries.
- Lesson 68 — Memory Optimized Instance Types
- In-Place Deployment
- The application on each instance is stopped, updated with the new version, and restarted — all on the same instances.
- Lesson 1831 — CodeDeploy Overview and Deployment Types
- In-place upgrades
- update existing nodes but offer less safety.
- Lesson 1506 — Cluster Upgrade StrategiesLesson 1507 — In-Place vs Blue-Green Cluster Upgrades
- Inbound
- Routes incoming internet traffic to the correct resource's private IP address
- Lesson 187 — Internet Gateway FundamentalsLesson 196 — NAT Instance Configuration
- Inbound rules
- permit responses if you're hosting services
- Lesson 200 — Troubleshooting Internet ConnectivityLesson 211 — Default Security Group BehaviorLesson 406 — Security Groups for Database Access
- Inbound traffic
- What can connect *to* your instance (e.
- Lesson 202 — Security Group FundamentalsLesson 1578 — Istio Data Plane and Envoy Proxies
- Incident Commander
- coordinates response, makes decisions
- Lesson 2131 — Incident Communication and Status PagesLesson 2133 — Incident Command SystemLesson 2870 — Incident Response Planning
- Incident Response
- Lesson 624 — What Is Monitoring and Why It Matters
- Incident Response Lifecycle
- is a framework that breaks down incident management into five distinct stages, each with clear goals and handoffs.
- Lesson 2126 — Incident Response Lifecycle
- Include context fields
- like timestamp, severity level, service name, and trace IDs in every log entry:
- Lesson 1437 — Structured Logging Best Practices
- Include purpose
- `s3-read-only-logs-bucket` not `policy-47`
- Lesson 375 — Policy Documentation and Governance
- Inconsistent Security Models
- Firewall rules, encryption in transit, and network segmentation all work differently.
- Lesson 2778 — Multicloud Networking Challenges
- Incorrect metric queries
- Custom metrics misconfigured or returning invalid data
- Lesson 1459 — Autoscaling Best Practices and Troubleshooting
- Incorrect targets
- Traffic pointing to the wrong gateway, NAT device, or peering connection
- Lesson 2190 — Route Table Verification
- Increased Complexity
- Managing multiple dashboards, billing systems, and security policies
- Lesson 23 — Multi-Cloud Strategy Fundamentals
- Increases rollout safety
- by slowing down when problems emerge
- Lesson 1173 — MinReadySeconds and Stability
- incremental
- they only save the blocks that changed since the last snapshot, saving both time and storage costs.
- Lesson 131 — Volume SnapshotsLesson 912 — Deployment Modes: Complete vs IncrementalLesson 2423 — VM and Volume Backup Strategies
- Incremental Backup
- captures only changes since the *last backup of any kind*.
- Lesson 2419 — Full, Incremental, and Differential Backups
- Incremental Mode (Default)
- Azure adds or updates resources declared in your template but **leaves untouched** any existing resources in the resource group that aren't mentioned.
- Lesson 912 — Deployment Modes: Complete vs Incremental
- Incremental rollout
- Apply policies to a test namespace first, observe for false positives
- Lesson 1629 — Security Policies Best PracticesLesson 1767 — Deployment Strategies and EnvironmentsLesson 2493 — Blast Radius and Safety Controls
- Independence
- Each microservice can be developed, deployed, scaled, and updated without affecting others.
- Lesson 2555 — What Are Microservices?
- Independent change
- – updates don't cascade everywhere
- Lesson 2560 — Service Boundaries and Decomposition
- Independent Deployment
- Update your authentication service without touching your shopping cart
- Lesson 41 — Loose Coupling and Service Independence
- Independent Deployments
- Each cloud runs a complete, self-sufficient stack.
- Lesson 2759 — Multicloud Architecture Patterns: Active-Active
- Independent endpoint
- Each replica has its own connection string
- Lesson 418 — Read Replicas for Scalability
- Independent limits
- Each tenant can have custom rate limits, retention policies, and cardinality controls
- Lesson 1985 — Cortex Multi-Tenancy
- Independent Scaling
- Your payment service can scale to handle Black Friday traffic while your product catalog stays at normal capacity (remember **horizontal scaling** from our previous lessons?
- Lesson 41 — Loose Coupling and Service IndependenceLesson 574 — CQRS Pattern with EventsLesson 969 — Microservices and Container AffinityLesson 2561 — Database per Service Pattern
- Index Lifecycle Management (ILM)
- automates the entire lifecycle—from fresh, frequently-queried logs to eventual deletion—based on age or size triggers.
- Lesson 2020 — Elasticsearch Index Lifecycle Management
- Indexers
- are Splunk's heart: they receive raw log data, break it into events, and store it in highly compressed, searchable indexes.
- Lesson 2042 — Splunk Cloud and Enterprise Logging
- Indexes and partitioning
- strategies unique to each platform
- Lesson 2808 — Heterogeneous Database Migration
- Indexing strategies
- Bitmap indexes, function-based indexes
- Lesson 2823 — Heterogeneous Database Migration
- Indicators of Compromise (IOCs)
- such as malicious IP addresses, domain names, file hashes, or attack patterns—into your SIEM, Security Command Center, GuardDuty, or Sentinel systems you've already configured.
- Lesson 2873 — Threat Intelligence Integration
- Inefficient algorithms
- – O(n²) loops processing large datasets
- Lesson 2547 — Execution Duration Optimization
- Info (P4/P5)
- Informational events worth logging but not requiring immediate action.
- Lesson 649 — Alert Severity and Prioritization
- Infracost
- and **Terraform Cloud's cost estimation** integrate directly into CI/CD workflows.
- Lesson 838 — Cost Estimation in CI/CDLesson 2885 — Cost Estimation Testing
- Infrastructure as Code
- is the practice of managing and provisioning infrastructure using **machine-readable definition files** instead of manual processes.
- Lesson 684 — What is Infrastructure as Code?Lesson 2929 — Software Templates and Scaffolding
- Infrastructure as Code (IaC)
- tools like Terraform, CloudFormation, or Pulumi treat your cluster as versioned, reviewable code.
- Lesson 1462 — EKS Cluster Creation OptionsLesson 2431 — Backup Automation and OrchestrationLesson 2816 — Migration Automation and Scripting
- Infrastructure first
- Deploy ingress controllers before applications
- Lesson 1939 — Dependency Management
- infrastructure layer
- rather than requiring each application team to build it:
- Lesson 1617 — Service Mesh Security OverviewLesson 2833 — Defense in Depth and Layered Security
- Infrastructure metrics
- Node and pod CPU/memory utilization
- Lesson 1500 — AKS Monitoring with Azure MonitorLesson 1988 — Scrape Interval Optimization
- Infrastructure scaling
- – Control plane scales with your workload needs
- Lesson 1505 — Managed Kubernetes Overview
- Infrastructure Validation
- Deploy your Terraform or Kubernetes manifests to each target cloud.
- Lesson 2776 — Portability Testing and Validation
- Infrastructure-as-Code
- Tools like Terraform that work across clouds
- Lesson 2764 — Application Portability Fundamentals
- Infrastructure-layer waves
- Move data tier first, then application tier, then presentation layer systematically.
- Lesson 2802 — Migration Wave Planning
- Ingester
- Holds recent logs in memory, creates chunks, compresses them, and flushes to object storage.
- Lesson 2035 — Loki Components and Deployment Modes
- ingesters
- (buffer and write), **queriers** (execute PromQL), and **compactors** (optimize storage).
- Lesson 1986 — Mimir for Large-Scale MetricsLesson 2034 — Loki Architecture and Design Philosophy
- Ingests application logs
- Container stdout/stderr streams flow directly to Cloud Logging
- Lesson 1487 — GKE Monitoring with Cloud Monitoring
- Ingress
- operates at **Layer 7** (HTTP/HTTPS), allowing you to route traffic based on URLs, hostnames, and paths.
- Lesson 1220 — Ingress vs Service Load BalancingLesson 1234 — NetworkPolicy FundamentalsLesson 1235 — NetworkPolicy Specification StructureLesson 1900 — Health Assessment
- Ingress annotations
- metadata you add to your Ingress resource that instructs the Ingress Controller how to handle traffic.
- Lesson 1231 — Rate Limiting and IP Whitelisting
- Ingress Controller
- (a separate component you must install), but understanding the Ingress resource itself is the first step.
- Lesson 1219 — Ingress Resource FundamentalsLesson 1221 — Ingress Controller Architecture
- Ingress Controllers
- Handle external HTTP/HTTPS traffic routing into the cluster, acting as a smart load balancer.
- Lesson 1112 — Add-on Components and Extensions
- Ingress rule
- defines how to match incoming requests (by hostname or path) and which Service should handle them.
- Lesson 1223 — Basic Ingress Rules and Paths
- IngressClass
- is like a routing tag that says: "This Ingress resource should be handled by *that specific* Ingress Controller.
- Lesson 1227 — IngressClass Resource
- Inherited from Provider
- Lesson 2330 — Compliance Inheritance Model
- Init container
- Runs before your app starts, authenticates to Vault using Kubernetes service account tokens, retrieves secrets, and writes them to a shared volume
- Lesson 2275 — Vault Agent Injector for Kubernetes
- Initial full load
- Copy existing data using native backup or snapshot methods
- Lesson 2822 — Homogeneous Database Migration
- Initial permissions
- – What they're allowed to do (usually none by default, following least privilege)
- Lesson 346 — Creating and Managing User Identities
- Initial request
- Server responds with `ETag: "v1"` and full content.
- Lesson 2674 — ETag and Conditional Requests
- Initialization code
- runs once when the function container first starts (cold start), while **handler code** runs on every invocation.
- Lesson 482 — Function Initialization and Handler Code
- Initialization code complexity
- (heavy dependencies increase startup time)
- Lesson 491 — Cold Start Fundamentals
- Initiate
- You tell the storage service "I'm about to send a large object in pieces"
- Lesson 166 — Multipart UploadLesson 185 — Network Address Translation (NAT) Preview
- Inject
- it into structured log fields: `{"correlationId": "abc-123", "message": "Processing payment"}`
- Lesson 2057 — Correlation IDs and Tracing Context
- Injected into log statements
- using structured logging fields
- Lesson 2069 — Correlation with Logs and Metrics
- Injection mechanism
- Leverage Kubernetes ConfigMaps/Secrets populated from portable sources, or sidecar containers that fetch configuration
- Lesson 2773 — Configuration Management Portability
- Innovation enablement
- Accessing cutting-edge services like AI/ML, analytics, and serverless computing without upfront infrastructure investment.
- Lesson 2790 — Introduction to Cloud Migration
- Innovation velocity
- (new projects launched per quarter)
- Lesson 37 — Measuring Cloud Business Value: KPIs and MetricsLesson 2794 — Refactor/Re-architect Strategy
- Input artifacts
- Name referencing the source stage's output (e.
- Lesson 1842 — Build Stage with CodeBuild IntegrationLesson 1843 — Deploy Stages and Deployment Actions
- Input bindings
- inject data into your function (like reading from a database).
- Lesson 511 — Azure Functions: Bindings and Triggers
- Input data
- Context about the request (who, what, when)
- Lesson 2338 — Open Policy Agent (OPA) Fundamentals
- Input plugins
- are the receiving docks where raw materials (logs) arrive
- Lesson 2021 — Logstash Architecture and PipelinesLesson 2024 — Fluentd Architecture and Design
- inputs
- to your template—values you provide at deployment time.
- Lesson 923 — Bicep File StructureLesson 1714 — Composite ActionsLesson 2026 — Fluentd Configuration and ParsingLesson 2040 — Fluent Bit for Kubernetes Logging
- InService
- – Instance passes health checks and actively receives traffic
- Lesson 295 — Instance Lifecycle in Auto Scaling
- inside
- your handler, it runs on every single invocation, which wastes time and resources if it doesn't need to change between requests.
- Lesson 482 — Function Initialization and Handler CodeLesson 1565 — Service Mesh vs API Gateway
- Insider threats
- Detecting when privileged users access systems outside their normal scope
- Lesson 2866 — Anomaly Detection and Behavioral Analysis
- InSpec
- provides a compliance-focused testing language for infrastructure.
- Lesson 2346 — Compliance Testing and Validation
- Inspect a network
- to see its configuration, connected containers, and subnet details:
- Lesson 1046 — Network Troubleshooting and Inspection
- Inspect a volume
- Lesson 1036 — Creating and Managing Volumes
- Inspect container images
- in registries for vulnerable dependencies or malware
- Lesson 2868 — Vulnerability Scanning and Management
- Inspect environment variables
- `kubectl exec my-pod -- env`
- Lesson 1140 — kubectl exec: Executing Commands in Containers
- Inspect message content
- to identify patterns (malformed data, edge cases)
- Lesson 2714 — Dead Letter Queues
- Inspect pod events
- `kubectl describe pod` reveals scheduling failures
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Inspecting a release
- reveals its configuration and status:
- Lesson 1526 — Helm Releases: Managing Deployments
- Install and validate
- Uses your AppSpec file and lifecycle hooks to deploy and test
- Lesson 1835 — Blue/Green Deployments with CodeDeploy
- Install the controller
- in your Kubernetes cluster (it generates a key pair)
- Lesson 2277 — Sealed Secrets for GitOps
- Install the runner application
- from your GitHub repository or organization settings
- Lesson 1720 — Self-Hosted Runners
- Installing
- the Flux controllers (source-controller, kustomize-controller, helm-controller, notification- controller) into your cluster
- Lesson 1921 — Installing Flux on a Kubernetes Cluster
- instance class
- defines the CPU, memory, and network capacity allocated to your database server.
- Lesson 399 — Database Instance ClassesLesson 402 — Creating and Launching RDS Instances
- Instance count
- Minimum, maximum, and initial number of VMs
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- instance level
- .
- Lesson 202 — Security Group FundamentalsLesson 406 — Security Groups for Database Access
- Instance Metadata Service
- is a special internal API that runs inside every cloud environment, allowing your VM to query information about itself.
- Lesson 86 — Instance Metadata Service
- instance sizes
- let you scale resources up or down.
- Lesson 71 — Instance Size Variations and vCPU AllocationLesson 853 — Parameters for Template Reusability
- Instance sizing
- Larger instance classes offer more CPU and memory but cost significantly more.
- Lesson 458 — Cost vs Performance Trade-offs
- Instance Status Checks
- monitor your specific VM's operating system and network configuration.
- Lesson 90 — VM Monitoring and Health Checks
- instance template
- is a saved configuration that defines everything about a VM—machine type, disk image, network settings, metadata, and startup scripts.
- Lesson 103 — GCP Instance Groups and TemplatesLesson 326 — GCP Managed Instance Groups (MIG) Overview
- Instance terminates
- → ASG automatically deregisters it, draining connections gracefully
- Lesson 320 — ASG Integration with Elastic Load Balancing
- Instance type
- (general purpose, compute optimized, etc.
- Lesson 73 — On-Demand Pricing ModelLesson 81 — VM Launch Process and InitializationLesson 86 — Instance Metadata Service
- Instance type diversity
- Include 5-10 similar instance types (`c5.
- Lesson 2978 — Spot Instance Fleet Management
- Instance-level
- Set by administrators for all projects (lowest precedence)
- Lesson 1763 — Custom CI/CD Variables and Inheritance
- Instant onboarding
- New developers clone the repository and start the container.
- Lesson 970 — Developer Workflow Improvements
- Instant recovery
- Failed instances are replaced without data loss concerns
- Lesson 2474 — Designing for Stateless-First Architecture
- Instant rollback
- Disable a problematic feature in seconds without redeploying
- Lesson 1666 — Feature Flag Integration
- Instant scalability
- – resources available on-demand
- Lesson 20 — Public Cloud Deployment ModelLesson 2656 — Serverless Query Engine Overview
- Instant teardown
- When you're done, tearing down infrastructure is just as fast.
- Lesson 688 — IaC Benefits: Speed and Efficiency
- Instant vector
- A set of time-series containing a single sample per series at one moment in time.
- Lesson 1962 — PromQL Basics and Data ModelLesson 1966 — Aggregation Operators
- Instrument strategically
- , not exhaustively.
- Lesson 2087 — Best Practices and Performance Considerations
- Instrumentation
- means adding monitoring code directly into *your* applications using Prometheus client libraries.
- Lesson 1954 — Exporters and Instrumentation
- Instrumentation overhead
- is the performance tax you pay for distributed tracing—the difference between your application's throughput and latency with and without tracing enabled.
- Lesson 2071 — Instrumentation Overhead
- Insufficient bandwidth
- You've hit your capacity ceiling and need to upgrade the connection size.
- Lesson 2226 — Bandwidth vs Throughput vs Latency
- Insufficient cluster capacity
- Cluster Autoscaler can't provision nodes fast enough
- Lesson 1459 — Autoscaling Best Practices and Troubleshooting
- INSUFFICIENT_DATA
- – Not enough data exists yet to evaluate the alarm (common when first created or after gaps in metric collection).
- Lesson 640 — Alarm States and TransitionsLesson 646 — Alarm Actions and NotificationsLesson 670 — CloudWatch Alarms and Actions
- Integrated AWS services
- Native integration with IAM, VPC, Load Balancers, and CloudWatch
- Lesson 1460 — Introduction to Amazon EKS
- Integrated Azure Ecosystem
- AKS seamlessly connects with Azure Active Directory for authentication, Azure Monitor for observability, Azure Container Registry for images, and Azure Load Balancers for networking.
- Lesson 1490 — Introduction to Azure Kubernetes Service (AKS)
- Integrated Storage (Raft)
- Built-in, consensus-based storage for high availability
- Lesson 2253 — Vault Architecture and Components
- Integrated tooling
- (CI/CD, monitoring, security scanning already wired up)
- Lesson 2940 — Golden Paths and Paved Roads
- Integration
- Works seamlessly with CodeCommit, CodePipeline, and other AWS services
- Lesson 1812 — CodeBuild: Managed Build Service OverviewLesson 2621 — Google Cloud Dataflow BatchLesson 2635 — Azure Synapse AnalyticsLesson 2645 — Glue Data Catalog FundamentalsLesson 2934 — Integrating CI/CD and Observability
- Integration Challenges
- Making services talk across cloud boundaries requires extra networking setup
- Lesson 23 — Multi-Cloud Strategy Fundamentals
- Integration Events
- flow between different systems or bounded contexts:
- Lesson 569 — Event Types and Naming Conventions
- Integration Runtime
- software that bridges cloud and on-premises environments.
- Lesson 2649 — Azure Data Factory Overview
- Integration Testing
- Validate that external dependencies—databases, message queues, observability tools—behave consistently when using abstracted interfaces you've built.
- Lesson 2776 — Portability Testing and ValidationLesson 2875 — Introduction to Infrastructure TestingLesson 2880 — Kitchen-Terraform for Module Testing
- Integration Tests (Middle)
- Lesson 2876 — Testing Pyramid for Infrastructure
- Integration with ADF pipelines
- – Use as activities within your broader orchestration workflows (from lesson 2649)
- Lesson 2651 — ADF Mapping Data Flows
- Integration with AWS CI/CD
- CodeArtifact seamlessly connects with CodeBuild, CodePipeline, and other AWS services, creating a unified native CI/CD experience.
- Lesson 1815 — CodeArtifact: Artifact Repository Service
- Integration with existing toolchains
- Works with CI/CD, monitoring, and source control
- Lesson 2914 — Internal Developer Platform (IDP) Fundamentals
- Integration with FinOps tools
- Feed API data into platforms like CloudHealth, Apptio, or custom Backstage plugins to visualize shared cost allocation (lesson 2967) or showback reports (lesson 2966).
- Lesson 2973 — Cost Allocation APIs and Automation
- Integration with Load Balancer
- Applied before traffic reaches your backend
- Lesson 2750 — Cloud Provider Rate Limiting Services
- Integrity
- No tampering or corruption
- Lesson 995 — Image Manifest and DigestLesson 1076 — Image Signing and VerificationLesson 2327 — HIPAA for Healthcare DataLesson 2416 — Compliance and Regulatory DR Requirements
- Integrity Verification
- ensures backup files aren't corrupted by checking checksums, file consistency, and metadata completeness.
- Lesson 2428 — Backup Validation and Testing
- Inter-service communication
- Can microservices discover and communicate with each other?
- Lesson 2908 — Application Recovery Testing
- Interactive dashboards
- Business intelligence tools querying live data for real-time reporting
- Lesson 2656 — Serverless Query Engine Overview
- Internal
- Who to notify, when, and through which channels (Slack, PagerDuty, phone tree)
- Lesson 2870 — Incident Response Planning
- Internal Developer Platform
- (IDP) is a curated layer of tools, workflows, and abstractions that sits between developers and the underlying infrastructure.
- Lesson 2914 — Internal Developer Platform (IDP) Fundamentals
- Internal Load Balancers
- live entirely within your private subnets.
- Lesson 233 — Load Balancer Placement Patterns
- Internal names
- Instances within your VPC can resolve each other's private DNS names (like `ip-10-0-1-45.
- Lesson 223 — DNS Resolution in VPCs
- Internal tools and microservices
- Lesson 1062 — Public vs Private Registries
- internet gateway
- , giving instances inside it public IP addresses and internet access.
- Lesson 176 — Public vs Private SubnetsLesson 187 — Internet Gateway FundamentalsLesson 200 — Troubleshooting Internet Connectivity
- Internet-Facing Load Balancers
- sit at the edge of your virtual network, in public subnets with Internet Gateway access.
- Lesson 233 — Load Balancer Placement Patterns
- Interpreting the output
- Lesson 1448 — kubectl top Command
- Interval
- How often to send the probe (e.
- Lesson 239 — Health Checks and Target MonitoringLesson 251 — Health Check Configuration for ALBsLesson 268 — NLB Health ChecksLesson 1988 — Scrape Interval OptimizationLesson 2465 — Stateless Service Health Checks
- Invalid configurations
- should fail evaluation with specific violations.
- Lesson 2899 — Policy Testing and Validation
- Invalidate
- Gentler on origin, but stale content may linger briefly
- Lesson 2675 — Cache Invalidation Strategies
- Invalidate (Soft Refresh)
- Lesson 2675 — Cache Invalidation Strategies
- Invalidation coordination
- becomes critical—when data changes, you may need to use event-based invalidation across multiple tiers or accept eventual consistency windows.
- Lesson 2708 — Multi-Layer Caching Strategies
- Invalidation logic is complex
- (easier to set "expire everything after 10 minutes" than track dependencies)
- Lesson 2703 — Time-Based Cache Invalidation (TTL)
- Inventories all assets
- – servers, databases, applications, storage, networking components
- Lesson 2797 — Migration Assessment Framework
- Inventory
- creates scheduled reports listing every object in your bucket—their keys, sizes, storage classes, encryption status, replication state, and tags.
- Lesson 170 — Inventory and AnalyticsLesson 561 — Azure Service Bus Topics
- Inventory all connection points
- Map every application, script, and job that connects to migrated resources
- Lesson 2828 — Connection String and Configuration Updates
- Inventory Service
- reserves stock → Compensating: release reservation
- Lesson 2587 — Compensating Transactions
- invisible
- to other consumers for a specified period called the **visibility timeout**.
- Lesson 554 — Message Visibility and TimeoutsLesson 2713 — Message Visibility and Acknowledgment
- IOPS
- (input/output operations per second) to handle many small, quick requests.
- Lesson 119 — Storage Access Patterns and Workload TypesLesson 126 — Block Storage Performance MetricsLesson 454 — Database Storage Performance
- iopsPerGB
- controls performance (input/output operations per second)
- Lesson 1304 — StorageClass ParametersLesson 1310 — AWS EBS StorageClasses
- IoT (Internet of Things)
- Lesson 2601 — Streaming Use Cases
- IoT and mobile backends
- Respond to device events or push notifications
- Lesson 470 — FaaS Use Cases and Anti-Patterns
- IoT Device Fleets
- Millions of IoT devices sending telemetry over MQTT, CoAP, or custom TCP protocols require a load balancer that doesn't inspect application-layer data.
- Lesson 271 — NLB Use Cases and Patterns
- IoT devices
- require minimal, highly compressed responses
- Lesson 2577 — Backend for Frontend (BFF) Pattern
- IP Address Management
- Overlapping IP ranges between clouds cause routing nightmares.
- Lesson 2778 — Multicloud Networking Challenges
- IP addresses
- Public IPs may change after stop/start; private IPs typically remain the same
- Lesson 83 — Starting and Stopping VMsLesson 267 — NLB Target TypesLesson 704 — State File Security ConcernsLesson 1978 — High Cardinality and Label Design
- IP allowlisting
- to restrict access to known safe addresses, enable **firewall rules**, and place it behind a **reverse proxy** or **API gateway** for additional filtering.
- Lesson 1081 — Network Security for Registries
- IP Allowlists
- explicitly permit only trusted IP ranges (your office, partner networks).
- Lesson 2373 — Geo-Blocking and IP Reputation
- IP Block Rules
- let you specify CIDR ranges (IP address blocks) to allow or deny traffic beyond your cluster.
- Lesson 1241 — IP Block Rules
- IP Blocklists
- deny specific addresses or ranges known to be problematic while allowing everyone else through.
- Lesson 2373 — Geo-Blocking and IP Reputation
- IP Flow Verify
- (checks if traffic is allowed to/from a VM), **Next Hop** (shows routing decisions), and **Connection Monitor** (tracks connectivity and latency over time).
- Lesson 2194 — Provider-Specific Network Insights
- IP portability
- Move Elastic IPs between NLBs during migrations or failovers
- Lesson 266 — Static IP and Elastic IP Support
- IP reputation
- leverages databases of known malicious IP addresses—those associated with botnets, spam networks, or previous attacks.
- Lesson 2373 — Geo-Blocking and IP Reputation
- IP whitelisting
- only allows traffic from specific, trusted IP addresses (like a guest list at an exclusive event).
- Lesson 1231 — Rate Limiting and IP Whitelisting
- IP-based affinity
- Routes based on the client's source IP address
- Lesson 2467 — Sticky Sessions and Affinity
- IPC namespace
- Inter-process communication resources (like message queues) are isolated between containers.
- Lesson 963 — Process Isolation with NamespacesLesson 1403 — Host Namespaces and Ports
- IPs
- when you need flexibility beyond VPC boundaries or precise IP control.
- Lesson 267 — NLB Target Types
- IPsec
- protocols to encrypt all traffic flowing between clouds.
- Lesson 2779 — Cross-Cloud VPN Connections
- IPsec tunnels
- over your private connection or implement **MACsec** (Layer 2 encryption) for physical link protection.
- Lesson 2223 — Private Connectivity Security
- IPVS mode
- Uses Linux IP Virtual Server for more efficient load balancing
- Lesson 1111 — Kube-proxy: Network Routing
- ISO 27001
- Lesson 2323 — Common Compliance Frameworks OverviewLesson 2329 — Cloud Provider Compliance CertificationsLesson 2330 — Compliance Inheritance Model
- Isolate compromised resources
- by modifying security group rules or network ACLs to block all traffic
- Lesson 2871 — Automated Incident Response
- Isolate unavoidable state
- When you must be stateful, contain it in specialized services with appropriate replication
- Lesson 2474 — Designing for Stateless-First Architecture
- Isolated test environments
- Deploy each test run into a separate namespace, account, or project to prevent conflicts.
- Lesson 2882 — Integration Testing Strategies
- Isolated testing
- Spin up ephemeral test environments for integration tests with Terratest or Kitchen-Terraform
- Lesson 2887 — CI/CD Integration for IaC Tests
- Isolated workloads
- (compliance, multi-tenancy) need separate node groups
- Lesson 1508 — Node Pool Management
- Isolating environments
- Block all traffic between development and production subnets
- Lesson 2396 — Network ACLs for Subnet Isolation
- Isolation
- Your resources are separated from other cloud customers
- Lesson 171 — Virtual Network ConceptsLesson 960 — What Are Containers?Lesson 969 — Microservices and Container AffinityLesson 979 — Copy-on-Write StrategyLesson 1793 — Docker Integration in Pipelines
- Isolation boundaries
- are the strategic separations you create between fault domains.
- Lesson 2452 — Fault Domains and Isolation Boundaries
- Istio
- offers extensive configurability through many Custom Resource Definitions (VirtualService, DestinationRule, Gateway, ServiceEntry).
- Lesson 1592 — Linkerd vs Istio: Key DifferencesLesson 2769 — Service Mesh for Portability
- Istiod
- consolidates all three into a single binary, simplifying deployment, reducing resource overhead, and making troubleshooting easier.
- Lesson 1577 — Istio Control Plane Components
- Items
- are individual records in a table (like spreadsheet rows).
- Lesson 430 — DynamoDB: Fundamentals and Data Model
- Iterate Based on Feedback
- Regular retrospectives, office hours, and feedback loops ensure you're solving real problems, not building ivory-tower solutions.
- Lesson 2938 — Platform as a Product Mindset
J
- Jaeger
- Uses OpenTelemetry or Zipkin formats
- Lesson 1635 — Distributed Tracing IntegrationLesson 2085 — Integrating OTel with Tracing Backends
- Jaeger Agent
- A lightweight daemon deployed alongside your services that batches and forwards spans to collectors
- Lesson 2089 — Jaeger Overview
- Jaeger Client Libraries
- Embedded SDKs that instrument your applications (now largely replaced by OpenTelemetry SDKs)
- Lesson 2089 — Jaeger Overview
- Jaeger Collector
- Receives spans from agents, validates them, processes them through a pipeline, and writes to storage
- Lesson 2089 — Jaeger Overview
- Jaeger UI
- Web interface for searching, filtering, and visualizing traces with service maps and dependency graphs
- Lesson 2089 — Jaeger Overview
- Java
- Maven/Gradle dependency for `opentelemetry-sdk`
- Lesson 2078 — Installing and Configuring OpenTelemetry SDKs
- JavaScript only
- and can't access external services or perform complex operations.
- Lesson 613 — CloudFront Functions Basics
- JavaScript/Node.js
- or **WASM**.
- Lesson 623 — Edge Computing Limitations and ConsiderationsLesson 2078 — Installing and Configuring OpenTelemetry SDKs
- Jenkins job
- (also called a "project") is a runnable task that Jenkins executes.
- Lesson 1773 — Jenkins Jobs and Build Triggers
- Jenkins Master
- (controller) is the project manager who assigns tasks, while **Agents** (workers) are the crews who actually build things.
- Lesson 1771 — Jenkins Architecture: Master and Agents
- Jenkins Plugin Manager
- is your central hub for discovering and installing these extensions.
- Lesson 1775 — Jenkins Plugins and Extensibility
- Jenkins X
- is an opinionated CI/CD platform built around GitOps for Kubernetes.
- Lesson 1863 — GitOps Tooling Landscape
- Jenkins' own user database
- – simplest, stores users internally
- Lesson 1781 — Jenkins User Management and Security
- Jitter
- measures variation in latency—when packet arrival times become inconsistent.
- Lesson 2225 — Network Performance Metrics and MeasurementLesson 2582 — Retry and Timeout StrategiesLesson 2590 — Retry Pattern with Exponential BackoffLesson 2749 — Back-off and Retry Strategies
- JNLP
- Agent initiates connection to master (works through firewalls)
- Lesson 1779 — Jenkins Build Agents and Executors
- Job
- creates one or more pods and ensures they successfully terminate.
- Lesson 1191 — Kubernetes Job Resource FundamentalsLesson 1683 — GitHub Actions Architecture ComponentsLesson 1686 — Jobs and Job DependenciesLesson 1702 — Jobs: Definition and DependenciesLesson 1730 — Defining Your First JobLesson 1742 — Jobs and Stages Definition
- Job A
- builds your application and creates a binary, and **Job B** needs to test that exact binary, you can't just reference it directly—the file is gone once Job A completes.
- Lesson 1710 — Artifacts: Upload and Download Between Jobs
- Job B
- needs to test that exact binary, you can't just reference it directly—the file is gone once Job A completes.
- Lesson 1710 — Artifacts: Upload and Download Between Jobs
- Job configurations
- XML files defining all your pipeline jobs and freestyle projects
- Lesson 1808 — Backup and Disaster Recovery
- Job Control
- Cancel running jobs, retry failed ones, or download artifacts using job-specific endpoints—all without manual intervention.
- Lesson 1769 — GitLab CI API and Automation
- Job definitions
- Named blocks (e.
- Lesson 1729 — The .gitlab-ci.yml File StructureLesson 1741 — GitLab CI/CD Pipeline File Structure
- Job list
- Shows all configured jobs/pipelines
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Job Metrics
- Track duration, records processed, memory usage, CPU utilization, and throughput.
- Lesson 2623 — Batch Job Monitoring and Logging
- Job Orchestration
- Built-in scheduling and triggering mechanisms that coordinate complex multi-step workflows.
- Lesson 2643 — AWS Glue Overview
- Job-level variables
- apply only to steps within that specific job:
- Lesson 1693 — Environment Variables in Workflows
- Jobs
- are designed for tasks that need to run to completion and then stop—think data processing, batch calculations, or one-time migrations.
- Lesson 1191 — Kubernetes Job Resource FundamentalsLesson 1683 — GitHub Actions Architecture ComponentsLesson 1739 — Pipeline Visualization and Job Logs
- Joining split-and-selected values
- Lesson 876 — Complex Function Nesting
- JSON
- (JavaScript Object Notation) – a text format for organizing data with labels and values.
- Lesson 361 — Policy Structure and SyntaxLesson 860 — YAML vs JSON Template FormatsLesson 863 — Intrinsic Function RefLesson 2632 — File Formats for Analytics
- JSON parsing
- If logs are already JSON-formatted, extract nested fields automatically
- Lesson 660 — Log Parsing and Enrichment
- JSON syntax
- Lesson 865 — Fn::Sub for String Substitution
- JSON-based structured language
- for defining state machines in AWS Step Functions.
- Lesson 2518 — Amazon States Language (ASL)
- Jumbo frames
- are packets larger than the standard 1,500-byte MTU—typically **9,000 bytes** or **9,001 bytes**.
- Lesson 2229 — MTU and Jumbo Frames
- Just-in-time VM access
- Reduces attack surface by locking down management ports
- Lesson 2863 — Azure Security Center and Sentinel
- JWKS URI
- Where to fetch public keys for signature verification
- Lesson 1627 — JWT Authentication and Validation
- JWT (JSON Web Tokens)
- let clients prove their identity by presenting signed tokens.
- Lesson 2539 — Serverless API Authentication
- JWT authorizers
- both letting you enforce fine-grained access control before requests reach your backend.
- Lesson 544 — API Gateway Authorization Strategies
- JWT claims
- Extract user roles, groups, or permissions from authenticated tokens
- Lesson 1624 — Request-Level Authorization
K
- Kafka streams
- in hybrid environments
- Lesson 2511 — Stream Processing PatternLesson 2611 — Stream Processing Frameworks
- Keep count
- Retain only the latest 10 versions of each image
- Lesson 998 — Image Retention and Cleanup Policies
- Keep dashboards focused
- Each dashboard should serve one specific purpose (cluster health, application metrics, team overview).
- Lesson 2003 — Grafana Best Practices and Performance
- Keep files maintainable
- Use `extends` and override files to separate environments (dev, test, prod) rather than duplicating configurations.
- Lesson 1059 — Compose Best Practices and Limitations
- Keep functions small
- Smaller code bundles load faster.
- Lesson 622 — Edge Function Performance Optimization
- Keep it lightweight
- Your health check will run repeatedly (based on your `periodSeconds`).
- Lesson 1427 — Designing Effective Health Check Endpoints
- Keep sensitive data secure
- in your private cloud (like customer financial records)
- Lesson 22 — Hybrid Cloud Deployment Model
- Keep your configuration read-only
- for certain infrastructure components
- Lesson 753 — When to Use Resources vs Data Sources
- Keep-Alive Settings
- control HTTP connection reuse between the ALB and your targets.
- Lesson 252 — ALB Connection Handling and Timeouts
- Kernel manipulation
- Can load kernel modules or change system settings
- Lesson 1394 — Privileged Containers
- Key
- A unique identifier or name (like `user-photos/vacation-2024.
- Lesson 115 — Object Storage OverviewLesson 1363 — Defining Tolerations in Pod Specs
- Key advantage
- You need only **one** load balancer (managed by an Ingress Controller) to handle traffic for many services—saving cost and complexity.
- Lesson 1220 — Ingress vs Service Load Balancing
- Key authentication methods
- Lesson 1096 — GCP Registry Authentication and IAM
- Key capabilities include
- Lesson 2502 — API Gateway Integration Pattern
- Key characteristic
- You cannot delete or modify local routes—they're permanent and managed by the cloud provider.
- Lesson 181 — Default Routes and Local Routes
- Key characteristics
- Lesson 105 — GCP App Engine Standard and FlexibleLesson 400 — Storage Types for RDSLesson 418 — Read Replicas for ScalabilityLesson 1176 — StatefulSet FundamentalsLesson 1495 — System vs User Node PoolsLesson 1847 — Pipeline Artifacts and Artifact StoresLesson 2205 — Google Cloud Interconnect OptionsLesson 2438 — Database Failover Mechanisms (+1 more)
- Key Encryption Key (KEK)
- A master key that encrypts the DEK itself
- Lesson 2282 — Data Encryption Keys (DEK) and Key Encryption Keys (KEK)
- key exists
- , ignoring the value entirely.
- Lesson 1364 — Toleration Operators: Equal and ExistsLesson 2734 — Event Deduplication Strategies
- Key fields
- Lesson 1163 — Pod Template Specification
- Key insight
- Test with realistic payloads and traffic patterns—not just synthetic uniform load.
- Lesson 2554 — Performance Testing and Benchmarking
- Key Management System (KMS)
- is a centralized service that creates, stores, rotates, and controls access to **cryptographic keys** — the secret values used to encrypt and decrypt your data.
- Lesson 2280 — Introduction to Key Management Systems
- Key metrics to monitor
- Lesson 2818 — Migration Progress Tracking and Reporting
- Key Performance Indicators (KPIs)
- and **metrics**.
- Lesson 37 — Measuring Cloud Business Value: KPIs and Metrics
- Key ring-level
- Grants access to all keys within that ring
- Lesson 2319 — GCP Cloud KMS IAM and Permissions
- Key Rotation
- You can rotate KEKs without re-encrypting all your data—just re-encrypt the DEKs.
- Lesson 2282 — Data Encryption Keys (DEK) and Key Encryption Keys (KEK)
- Key UI sections
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Key Vault references
- in application settings (format: `@Microsoft.
- Lesson 2317 — Azure Key Vault Service Integration
- Key-level
- Grants access to a single specific key (most restrictive)
- Lesson 2319 — GCP Cloud KMS IAM and Permissions
- key-value pairs
- you attach to your VMs (and other cloud resources) to label them with meaningful information.
- Lesson 92 — VM Tagging and OrganizationLesson 1697 — Workflow File Structure and YAML Syntax
- Key-Value Stores
- Lesson 429 — NoSQL Database Categories and Use Cases
- Keys
- are unique identifiers for each object within a bucket.
- Lesson 141 — Objects, Buckets, and KeysLesson 743 — Resource Meta-Arguments: for_eachLesson 1263 — Declarative Secret ManifestsLesson 2242 — Azure Key Vault FundamentalsLesson 2318 — GCP Cloud KMS Structure and Key Rings
- Keyspaces
- are managed cloud services that offer Apache Cassandra-compatible databases without requiring you to install, patch, or maintain Cassandra clusters yourself.
- Lesson 443 — Keyspaces and Cassandra-Compatible Services
- Keyword fields
- for exact matches (IP addresses, status codes)
- Lesson 2019 — Elasticsearch Index Templates and Mappings
- Kibana Query Language (KQL)
- comes in—a simple, human-readable query syntax designed specifically for searching structured log data.
- Lesson 2030 — Kibana Query Language (KQL)
- Kill switches
- Automated triggers that halt experiments if critical metrics deteriorate
- Lesson 2493 — Blast Radius and Safety Controls
- Kind
- .
- Lesson 1119 — Resource Types and KindsLesson 1128 — Custom Resource Definitions (CRDs)Lesson 1147 — Creating Pods with YAML Manifests
- Kinesis Data Analytics
- for SQL-based stream processing.
- Lesson 2612 — Managed Streaming Services Overview
- Kinesis Data Firehose
- for loading streams into data lakes, and **Kinesis Data Analytics** for SQL-based stream processing.
- Lesson 2612 — Managed Streaming Services Overview
- Kinesis Data Streams
- for high-volume event streams
- Lesson 2511 — Stream Processing PatternLesson 2612 — Managed Streaming Services Overview
- Know Your Audience
- A CFO needs monthly trend summaries and budget variance.
- Lesson 2970 — Cost Dashboard Design
- Know Your Users
- Conduct interviews, surveys, and usage analysis.
- Lesson 2938 — Platform as a Product Mindset
- Known scenarios
- Tests what you already thought could go wrong
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Kong
- , **Ambassador**, or **Tyk** use standard configuration formats (YAML, CRDs) and can run on any Kubernetes cluster, regardless of cloud provider.
- Lesson 2772 — API Gateway Abstraction
- KQL (Kusto Query Language)
- Azure's equivalent to Kibana's KQL or Loki's LogQL.
- Lesson 2053 — Azure Monitor Logs
- kube-proxy
- Manages network rules on the node, enabling communication between Pods and external traffic
- Lesson 1108 — Worker Node Components IntroductionLesson 1469 — EKS Add-ons Overview
- KubeFed (Federation v2)
- Community project for declarative multi-cluster management
- Lesson 1514 — Cluster Federation Basics
- kubelet
- The node's primary agent that communicates with the API server, receives Pod specifications, and ensures containers are running as expected
- Lesson 1108 — Worker Node Components IntroductionLesson 1110 — Container Runtime IntegrationLesson 1254 — ConfigMap Volume Auto-Update with Mounted FilesLesson 1341 — OOMKilled and Memory PressureLesson 1445 — Metrics Server ArchitectureLesson 2049 — Kubernetes Logging Architecture
- Kubelet ↔ API Server
- Kubelets use certificates to register nodes and report status securely
- Lesson 1115 — Component Communication and Security
- Kubernetes
- or **Docker Swarm** become necessary.
- Lesson 1059 — Compose Best Practices and LimitationsLesson 1993 — Installing and Configuring Grafana
- Kubernetes API server
- (which you learned about in previous lessons).
- Lesson 1130 — What is kubectl and Its Role
- Kubernetes APIs
- and **cloud provider SDKs** to fetch live data.
- Lesson 2932 — Kubernetes and Cloud Resource Visualization
- Kubernetes clusters
- Pod status, deployments, services, ingress routes, resource utilization
- Lesson 2932 — Kubernetes and Cloud Resource Visualization
- Kubernetes RBAC enforcement
- Map Azure AD users/groups to Kubernetes roles
- Lesson 1498 — AKS Integration with Azure Active Directory
- Kubernetes StatefulSet
- running PostgreSQL or MySQL behaves identically on AWS EKS, Azure AKS, or Google GKE.
- Lesson 2770 — Database Abstraction Strategies
- Kubernetes-native
- Integrates seamlessly with the abstraction layer you've already built
- Lesson 2772 — API Gateway Abstraction
- Kubewarden
- offer more granular, customizable policy enforcement.
- Lesson 1400 — Migrating from PodSecurityPolicy
- Kustomization
- resource includes a `healthChecks` field where you specify which resources to monitor:
- Lesson 1926 — Flux Health Checks and Readiness
- Kustomize Controller
- is the applier for Kustomize overlays.
- Lesson 1932 — Flux Controller ArchitectureLesson 1934 — Kustomize ControllerLesson 1945 — Multi- Cluster Management with Flux
- KV v1
- is a single drawer where updating a document destroys the old version, while **KV v2** is a multi-drawer system that keeps historical copies of every document you file.
- Lesson 2261 — Key-Value Secrets Engine
- KV v2
- is a multi-drawer system that keeps historical copies of every document you file.
- Lesson 2261 — Key-Value Secrets Engine
- Kyverno
- (Kubernetes-native YAML policies)
- Lesson 1078 — Admission Controllers for Image PolicyLesson 1400 — Migrating from PodSecurityPolicy
L
- label selectors
- to identify which Pods they're responsible for managing.
- Lesson 1155 — ReplicaSet Purpose and ArchitectureLesson 1157 — Label Selectors in ReplicaSetsLesson 1164 — Deployment Selectors and LabelsLesson 1203 — Kubernetes Services OverviewLesson 1205 — Service Selectors and LabelsLesson 1236 — Pod Selection with LabelsLesson 1302 — Troubleshooting PV and PVC IssuesLesson 1352 — Pod Anti-Affinity Basics
- Label/tag injection
- at the source ensures every log entry carries immutable tenant context.
- Lesson 2058 — Multi-Tenancy and Log Isolation
- labels
- are `"aws_instance"` and `"web_server"`, and everything inside `{}` is the **body**.
- Lesson 726 — HCL Syntax FundamentalsLesson 980 — Image Manifest and MetadataLesson 1123 — Labels and SelectorsLesson 1139 — Filtering Resources with Labels and SelectorsLesson 1153 — Pod Labels and AnnotationsLesson 1163 — Pod Template SpecificationLesson 1164 — Deployment Selectors and LabelsLesson 1399 — Pod Security Admission Controller (+12 more)
- Labels on PersistentVolumes
- are key-value pairs you add to describe attributes:
- Lesson 1300 — Volume Selectors and Labels
- Lambda
- with provisioned concurrency eliminates them entirely.
- Lesson 517 — Cross-Provider Function ComparisonLesson 1813 — CodeDeploy: Deployment Automation OverviewLesson 1837 — CodeDeploy for Lambda and ECS
- Lambda authorizer
- is a function you write that API Gateway calls before routing requests.
- Lesson 544 — API Gateway Authorization Strategies
- Lambda authorizers
- (formerly custom authorizers) and **JWT authorizers**—both letting you enforce fine-grained access control before requests reach your backend.
- Lesson 544 — API Gateway Authorization Strategies
- Lambda function
- Either AWS-provided templates or custom code
- Lesson 2240 — AWS Secrets Manager Rotation
- Lambda Functions
- automatically send logs to CloudWatch Logs by default—every `print()` or `console.
- Lesson 2052 — AWS CloudWatch Logs IntegrationLesson 2240 — AWS Secrets Manager Rotation
- Lambda@Edge
- allows up to **30 seconds** execution time (viewer events) or **5 seconds** (origin events), supports up to **10GB memory**, **50MB** code packages, and runs Node.
- Lesson 615 — CloudFront Functions vs Lambda@Edge
- Language Agnostic
- Generate clients and servers in any supported language from the same `.
- Lesson 2572 — gRPC for High-Performance Communication
- Language Dependencies
- Lesson 1072 — Container Image Vulnerability Landscape
- Language independence
- A single sidecar implementation works across microservices written in Python, Java, Go, or any language.
- Lesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Language packages
- Maven (Java), npm (JavaScript), PyPI (Python), and more
- Lesson 1095 — Artifact Registry Multi-Format Support
- Large
- (15 GB RAM, 8 vCPUs): Complex builds, large codebases
- Lesson 1823 — CodeBuild Build Environments and Images
- Large dependency packages
- Deployment package limits make functions with massive libraries impractical
- Lesson 470 — FaaS Use Cases and Anti-Patterns
- Large Ecosystem
- Terraform has extensive community support, pre-built modules, and integrations that accelerate development.
- Lesson 723 — What is Terraform and Why Use It
- Large Relational Databases
- Running MySQL, PostgreSQL, or Oracle databases with huge active datasets.
- Lesson 68 — Memory Optimized Instance Types
- Larger storage footprints
- for incremental snapshots
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Largest scope, end-to-end validation
- Acceptance (or E2E) tests simulate real user workflows through your entire system.
- Lesson 1649 — Automated Testing in CI/CD
- Last resort: cross-region
- – Only route far away when necessary
- Lesson 1615 — Locality-Aware Load Balancing
- last-writer-wins
- conflict resolution based on timestamps.
- Lesson 435 — DynamoDB Global Tables for Multi-RegionLesson 2533 — DynamoDB Global Tables and Streams
- Late data
- Yesterday's events might arrive today
- Lesson 2604 — Event Time vs Processing TimeLesson 2606 — Watermarks and Late Data
- latency
- ).
- Lesson 10 — Edge Locations and Points of PresenceLesson 27 — Deployment Model Selection CriteriaLesson 119 — Storage Access Patterns and Workload TypesLesson 126 — Block Storage Performance MetricsLesson 155 — Object Storage Performance CharacteristicsLesson 265 — NLB Performance CharacteristicsLesson 446 — Database Performance Metrics and MonitoringLesson 535 — API Gateway Monitoring and Logs (+11 more)
- Latency increases
- Messages wait longer in queues before processing
- Lesson 2740 — Understanding Backpressure in Distributed Systems
- Latency matters
- Sub-millisecond response times are critical
- Lesson 2682 — In-Memory Caching Fundamentals
- Latency measurements
- between you and various edge locations
- Lesson 586 — CDN Request Flow and RoutingLesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Latency overhead
- Each proxy hop typically adds **1-5 milliseconds** of latency per request.
- Lesson 1573 — Service Mesh Performance Overhead
- Latency Penalty
- Lesson 1643 — Observability Performance Impact
- Latency spikes
- Sudden increases in p95 or p99 response times.
- Lesson 1642 — Alerting on Service Mesh MetricsLesson 2186 — DNS Query Logging and AnalysisLesson 2227 — Network Path Analysis and Traceroute
- Latency vs Consistency
- Synchronous cross-region replication ensures consistency but increases latency; asynchronous improves speed but means different regions see events at different times
- Lesson 2737 — Multi-Region Event Distribution
- Latency-sensitive applications
- – User-facing APIs notice the delay
- Lesson 463 — Cold Starts and Warm Starts
- Lateral movement
- One compromised secret enables attackers to access more systems
- Lesson 2237 — Introduction to Secrets Management in Cloud
- Launch hook
- – Pause between Pending and InService (install special software, register with external systems)
- Lesson 295 — Instance Lifecycle in Auto Scaling
- Launch Template or Configuration
- – The blueprint defining what kind of EC2 instances to create (instance type, AMI, security groups, etc.
- Lesson 313 — AWS Auto Scaling Groups (ASG) Overview
- Launch Templates
- over Launch Configurations — they're more flexible, versioned, and support modern Auto Scaling features like mixed instance policies.
- Lesson 314 — ASG Launch Templates and Configurations
- Launched During Failover
- Lesson 2432 — Pilot Light Pattern
- Lawfulness and Transparency
- You must have a legal basis (consent, contract, legitimate interest) to process data and clearly inform users what you're doing with their information.
- Lesson 2328 — GDPR Data Protection Requirements
- Layer 3/4 attacks
- the most common DDoS vectors that overwhelm network connections with massive traffic volumes.
- Lesson 2381 — AWS Shield Standard
- Layer 4
- (TCP/UDP), meaning it routes traffic based on IP addresses and ports.
- Lesson 1220 — Ingress vs Service Load Balancing
- Layer 4 (NLB)
- for ultra-low latency requirements, non-HTTP protocols, or extreme performance needs (gaming servers, IoT data streams, financial trading systems).
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Layer 4 (Transport Layer)
- load balancers make routing decisions based on basic network information like IP addresses and TCP/UDP ports.
- Lesson 234 — OSI Layer 4 vs Layer 7 Load BalancingLesson 263 — Layer 4 vs Layer 7 Load Balancing
- Layer 4 advantages
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Layer 4 capabilities
- Route TCP and SSL/TLS traffic based on IP and port
- Lesson 237 — Classic/Legacy Load Balancers
- Layer 7
- (HTTP/HTTPS), allowing you to route traffic based on URLs, hostnames, and paths.
- Lesson 1220 — Ingress vs Service Load Balancing
- Layer 7 (ALB)
- for web applications where you need intelligent routing, microservices architectures, or content- based decisions.
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Layer 7 (Application Layer)
- load balancers go deeper—they inspect the actual HTTP/HTTPS request content, including URLs, headers, and cookies, to make smarter routing decisions.
- Lesson 234 — OSI Layer 4 vs Layer 7 Load BalancingLesson 263 — Layer 4 vs Layer 7 Load Balancing
- Layer 7 advantages
- Lesson 263 — Layer 4 vs Layer 7 Load Balancing
- Layer 7 capabilities
- Perform basic HTTP/HTTPS routing and sticky sessions
- Lesson 237 — Classic/Legacy Load Balancers
- Layer digests
- The cryptographic hashes (SHA-256) identifying each layer in order
- Lesson 980 — Image Manifest and Metadata
- Layer in traffic management
- Introduce routing rules, retries, and timeouts only where needed
- Lesson 1601 — Service Mesh Adoption Patterns
- Layer Optimization
- Cloud providers let you extract common dependencies into separate layers shared across multiple functions.
- Lesson 2546 — Package Size Optimization
- Layer sharing
- Ten containers from the same image share the same base layers
- Lesson 976 — Union Filesystem Mechanics
- layers
- .
- Lesson 484 — Custom Runtimes and LayersLesson 977 — Layer Caching and ReuseLesson 1070 — Image Manifest and Layers
- Lazy Evaluation
- Only compute expensive attributes when a span is actually sampled.
- Lesson 2071 — Instrumentation Overhead
- Lazy Loading
- ) is a caching strategy where your application code is responsible for both reading from the cache and loading data into it.
- Lesson 2697 — Cache-Aside (Lazy Loading) Pattern
- LDAP/Active Directory
- – integrates with corporate directory services
- Lesson 1781 — Jenkins User Management and Security
- Leaky bucket
- Requests drain at a constant rate, smoothing bursts
- Lesson 2592 — Rate Limiting and Throttling
- Learning
- Understand how your configuration translates to actual infrastructure
- Lesson 698 — Planning and Preview
- Learning curve
- Declarative is simpler for beginners; Scripted requires Groovy knowledge
- Lesson 1783 — Declarative vs Scripted Pipeline Syntax
- Learning-focused
- Builds confidence and reveals emergent behaviors
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Lease ID
- A unique identifier for that specific secret instance
- Lesson 2265 — Vault Leases and Revocation
- Least connections
- Send traffic to the instance with fewest active connections
- Lesson 2457 — Load Distribution for AvailabilityLesson 2464 — Stateless HA Patterns: Load Balancing
- Least privilege
- means giving users, systems, or services *only* the permissions they absolutely need—nothing more.
- Lesson 212 — Least Privilege Network AccessLesson 335 — IAM Policies: The Language of PermissionsLesson 519 — Provider-Specific Security and IAMLesson 793 — Backend IAM and Access ControlLesson 1246 — NetworkPolicy Best PracticesLesson 2241 — AWS Secrets Manager IAM IntegrationLesson 2250 — Secrets Auditing and ComplianceLesson 2836 — Security by Design (+2 more)
- Least Privilege Networking
- Just as you grant minimal IAM permissions, you grant minimal network access.
- Lesson 2390 — Network Segmentation Fundamentals
- Least Privilege Principle
- means giving identities (users, groups, roles, or services) *only* the permissions they absolutely need to perform their job—and nothing extra.
- Lesson 368 — Least Privilege Principle
- Least Request
- Sends traffic to the instance currently handling the fewest active requests.
- Lesson 1569 — Load Balancing in Service Mesh
- Least-privilege
- Users access only specific applications they need, not entire network segments
- Lesson 2393 — Zero Trust Network Access (ZTNA)
- Leaves untouched
- any resources in the resource group that aren't mentioned in the template
- Lesson 901 — Template Deployment ModesLesson 912 — Deployment Modes: Complete vs Incremental
- legacy applications
- expecting a traditional file system
- Lesson 123 — Comparing Storage Types: When to Use WhatLesson 1016 — STOPSIGNAL: Graceful Shutdown
- legal holds
- indefinite locks that stay active until explicitly removed, useful during ongoing investigations.
- Lesson 167 — Object Lock and RetentionLesson 424 — Manual Snapshots and Retention
- Legal/Compliance Liaison
- Ensures regulatory requirements are met
- Lesson 2870 — Incident Response Planning
- Lenient settings
- (1 out of 1) catch problems quickly but may alert unnecessarily on transient spikes
- Lesson 642 — Alarm Evaluation Periods and Datapoints
- LessThan (<)
- Alarm when metric drops below threshold (e.
- Lesson 643 — Comparison Operators and Thresholds
- LessThanOrEqual (≤)
- Alarm when metric reaches or falls below threshold (e.
- Lesson 643 — Comparison Operators and Thresholds
- Level
- Which Pod Security Standard to apply (`privileged`, `baseline`, or `restricted`)
- Lesson 1399 — Pod Security Admission Controller
- Level-based filtering
- Only forward ERROR and WARN logs, drop DEBUG and INFO
- Lesson 1443 — Log Sampling and Filtering
- Leverage scheduled scaling
- If you know traffic patterns (like weekday business hours), use scheduled actions to scale down during predictable low-traffic periods—nights, weekends, holidays.
- Lesson 311 — Scaling for Cost Optimization
- Leverage spot instances
- for fault-tolerant workloads—they cost up to 90% less than regular VMs but can be evicted.
- Lesson 1504 — AKS Cost Management and Cluster Sizing
- Leverage variables
- Instead of creating separate dashboards for each environment, use template variables to filter dynamically.
- Lesson 2003 — Grafana Best Practices and Performance
- License databases
- to identify incompatible or restricted licenses
- Lesson 1679 — Artifact Security Scanning
- Licensing
- Operating systems, databases, middleware, support contracts
- Lesson 2799 — TCO Analysis for Migration
- Licensing constraints
- require per-socket or per-core licensing (some Oracle or Windows licenses)
- Lesson 108 — GCP Sole-Tenant Nodes
- Lifecycle
- They start together, stop together, and are scheduled on the same node.
- Lesson 1148 — Multi-Container Pods
- Lifecycle automation
- Create lifecycle policies that target specific tags.
- Lesson 169 — Object Tagging and MetadataLesson 2422 — Cloud-Native Backup Services Overview
- Lifecycle differences
- Lesson 748 — Data Source Block Syntax
- Lifecycle hooks
- pause the instance at key transition points, giving you time to perform custom actions:
- Lesson 295 — Instance Lifecycle in Auto ScalingLesson 318 — ASG Lifecycle HooksLesson 1834 — CodeDeploy Lifecycle Hooks
- Lifecycle Independence
- A PV's lifecycle is decoupled from Pods.
- Lesson 1289 — PersistentVolume (PV) Fundamentals
- Lifecycle policies
- let you automatically:
- Lesson 157 — Versioning Lifecycle and MFA DeleteLesson 998 — Image Retention and Cleanup PoliciesLesson 1086 — AWS ECR FundamentalsLesson 2156 — Storage Lifecycle and TieringLesson 2426 — Cross-Region and Cross-Account BackupLesson 2431 — Backup Automation and OrchestrationLesson 2669 — Serverless Query Engine Security
- Lifecycle Transitions
- Job changes trigger automatic access adjustments—promotions grant new permissions while revoking old ones; transfers move users between security groups; leave-of-absence temporarily suspends accounts.
- Lesson 2857 — Identity Governance and Lifecycle
- Lift and Shift
- uses `terraform import` to quickly move resources into state, then iteratively improve the configuration quality.
- Lesson 844 — Migration Strategies for Legacy Infrastructure
- Lighter control plane
- Fewer components mean less resource overhead and simpler operations
- Lesson 1596 — Open Service Mesh (OSM) Basics
- Lightweight
- Unlike virtual machines that require a full operating system, containers share the host OS kernel, making them much smaller and faster to start
- Lesson 960 — What Are Containers?Lesson 961 — Containers vs Virtual Machines
- Lightweight Transformations
- Resize images, modify headers, or rewrite URLs on-the-fly
- Lesson 610 — Edge Computing Concepts and Use Cases
- Like CloudFormation and ARM
- Native to its cloud platform, deeply integrated with GCP services
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Likelihood
- Low, medium, or high probability of occurrence
- Lesson 2803 — Risk Assessment and Mitigation
- Limit blast radius
- if one zone is compromised, attackers can't freely move laterally
- Lesson 2841 — Security Boundaries and Trust Zones
- Limit history depth
- Configure `--history-max` to prevent unbounded revision storage
- Lesson 1556 — Helm Rollback Strategies
- Limit panel count
- Aim for 10-20 panels per dashboard.
- Lesson 2003 — Grafana Best Practices and Performance
- Limit partition count
- Too many tiny partitions (thousands per query) create overhead.
- Lesson 2661 — Athena Partitioning Strategies
- Limit Time Ranges
- Longer range vectors require more data processing.
- Lesson 1976 — Query Optimization and Best Practices
- Limit Your Palette
- Too many colors create cognitive overload.
- Lesson 2105 — Color Theory and Accessibility
- Limitation
- You can't run `kubectl create` twice on the same resource—it will error because the resource already exists.
- Lesson 1135 — Creating Resources with kubectl create and applyLesson 1496 — AKS Networking Models: kubenet vs Azure CNILesson 2090 — Jaeger Deployment ModelsLesson 2644 — AWS Glue Job Types and Execution
- Limitations
- Lesson 314 — ASG Launch Templates and ConfigurationsLesson 2066 — Sampling StrategiesLesson 2075 — Instrumentation Types: Automatic vs ManualLesson 2725 — Provider-Specific Queue Services
- Limited features
- Basic health checks, simple routing (no content-based rules)
- Lesson 237 — Classic/Legacy Load Balancers
- LimitRange
- acts like a safety net and helper combined—it enforces minimum/maximum resource boundaries *and* automatically fills in missing values when pods don't specify requests or limits.
- Lesson 1338 — LimitRange Objects
- Limits
- Bypass the template size limit by splitting across multiple files
- Lesson 881 — Nested StacksLesson 1329 — Understanding Resource Requests and LimitsLesson 1335 — Setting Memory LimitsLesson 2984 — Container Cost Optimization
- Line charts
- for metrics over time (error rates, request counts)
- Lesson 2028 — Kibana Dashboard Creation
- Line graphs
- show trends over time (CPU utilization across the day)
- Lesson 673 — CloudWatch DashboardsLesson 2103 — Visualization Types and Best Practices
- Lineage
- Visualize data flow from source to destination through pipelines
- Lesson 2637 — Data Catalog and Metadata Management
- Linear
- Gradually increase traffic in equal increments
- Lesson 1835 — Blue/Green Deployments with CodeDeploy
- Linear Pipeline Pattern
- , where each stage executes sequentially—one completes before the next begins.
- Lesson 1658 — Parallel Execution Pattern
- Linked templates
- let you call one ARM template from another using a special `Microsoft.
- Lesson 907 — Linked Templates and Template NestingLesson 916 — Outputs and Cross-Template Communication
- Linkerd
- prioritizes simplicity with fewer moving parts and a smaller API surface.
- Lesson 1592 — Linkerd vs Istio: Key DifferencesLesson 2769 — Service Mesh for Portability
- Linting
- Does your code follow style and naming conventions?
- Lesson 721 — Continuous Integration for IaC
- Linux (Snap)
- Lesson 1523 — Installing Helm CLI
- Linux hosts
- (not Windows or Mac Docker Desktop in certain configurations), and you must set size limits to prevent consuming all system memory.
- Lesson 1039 — tmpfs Mounts
- list
- is like a numbered grocery list—an ordered collection of items you access by position.
- Lesson 734 — Lists and Maps in HCLLesson 1380 — Creating a Basic RoleLesson 2242 — Azure Key Vault FundamentalsLesson 2245 — GCP Secret Manager Fundamentals
- List all volumes
- Lesson 1036 — Creating and Managing Volumes
- List Generator
- Define explicit values (e.
- Lesson 1903 — ApplicationSets for Multi-EnvironmentLesson 1907 — ApplicationSets for Dynamic Applications
- LIST operation
- shows what objects exist in a bucket, often with a prefix filter to narrow results (remember: folders are simulated).
- Lesson 153 — Basic Object Operations
- listener
- is a process that monitors a specific port and protocol combination on your load balancer.
- Lesson 243 — Load Balancer Listeners and RulesLesson 246 — ALB Listeners and Rules
- Listing Availability Zones
- Lesson 749 — Common Data Source Patterns
- lists
- when order matters or you have similar items without meaningful names—like multiple subnet IDs or availability zones.
- Lesson 734 — Lists and Maps in HCLLesson 757 — Variable Types: Complex TypesLesson 1697 — Workflow File Structure and YAML SyntaxLesson 2684 — Redis Architecture and Data Structures
- Live code editing
- Mount your source code directory so changes reflect instantly without rebuilding images
- Lesson 1038 — Bind Mounts
- liveness probes
- , check the application's core loop:
- Lesson 1427 — Designing Effective Health Check EndpointsLesson 1429 — Health Checks and Rolling Updates
- load balancer
- is a service that sits between your users and your backend servers.
- Lesson 231 — What is Load Balancing?Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) FundamentalsLesson 521 — API Gateway vs Load BalancerLesson 1802 — Jenkins High Availability ArchitectureLesson 2464 — Stateless HA Patterns: Load BalancingLesson 2575 — Service Discovery Patterns
- Load balancer health checks
- Are services correctly registered and receiving traffic?
- Lesson 2908 — Application Recovery Testing
- Load balancer integration
- Optional traffic routing during deployments
- Lesson 1832 — CodeDeploy Application and Deployment Groups
- Load balancer misconfigurations
- Verify security groups allow health check traffic
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Load Balancer Probes
- If your VMSS is behind a load balancer, those health checks (pinging specific endpoints) signal VMSS about instance health.
- Lesson 324 — VMSS Health Monitoring and Automatic Repairs
- Load balancer upgrades
- Swapping legacy load balancers for cloud-native ALBs or Application Gateways
- Lesson 2793 — Replatform Strategy
- Load balancing
- to distribute traffic across instances
- Lesson 96 — AWS Elastic Beanstalk IntroductionLesson 103 — GCP Instance Groups and TemplatesLesson 572 — Point-to-Point Queue PatternLesson 1059 — Compose Best Practices and LimitationsLesson 1203 — Kubernetes Services OverviewLesson 1564 — What is a Service Mesh?Lesson 1566 — The Sidecar Proxy PatternLesson 1578 — Istio Data Plane and Envoy Proxies (+2 more)
- Load balancing algorithms
- are the decision-making strategies that determine this distribution.
- Lesson 1614 — Load Balancing Algorithms
- Load Balancing Built-In
- Lesson 107 — Azure VM Scale Sets Introduction
- Load balancing policies
- (round-robin, least-connections)
- Lesson 1603 — Virtual Services and Destination Rules
- Load distribution
- Multiple workers processing tasks from a shared pool
- Lesson 551 — Queue vs Topic PatternLesson 1057 — Scaling Services with ComposeLesson 2464 — Stateless HA Patterns: Load BalancingLesson 2475 — Database Replication FundamentalsLesson 2720 — Competing Consumers Pattern
- Load Testing
- simulates typical usage patterns with expected concurrent users and transaction volumes.
- Lesson 459 — Performance Testing and BenchmarkingLesson 2554 — Performance Testing and Benchmarking
- LoadBalancer Service
- provisions a cloud load balancer (like AWS ELB or GCP Load Balancer) for each Service.
- Lesson 1220 — Ingress vs Service Load Balancing
- local route
- that allows traffic to flow between all subnets in the same VPC.
- Lesson 180 — Route Tables BasicsLesson 181 — Default Routes and Local Routes
- Local Secondary Index
- shares the same partition key as your base table but uses a *different sort key*.
- Lesson 433 — DynamoDB Secondary Indexes: GSI and LSI
- local state storage
- the default behavior where your state file lives on your computer's filesystem, right alongside your `.
- Lesson 776 — Local State StorageLesson 777 — State Locking Fundamentals
- Local testing
- Access a microservice directly without external routing
- Lesson 1142 — kubectl port-forward for Local Access
- Locality-Aware
- Prefers instances in the same availability zone or region to reduce latency and cross-zone transfer costs.
- Lesson 1569 — Load Balancing in Service Mesh
- Locality-aware load balancing
- is a traffic management feature that prioritizes routing requests to service instances in the same zone or region as the caller before attempting more distant locations.
- Lesson 1615 — Locality-Aware Load Balancing
- location
- (regional or multi-regional).
- Lesson 2318 — GCP Cloud KMS Structure and Key RingsLesson 2399 — Context-Aware Access ControlsLesson 2848 — Continuous Verification and Contextual Access
- Location-aware policies
- Restrict actions based on source IP or region
- Lesson 367 — Policy Variables and Dynamic Policies
- Lock down production networking
- (VPCs, subnets, security groups)
- Lesson 856 — Stack Policies for Update Protection
- Log access
- Make container logs immediately available on the host for debugging
- Lesson 1038 — Bind Mounts
- Log Aggregation
- centralizes Jenkins master logs, agent logs, and build logs into a searchable repository.
- Lesson 1807 — Monitoring and Alerting for JenkinsLesson 2861 — Security Information and Event Management (SIEM)
- log aggregation architecture
- works similarly, transforming scattered log chaos into organized, queryable insights through four core components working in harmony.
- Lesson 2005 — Log Aggregation ArchitectureLesson 2011 — Log Indexing Fundamentals
- log aggregation backend
- a centralized system designed to receive, index, store, and query massive volumes of logs from across your entire cluster.
- Lesson 1439 — Log Aggregation BackendsLesson 1441 — Multi-Line Log Handling
- Log analysis
- Querying application or infrastructure logs stored as files
- Lesson 2656 — Serverless Query Engine Overview
- Log Analytics agent
- (formerly called MMA) or the newer **Azure Monitor Agent** (AMA).
- Lesson 2053 — Azure Monitor Logs
- Log Analytics workspace
- is a centralized repository in Azure where all your logs and performance data are stored and analyzed.
- Lesson 676 — Azure Log Analytics WorkspacesLesson 2053 — Azure Monitor Logs
- log collection agents
- come in.
- Lesson 658 — Log Collection AgentsLesson 659 — Log Streaming vs Log Shipping
- Log collectors
- Gathering logs from every node (like Fluentd or Logstash agents)
- Lesson 1185 — DaemonSet Fundamentals
- Log correlation
- means connecting related log entries that belong to the same logical operation, even when they're written by different services at different times.
- Lesson 2012 — Log Correlation and Context
- Log Destination Setup
- Lesson 2351 — Enabling and Configuring Audit Logs
- Log Explorer
- is the interactive interface for searching and analyzing your logs.
- Lesson 681 — Cloud Logging in GCP
- Log File Validation
- involves generating and storing cryptographic hashes (like SHA-256) of log entries.
- Lesson 2357 — Audit Log Integrity and Validation
- Log indexing
- is the process of creating data structures that act like a book's index—allowing you to jump directly to relevant logs instead of reading every line.
- Lesson 2011 — Log Indexing Fundamentals
- Log levels
- are standard categories that classify how urgent or significant a log entry is—like labeling emails as "urgent," "normal," or "FYI.
- Lesson 653 — Log Levels and Severity
- Log parsing
- means breaking those raw strings into individual fields (like timestamp, severity, user ID, or error message).
- Lesson 660 — Log Parsing and Enrichment
- Log processing
- applications ingesting terabytes of data daily
- Lesson 69 — Storage Optimized Instance Types
- Log shipping
- collects logs locally and sends them in batches at regular intervals (every 5 minutes, hourly, etc.
- Lesson 659 — Log Streaming vs Log ShippingLesson 2429 — Continuous Data Protection (CDP)
- Log sinks
- are routing rules that tell the log router where to send logs.
- Lesson 681 — Cloud Logging in GCP
- Log streaming
- sends log data in real-time, as events occur.
- Lesson 659 — Log Streaming vs Log Shipping
- Log volume per day
- = average log entry size × entries per day
- Lesson 656 — Log Retention and Storage Requirements
- Log-based metrics
- let you turn log patterns into measurable numbers—like counting how many times "ERROR" appears per minute, or tracking the percentage of requests that contain "authentication failed.
- Lesson 667 — Log-Based Metrics and Alerting
- Logging
- Enable comprehensive audit logging (CloudTrail, Azure Monitor) with immutable storage
- Lesson 2326 — PCI DSS for Payment Card DataLesson 2774 — Observability Portability
- Logging and Debugging
- Many logging frameworks and error handlers automatically capture environment variables during crashes or debugging sessions, potentially exposing secrets in logs you never intended to persist.
- Lesson 2270 — Environment Variables for Secrets
- Logging and monitoring
- of suspicious patterns for audit trails
- Lesson 2364 — What is a Web Application Firewall (WAF)
- Logging Levels
- Lesson 1588 — Istio Proxy Configuration
- Logging sidecars
- Collect and ship logs to centralized systems
- Lesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Logic testing
- goes deeper: it simulates real authorization requests using the policy evaluation logic you learned earlier.
- Lesson 371 — Policy Validation and Testing
- Logical grouping
- – Related steps stay together, making pipelines easier to understand and modify
- Lesson 1786 — Stages and Steps OrganizationLesson 1913 — App of Apps Pattern
- Logical Replication
- Most database systems support logical replication, which captures changes at the transaction level and replays them on target databases.
- Lesson 2787 — Cross-Cloud Database Replication
- Logs
- Timestamped records of discrete events (errors, user actions, system changes).
- Lesson 49 — Observability and Monitoring ArchitectureLesson 489 — Function Logging and Execution InsightsLesson 520 — What is an API Gateway?Lesson 674 — Azure Monitor OverviewLesson 1570 — Service Mesh Observability Benefits
- Logs Explorer
- , where you can filter by resource type, severity, timestamp, or custom fields.
- Lesson 2054 — Google Cloud Logging (Operations)
- Logs in context
- eliminates this friction by automatically linking logs directly to traces and infrastructure metrics in a single view.
- Lesson 2044 — New Relic Logs in Context
- Logstash
- runs on the JVM (Java Virtual Machine), requiring significantly more resources—often 500 MB to 1 GB+ of memory even for simple pipelines.
- Lesson 2025 — Fluentd vs Logstash Trade-offs
- Long polling
- is like waiting at your mailbox for up to, say, 20 seconds.
- Lesson 564 — Long Polling vs Short PollingLesson 2717 — Batch Operations in Queues
- Long retention (weeks)
- For audit trails or scenarios where messages might need extended processing windows
- Lesson 565 — Message Retention and Expiration
- Long-lived feature branches
- They accumulate merge debt and delay integration problems until it's painful.
- Lesson 1656 — CI/CD Best Practices and Anti-patterns
- Long-running analysis jobs
- Pause expensive computations overnight, pay nothing while hibernated, resume instantly in the morning
- Lesson 88 — VM Hibernation
- Long-running processes
- Jobs exceeding function timeout limits (remember those 15-minute constraints?
- Lesson 470 — FaaS Use Cases and Anti-PatternsLesson 2568 — Hybrid Microservice Deployments
- Longer cold starts
- – more time extracting and loading dependencies
- Lesson 485 — Function Packaging and Deployment Size
- Longer TTL (3600s+)
- Allows time to inspect logs and debug issues
- Lesson 1194 — Job TTL and Automatic Cleanup
- Loose Coupling
- Lesson 38 — Understanding Cloud Architecture FundamentalsLesson 41 — Loose Coupling and Service IndependenceLesson 42 — Stateless Application DesignLesson 43 — Designing for Failure and Fault ToleranceLesson 2578 — Event-Driven Communication
- Loose coupling between
- – minimal dependencies across boundaries
- Lesson 2560 — Service Boundaries and Decomposition
- Low (0.1–3.9)
- Minor issues with limited exploitability or impact
- Lesson 1075 — Vulnerability Severity and Prioritization
- Low hit ratio
- Review cache keys, expiration times, or cache-warming strategies
- Lesson 2695 — Cache Monitoring and Performance Metrics
- Low IOPS (hundreds)
- Fine for development or infrequently accessed databases
- Lesson 454 — Database Storage Performance
- Low Latency
- Because blocks are accessed directly by address, block storage delivers **high IOPS** and low latency—perfect for performance-sensitive applications.
- Lesson 113 — Block Storage OverviewLesson 435 — DynamoDB Global Tables for Multi-RegionLesson 441 — Cloud Bigtable for Wide-Column StorageLesson 2225 — Network Performance Metrics and MeasurementLesson 2511 — Stream Processing Pattern
- Low latency access
- – ideal for databases and transactional applications
- Lesson 125 — Block Storage vs Other Storage Types
- Low risk
- Test new projects without major upfront commitments
- Lesson 30 — Pay-as-You-Go Pricing Model Fundamentals
- Low-latency requirements
- Cold starts introduce unpredictable latency that real-time applications can't tolerate
- Lesson 470 — FaaS Use Cases and Anti-Patterns
- Low-latency tolerance
- applications where adding 2ms to a 200ms request is negligible
- Lesson 1573 — Service Mesh Performance Overhead
- Low-performing paths
- URLs with poor hit rates may need better caching headers
- Lesson 2680 — CDN Cache Analytics and Hit Rates
- Low-Risk Services
- Move to production namespaces with low-traffic or non-critical services
- Lesson 1601 — Service Mesh Adoption Patterns
- Low-traffic internal services
- with straightforward communication patterns
- Lesson 1575 — Service Mesh Adoption Strategies
- Lower `maxUnavailable`
- Fewer Pods go down at once → better availability, slower updates
- Lesson 1167 — Rolling Update Strategy
- Lower bandwidth costs
- Origin sends each file once per edge location, not once per user
- Lesson 584 — Origin Servers and Edge CachingLesson 585 — Cache Hit vs Cache Miss
- Lower barriers to entry
- Start small without massive upfront investment
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud Computing
- Lower billing
- Fewer invocations = lower costs in most FaaS pricing models
- Lesson 502 — Batch Processing Pattern
- Lower bound
- Alert when metric drops below minimum (available memory < 1GB)
- Lesson 641 — Threshold-Based Alarms
- Lower complexity
- in failover logic—just route to healthy instances
- Lesson 2462 — Stateless Services and Horizontal Scaling
- Lower costs
- – no need to buy your own servers
- Lesson 20 — Public Cloud Deployment ModelLesson 558 — SNS Message FilteringLesson 2622 — Batch Data PartitioningLesson 2836 — Security by Design
- Lower CPU utilization
- The network adapter handles more work, freeing your CPU for application tasks
- Lesson 2231 — Enhanced Networking and SR-IOV
- Lower data transfer costs
- AWS charges less for data transferred via Direct Connect than over the internet
- Lesson 2212 — AWS Direct Connect Fundamentals
- Lower initial risk
- Since you're not changing application code, there's less chance of introducing bugs or compatibility issues.
- Lesson 2792 — Rehost (Lift-and-Shift) Strategy
- Lower latency
- simple forwarding decisions
- Lesson 263 — Layer 4 vs Layer 7 Load BalancingLesson 273 — Global Load Balancing and DNS-Based RoutingLesson 280 — Cross-Zone and Cross-Region Load BalancingLesson 526 — HTTP API vs REST APILesson 1592 — Linkerd vs Istio: Key DifferencesLesson 1615 — Locality-Aware Load BalancingLesson 2211 — Private Connectivity OverviewLesson 2230 — Network Placement Groups (+2 more)
- Lower latency access
- – Users in distant locations can read from a nearby replica
- Lesson 160 — Cross-Region Replication Basics
- Lower operational overhead
- Fewer infrastructure pieces to manage and patch
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- Lower Origin Load
- Your origin servers handle fewer requests since the CDN absorbs most traffic.
- Lesson 582 — What is a CDN and Why Use One
- Lower parallelism
- when hitting provider API rate limits
- Lesson 839 — Parallel Execution and Performance
- Lower runner costs
- Less compute time means lower GitHub Actions usage
- Lesson 1719 — Caching Dependencies and Build Artifacts
- Lowering bandwidth costs
- No cross-region data transfer fees when pulling local replicas
- Lesson 1093 — ACR Geo-Replication
- Lowest-price
- Cheapest option but higher interruption risk
- Lesson 2978 — Spot Instance Fleet Management
- LSI
- when you need different sorting within the same partition.
- Lesson 433 — DynamoDB Secondary Indexes: GSI and LSI
M
- Machine learning
- Training models on historical datasets
- Lesson 2614 — Batch Processing FundamentalsLesson 2863 — Azure Security Center and Sentinel
- Machine learning inference
- (making predictions with trained models)
- Lesson 67 — Compute Optimized Instance Types
- Machine learning models
- analyze your historical billing data to understand patterns:
- Lesson 2987 — Cost Anomaly Detection Systems
- Magnetic/HDD storage
- Slowest option, lowest cost, only for archival or rarely-accessed data
- Lesson 454 — Database Storage Performance
- Maintain existing keys
- created in on-premises HSMs without re-encrypting data
- Lesson 2293 — Key Import and External Key Stores
- Maintain legacy systems
- in private infrastructure while modernizing with public cloud services
- Lesson 22 — Hybrid Cloud Deployment Model
- Maintainability
- Fix bugs in one place
- Lesson 711 — Code Organization and Module StructureLesson 907 — Linked Templates and Template NestingLesson 1386 — Aggregated ClusterRoles
- Maintaining stateful connections
- between clients and backend services
- Lesson 525 — WebSocket API Support
- Maintenance mode
- `kubectl taint nodes worker-03 maintenance=true:NoExecute` (evicts running pods immediately)
- Lesson 1362 — Applying Taints to Nodes
- Maintenance operations
- – Planned updates that require instance restart
- Lesson 416 — Multi-AZ Failover Process
- Maintenance schedules
- Plan proactive maintenance before expected failures
- Lesson 2413 — Mean Time Between Failures (MTBF)
- maintenance windows
- in advance—specific time periods when they'll perform updates.
- Lesson 91 — VM Maintenance and UpdatesLesson 413 — Maintenance Windows and UpdatesLesson 648 — Alarm Suppression and Maintenance WindowsLesson 1501 — AKS Cluster Upgrades and MaintenanceLesson 1898 — Sync WindowsLesson 1942 — Flux Reconciliation Control
- MAJOR
- (1.
- Lesson 811 — Module Versioning Best PracticesLesson 843 — Module Registry and VersioningLesson 1532 — Helm Versioning and Chart VersionsLesson 1549 — Chart Packaging and VersioningLesson 1673 — Artifact Versioning Strategies
- Major upgrades
- may take longer and require testing first, so you typically trigger them manually after validating compatibility.
- Lesson 413 — Maintenance Windows and Updates
- Major version upgrades
- Manual control over big jumps (like PostgreSQL 13 → 14)
- Lesson 413 — Maintenance Windows and Updates
- Make every alarm actionable
- Each alert should answer: "What do I do about this?
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Make operations naturally idempotent
- Some operations are inherently safe to repeat—like setting a value to a specific state (`SET status = 'complete'`) rather than incrementing it (`clicks = clicks + 1`).
- Lesson 503 — Idempotency in Functions
- Malware scanning
- examines images for known malicious code, trojans, or backdoors that might have been introduced through compromised base images or dependencies.
- Lesson 1083 — Malware and Secret Scanning
- Manage configuration changes
- over time through your code
- Lesson 753 — When to Use Resources vs Data Sources
- Manage lifecycle
- Monitor health, apply updates, and scale runner pools as needed
- Lesson 1720 — Self-Hosted Runners
- Managed caching
- Replacing self-hosted Redis with ElastiCache or Azure Cache
- Lesson 2793 — Replatform Strategy
- Managed database services
- Migrating from self-managed MySQL to Amazon RDS or Azure Database for MySQL
- Lesson 2793 — Replatform Strategy
- Managed identities
- are Azure's solution: they give your Azure resources (like Virtual Machines, App Services, or Functions) an automatic identity in Azure Active Directory.
- Lesson 389 — Azure Managed IdentitiesLesson 519 — Provider-Specific Security and IAMLesson 1283 — Azure Key Vault IntegrationLesson 2243 — Azure Key Vault Access Policies and RBACLesson 2315 — Azure Key Vault Access Policies and RBACLesson 2317 — Azure Key Vault Service Integration
- Managed Identity
- lets your virtual machines or services authenticate *without storing credentials*.
- Lesson 788 — Azure Storage Backend SetupLesson 909 — Deployment Scripts in ARM TemplatesLesson 2259 — Cloud Provider Auth MethodsLesson 2317 — Azure Key Vault Service Integration
- Managed infrastructure
- No servers to patch or scale
- Lesson 1812 — CodeBuild: Managed Build Service Overview
- managed instance group (MIG)
- uses your template to create and manage a collection of identical VMs.
- Lesson 103 — GCP Instance Groups and TemplatesLesson 326 — GCP Managed Instance Groups (MIG) Overview
- Managed Node Groups
- are AWS-operated EC2 instances that EKS provisions, updates, and terminates for you.
- Lesson 1464 — EKS Node Groups: Managed vs Self-ManagedLesson 1471 — EKS Cluster Upgrades
- Managed relational database services
- (like AWS RDS, Azure SQL Database, or Google Cloud SQL) are databases provided as a service by your cloud provider.
- Lesson 396 — Introduction to Managed Relational Databases
- Managed rule groups
- are pre-built, vendor-maintained collections (from AWS or marketplace sellers) that protect against common threats like SQL injection, cross-site scripting, or bot traffic.
- Lesson 2369 — AWS WAF Rules and Rule Groups
- Managed Service Enhancements
- Cloud providers add IAM integration (AWS), Azure AD authentication, and VPC peering to strengthen access control beyond basic passwords.
- Lesson 2696 — Cache Security and Access Control
- Managed services
- like AWS API Gateway, Azure API Management, or Google Cloud Armor can handle this coordination automatically without requiring you to manage Redis clusters.
- Lesson 2747 — Distributed Rate Limiting
- Managed session services
- Cloud-native services specifically designed for session management
- Lesson 2468 — State Externalization Patterns
- Management (Control) Plane
- Administrative actions that *configure* resources
- Lesson 2352 — Management vs Data Event Logging
- Management and monitoring tools
- Lesson 2799 — TCO Analysis for Migration
- Management Groups
- – The top level, containing multiple subscriptions.
- Lesson 386 — Azure RBAC FundamentalsLesson 2147 — Multi-Account Cost Consolidation
- Management Zone
- Administrative tools isolated from production traffic
- Lesson 2840 — Network Segmentation ArchitectureLesson 2841 — Security Boundaries and Trust Zones
- Manages
- the lifecycle of resources on that platform
- Lesson 724 — Installing Terraform and Provider Basics
- Manages the keys separately
- , often using envelope encryption where the DEK itself is encrypted by a Key Encryption Key (KEK)
- Lesson 2297 — Client-Side Encryption
- Managing connection lifecycle
- (connect, message, disconnect events)
- Lesson 525 — WebSocket API Support
- Managing Variables
- The `/projects/:id/variables` endpoint allows you to create, update, or delete CI/CD variables programmatically—useful when credentials rotate or configurations change.
- Lesson 1769 — GitLab CI API and Automation
- Mandatory vs. Optional Tags
- Lesson 2963 — Tagging Strategy for Cost Allocation
- manifest
- a detailed snapshot of what was deployed at that moment.
- Lesson 944 — Viewing Manifests and Deployment StateLesson 1070 — Image Manifest and Layers
- Manifest Generation
- CI pipeline runs scripts (using tools like `kustomize`, `helm template`, or custom scripts) to generate Kubernetes manifests with the correct image tags, environment-specific values, and configuration
- Lesson 1876 — GitOps Workflow Automation
- manifest list
- (also called an "image index") is a special pointer that sits above individual architecture-specific images.
- Lesson 984 — Multi-Architecture ImagesLesson 996 — Multi-Architecture Images
- Manifests
- are read-only snapshots created after each deployment.
- Lesson 936 — Deployment Manager Architecture and ComponentsLesson 1070 — Image Manifest and Layers
- Manual
- means Azure won't touch your running instances automatically.
- Lesson 323 — VMSS Upgrade Policies and Rolling UpdatesLesson 1773 — Jenkins Jobs and Build TriggersLesson 2065 — Instrumentation Types
- manual approval gate
- is a deliberate pause point in your automated pipeline where execution stops until a human reviewer explicitly gives permission to continue.
- Lesson 1662 — Manual Approval GatesLesson 1725 — Deployment Strategies and Blue-Green Patterns
- Manual Approval Gates
- (which pause before deploying) by adding automated safety checks *after* deployment.
- Lesson 1663 — Rollback and Recovery PatternsLesson 1725 — Deployment Strategies and Blue-Green Patterns
- Manual cleanup
- Use build steps to remove unnecessary files with shell commands
- Lesson 1780 — Workspace Management and Build Artifacts
- Manual entry
- You click a timestamp and add a description
- Lesson 2000 — Annotations and Time Range Controls
- Manual injection
- uses the `istioctl kube-inject` command to modify your deployment YAML before applying it to the cluster.
- Lesson 1579 — Sidecar Injection Mechanisms
- Manual intervention
- Flag for human review when automatic compensation isn't possible
- Lesson 2735 — Compensating Transactions
- Manual jobs
- require a human to click "Play" in the GitLab interface before they run—perfect for approval gates before production releases.
- Lesson 1753 — Manual and Delayed Jobs
- Manual re-run
- Trigger a workflow again from the UI even if it succeeded
- Lesson 1696 — Workflow Run History and Re-runs
- Manual rotation
- requires you to explicitly create a new key, update references in your applications, re-encrypt data (if needed), and eventually disable old keys.
- Lesson 2287 — Key Rotation FundamentalsLesson 2304 — Encryption Key Rotation Strategies
- Manual scaling
- works for predictable, infrequent changes — like adding capacity before a scheduled sale event.
- Lesson 287 — Auto Scaling vs Manual Scaling
- Manual suppression
- Disable specific alarms before starting work, re-enable after
- Lesson 648 — Alarm Suppression and Maintenance Windows
- map
- is like a dictionary—a collection of key-value pairs where you look up values by their descriptive names.
- Lesson 734 — Lists and Maps in HCLLesson 2521 — Parallel and Map States
- Map state
- iterates over an array and processes each item in parallel (within concurrency limits).
- Lesson 2521 — Parallel and Map States
- Map to cloud constructs
- Translate to actual service properties
- Lesson 2337 — Compliance Requirements Translation
- Map to IT systems
- Which applications, databases, and services support each process?
- Lesson 2410 — Business Impact Analysis (BIA)
- Map-reduce operations
- Parallel computation followed by result merging
- Lesson 2503 — Fan-Out/Fan-In Pattern
- mapping templates
- written in templating languages (like Velocity Template Language in AWS).
- Lesson 529 — Request and Response MappingLesson 537 — Request and Response TransformationLesson 2538 — API Gateway with Database Integration
- Mappings section
- in CloudFormation lets you define a two-level lookup table of static values.
- Lesson 870 — Mappings Section
- maps
- when you need descriptive labels—like environment-specific settings or tag values.
- Lesson 734 — Lists and Maps in HCLLesson 757 — Variable Types: Complex Types
- Maps dependencies
- – which apps talk to which databases, which services depend on which infrastructure
- Lesson 2797 — Migration Assessment Framework
- Mark it
- on your diagram (often with a red icon or highlight)
- Lesson 2450 — Single Points of Failure Identification
- Mark rooms as "deprecated"
- (soft deletes) — forward compatible; new data doesn't require old fields
- Lesson 2638 — Schema Evolution and Versioning
- Market Internally
- Developers won't use what they don't understand.
- Lesson 2938 — Platform as a Product Mindset
- Marketing analytics
- Important → RTO: 24 hours, RPO: 4 hours
- Lesson 2410 — Business Impact Analysis (BIA)
- Marketing campaigns
- – Known traffic surges from ads or email blasts
- Lesson 2676 — Cache-Warming and Preloading
- Masked variables
- hide their values in job logs, replacing them with `[masked]`.
- Lesson 1763 — Custom CI/CD Variables and Inheritance
- Match (Output)
- Where logs go next—Elasticsearch, S3, another Fluentd, or multiple destinations simultaneously.
- Lesson 2026 — Fluentd Configuration and Parsing
- match criteria
- (which resources to evaluate)
- Lesson 1415 — Implementing ConstraintsLesson 1581 — VirtualService FundamentalsLesson 2375 — Custom Rules and Request Inspection
- Match environment separation strategies
- (not accidentally deploying to production)
- Lesson 715 — Code Review and Peer Validation
- Math operations
- Calculate ratios, percentages, or custom metrics
- Lesson 682 — GCP Monitoring Query Language
- Matrix
- Multi-environment deployments where every app should exist in every cluster
- Lesson 1910 — Matrix and Merge Generators
- matrix build
- expands a single pipeline definition into many parallel jobs by testing every combination of specified parameters—like operating systems, language versions, or environment configurations.
- Lesson 1660 — Matrix Build PatternLesson 1709 — Matrix Builds for Parallel TestingLesson 1713 — Matrix Builds and Parameterization
- Matrix generator
- combines two or more generators by creating every possible combination (Cartesian product).
- Lesson 1910 — Matrix and Merge Generators
- Matrix-based Security
- provides a spreadsheet-like grid where you assign specific permissions (read, build, configure) to individual users.
- Lesson 1781 — Jenkins User Management and Security
- Mature cloud operations teams
- experienced with at least one cloud provider
- Lesson 2763 — Evaluating When Multicloud is the Right Strategy
- Maturity
- Battle-tested since 2011 with a massive community
- Lesson 1770 — Introduction to Jenkins and CI/CD Automation
- Maturity and Stability
- Lesson 1600 — Service Mesh Selection Criteria
- Max Age
- How long browsers cache preflight responses (in seconds)
- Lesson 542 — API Gateway CORS Configuration
- Max Connections
- The maximum number of HTTP/TCP connections the pool will maintain to a destination service.
- Lesson 1613 — Connection Pool Management
- Max log file size
- How large a single log file grows before rotation (e.
- Lesson 1436 — Log Rotation and Storage
- Max Pending Requests
- How many requests can wait in queue when all connections are busy.
- Lesson 1613 — Connection Pool Management
- Max Requests Per Connection
- Limits concurrent requests on a single connection (HTTP/2 and gRPC support multiplexing many requests over one connection).
- Lesson 1613 — Connection Pool Management
- Max surge
- How many *extra* instances can exist temporarily during the update (e.
- Lesson 328 — MIG Rolling Updates and Canary Deployments
- Max unavailable
- How many instances can be offline simultaneously (e.
- Lesson 328 — MIG Rolling Updates and Canary Deployments
- Maximum
- 10 nodes (cost control)
- Lesson 1465 — Creating Managed Node GroupsLesson 2536 — Aurora Serverless
- Maximum = 10 waiters
- (your dining room physically can't accommodate more)
- Lesson 292 — Minimum, Maximum, and Desired Capacity
- Maximum Capacity
- – The ceiling.
- Lesson 292 — Minimum, Maximum, and Desired CapacityLesson 310 — Capacity Limits and Constraints
- Maximum connections
- Cap to prevent resource exhaustion
- Lesson 2234 — Connection Pooling and Keep-Alive
- Maximum event age
- How long to keep retrying before abandoning the event
- Lesson 488 — Function Error Handling and Retries
- maximum flexibility
- Lesson 73 — On-Demand Pricing ModelLesson 1817 — AWS Code Services vs Third-Party Tools
- Maximum receive count
- How many times a message can be delivered before moving to DLQ (e.
- Lesson 2714 — Dead Letter Queues
- Maximum storage limit
- The ceiling the database can grow to (prevents runaway costs)
- Lesson 401 — Storage Autoscaling
- Maximum Transmission Unit (MTU)
- is the largest size (in bytes) of a single network packet that can be sent across a connection.
- Lesson 2229 — MTU and Jumbo Frames
- Meaningful Conventions
- In infrastructure monitoring, certain colors carry universal meaning:
- Lesson 2105 — Color Theory and Accessibility
- Measurable
- Compare conversion rates, engagement, or performance across cohorts
- Lesson 1608 — A/B Testing and Experimentation
- Measure everything
- Track actual RTO/RPO achieved, recovery steps completed, team coordination time, and automation effectiveness.
- Lesson 2442 — DR Testing Scenarios
- Measure Success
- Track metrics like adoption rate, time-to-first-deployment, support tickets, and Net Promoter Score (NPS).
- Lesson 2938 — Platform as a Product Mindset
- Measurement Window
- Specify how long you observe to confirm steady state—typically 5-15 minutes before introducing chaos.
- Lesson 2492 — Steady State Hypothesis
- Measuring Lag
- Monitor the time gap between when events are published and when consumers process them.
- Lesson 581 — Event-Driven Monitoring and Observability
- Measuring RTO
- Track how long it actually takes from failure detection to full service restoration.
- Lesson 2488 — Failover Testing and Validation
- Media and Content Storage
- Lesson 143 — Object Storage Use Cases
- Media files
- Photos, videos, and audio that don't change frequently
- Lesson 115 — Object Storage Overview
- Medium
- (7 GB RAM, 4 vCPUs): Standard application builds
- Lesson 1823 — CodeBuild Build Environments and Images
- Medium (4.0–6.9)
- Moderate risk, should be addressed in regular cycles
- Lesson 1075 — Vulnerability Severity and Prioritization
- Medium retention (days)
- For business transactions that need time for processing and retries but eventually become irrelevant
- Lesson 565 — Message Retention and Expiration
- Medium scope, moderate speed
- Integration tests check how multiple components work together—databases connecting to APIs, microservices communicating, configuration loading correctly.
- Lesson 1649 — Automated Testing in CI/CD
- Medium windows (1-24 hours)
- Daily patterns, incident investigation
- Lesson 2104 — Time Series and Temporal Context
- Meet compliance requirements
- by keeping regulated data on-premises while using public cloud for general workloads
- Lesson 22 — Hybrid Cloud Deployment ModelLesson 213 — Network Security Logging and Monitoring
- Meet data residency requirements
- Store European customer data in AWS's Frankfurt region, Chinese data in Alibaba Cloud's Beijing region, and Australian data in Azure's Sydney region—all within a single architecture.
- Lesson 2755 — Multicloud Benefits: Geographic and Regulatory Coverage
- Meet regulatory requirements
- that mandate specific key generation processes or custody
- Lesson 2293 — Key Import and External Key Stores
- Meeting data residency requirements
- by keeping certain data within specific geographic boundaries
- Lesson 25 — Edge and Distributed Cloud
- Memcached
- are popular examples.
- Lesson 2469 — Distributed Caching for Stateful DataLesson 2692 — Google Cloud Memorystore
- Memory allocation
- (more memory = faster CPU initialization)
- Lesson 491 — Cold Start FundamentalsLesson 2543 — Cold Start Fundamentals
- Memory Allocation Impact
- Lesson 492 — Minimizing Cold Start Duration
- Memory constraints
- when loading entire files
- Lesson 166 — Multipart UploadLesson 469 — Function Timeouts and Limits
- Memory exhaustion
- Unbounded queues consume all available RAM
- Lesson 2740 — Understanding Backpressure in Distributed Systems
- Memory footprint
- (impacts cost and execution speed)
- Lesson 471 — Function Runtime EnvironmentsLesson 2038 — Fluentd and Fluent Bit Overview
- Memory management
- Memcached uses a slab allocator with LRU eviction; Redis is more flexible
- Lesson 2689 — Memcached Fundamentals
- Memory Optimized
- instances deliver large RAM allocations without overpaying for unused CPU.
- Lesson 78 — Choosing Instance Types for Your WorkloadLesson 109 — Cross-Provider Compute Feature ComparisonLesson 399 — Database Instance Classes
- Memory overhead
- A VM typically requires 1-2 GB just for the guest operating system before running any application.
- Lesson 966 — Density and Resource Efficiency
- Memory pressure
- occurs when a node's total available memory drops below a threshold—regardless of individual container limits.
- Lesson 1341 — OOMKilled and Memory Pressure
- Memory Pressure Eviction
- The *entire node* is low on memory → pods evicted based on priority
- Lesson 1341 — OOMKilled and Memory Pressure
- Memory Usage
- How much RAM is being used for caching and operations.
- Lesson 410 — Database Monitoring and MetricsLesson 483 — Function Runtime SelectionLesson 1643 — Observability Performance ImpactLesson 1950 — Metric Types: Gauge
- Memory-hungry applications
- (databases, in-memory caches, real-time analytics) → **Memory Optimized** instances deliver large RAM allocations without overpaying for unused CPU.
- Lesson 78 — Choosing Instance Types for Your Workload
- Memory-intensive workloads
- (databases, caching) need memory-optimized instances
- Lesson 1508 — Node Pool Management
- Memory/CPU limits
- Containerized services get resource quotas via Kubernetes
- Lesson 2583 — Bulkhead Pattern for Isolation
- Merge
- Applying progressive overrides (base config → cluster overrides → environment overrides)
- Lesson 1910 — Matrix and Merge GeneratorsLesson 1999 — Transformations and Data Processing
- Merge generator
- combines generators sequentially, with later generators overriding parameters from earlier ones.
- Lesson 1910 — Matrix and Merge Generators
- Merge request approvals
- require senior engineers to review infrastructure changes before they deploy
- Lesson 1874 — GitOps Access Control
- message attributes
- (key-value pairs like `"event_type": "order_placed"` or `"region": "us-west-2"`).
- Lesson 558 — SNS Message FilteringLesson 563 — Message Attributes and Metadata
- Message becomes invisible
- Other consumers can't see this message
- Lesson 2713 — Message Visibility and Acknowledgment
- Message brokers
- (like Amazon Kinesis, Apache Kafka, or Azure Event Hubs) sit between producers and consumers, providing:
- Lesson 2602 — Streaming Architecture Patterns
- Message Group IDs
- partition FIFO queues into logical streams.
- Lesson 2718 — Message Ordering and Partitioning
- Message queue events
- When messages arrive in SQS or EventBridge, process them asynchronously with lambda functions.
- Lesson 2501 — Event-Driven Invocation Pattern
- Message queues
- for passing data between invocations
- Lesson 464 — Stateless Function DesignLesson 1287 — Storage Challenges in ContainersLesson 2710 — Message Queue Fundamentals Revisited
- Message routing
- Messages flow bidirectionally—client-to-server and server-to-client through the same connection
- Lesson 543 — WebSocket APIs
- Message timers
- provide finer control—you set the delay on *individual messages* rather than the entire queue.
- Lesson 2723 — Delay Queues and Message Timers
- Message Visibility
- When a consumer retrieves a message, it becomes invisible to other consumers during processing (preventing duplicate work)
- Lesson 2720 — Competing Consumers Pattern
- Messaging Conventions
- Lesson 2077 — Semantic Conventions and Standard Attributes
- Meta-arguments
- are special Terraform keywords that work across all resource types to control behavior:
- Lesson 729 — Resource Blocks and Meta-Arguments
- Metadata
- is information *about* your VM that's automatically available from within the instance.
- Lesson 56 — VM Metadata and User DataLesson 63 — VM Tags and Resource OrganizationLesson 115 — Object Storage OverviewLesson 139 — What is Object Storage?Lesson 142 — Object Metadata and Custom AttributesLesson 169 — Object Tagging and MetadataLesson 701 — State File Contents and StructureLesson 775 — State File Contents and Structure (+9 more)
- Metadata concealment
- Prevents pods from accessing sensitive instance metadata by default (via Workload Identity)
- Lesson 1488 — GKE Security: Private Clusters and Hardening
- metadata service
- is a special HTTP endpoint available from inside your EC2 instance at `http://169.
- Lesson 95 — AWS EC2 User Data and Metadata ServiceLesson 358 — Instance Profiles and Metadata
- Metadata Tagging
- Apply environment-specific tags like `dev-approved`, `qa-passed`, or `prod-ready`
- Lesson 1676 — Artifact Promotion Patterns
- Metaspace
- Allocate sufficient space for plugin classes (`-XX:MaxMetaspaceSize=512m`)
- Lesson 1806 — Performance Tuning and Resource Management
- Method-level
- stricter limits on expensive operations
- Lesson 2540 — Serverless API Rate Limiting and Throttling
- Method-level limits
- Fine-grained control per endpoint
- Lesson 539 — API Gateway Throttling and Rate Limits
- Method-level throttling
- Apply different limits to specific API methods
- Lesson 2750 — Cloud Provider Rate Limiting Services
- metric
- in CloudWatch is a time-ordered set of data points—think of it as a variable being tracked over time (CPU usage, disk I/O, request count).
- Lesson 669 — CloudWatch Metrics and NamespacesLesson 682 — GCP Monitoring Query LanguageLesson 1997 — Query Builder and Query Editor
- Metric aggregation
- is the process of combining multiple raw data points into summary statistics over time intervals (like taking 60 one-second measurements and creating a single one-minute average).
- Lesson 634 — Metric Aggregation and Resolution
- Metric breach frequency
- How often does your chosen metric (CPU, memory, custom) cross thresholds?
- Lesson 312 — Scaling Policy Monitoring
- Metric name
- – What you're measuring (e.
- Lesson 1948 — Time-Series Data ModelLesson 1963 — Instant Vector Selectors
- Metric-based scaling
- adjusts capacity based on real-time performance data (like CPU usage, memory, or network traffic).
- Lesson 322 — VMSS Scaling Policies and Rules
- metrics
- .
- Lesson 37 — Measuring Cloud Business Value: KPIs and MetricsLesson 49 — Observability and Monitoring ArchitectureLesson 290 — Scaling Triggers and MetricsLesson 489 — Function Logging and Execution InsightsLesson 674 — Azure Monitor OverviewLesson 675 — Azure Monitor Metrics and AlertsLesson 1570 — Service Mesh Observability BenefitsLesson 1589 — Istio Telemetry Architecture
- Metrics API
- Lesson 1445 — Metrics Server Architecture
- Metrics Collection
- involves tracking key performance indicators like build queue length, executor utilization, agent availability, job success/failure rates, and build duration trends.
- Lesson 1807 — Monitoring and Alerting for Jenkins
- Metrics Explorer
- lets you build charts by selecting a resource type (like Compute Engine VM), choosing a metric (CPU utilization), and applying filters.
- Lesson 680 — Cloud Monitoring in GCP
- Metrics Server
- (via the Resource Metrics API) to collect current resource utilization for pods.
- Lesson 1449 — Horizontal Pod Autoscaler (HPA) Fundamentals
- Metrics unavailable
- Verify Metrics Server is running with `kubectl top nodes`
- Lesson 1459 — Autoscaling Best Practices and Troubleshooting
- Metrics-based identification
- Monitor CloudWatch, Azure Monitor, or GCP metrics for resources with sustained low utilization (e.
- Lesson 2160 — Idle Resource Detection
- MFA Delete
- adds a critical safety layer: before permanently deleting a version or suspending versioning on a bucket, you must provide a code from a physical multi-factor authentication device (like a key fob or authenticator app).
- Lesson 157 — Versioning Lifecycle and MFA Delete
- MFA requirement
- – Whether they must use multi-factor authentication
- Lesson 346 — Creating and Managing User Identities
- Micro-segmentation
- applies security policies at the workload or individual resource level, not just the network perimeter.
- Lesson 2391 — Micro-Segmentation vs Traditional SegmentationLesson 2394 — Identity as the PerimeterLesson 2400 — Software-Defined Perimeter (SDP)
- Microservice coordination
- Lightweight event propagation without heavy message broker infrastructure
- Lesson 2685 — Redis Pub/Sub and Messaging
- Microservices mode
- Every component runs independently with dedicated replicas.
- Lesson 2035 — Loki Components and Deployment Modes
- Microsoft edge routers
- Azure's gateway into their global network
- Lesson 2215 — Azure ExpressRoute Fundamentals
- Microsoft Peering
- Connects to Microsoft 365 and Azure public services (like Storage)
- Lesson 2203 — Azure ExpressRoute FundamentalsLesson 2204 — ExpressRoute Routing and BGPLesson 2215 — Azure ExpressRoute Fundamentals
- Microsoft SQL Server
- Lesson 398 — Supported Database Engines
- Microsoft-backed
- Originally developed and contributed to CNCF by Microsoft, with strong Azure integration
- Lesson 1596 — Open Service Mesh (OSM) Basics
- Middle floors
- Template-based deployments with some customization options
- Lesson 2920 — Abstraction Levels and User Personas
- Middle layers add dependencies
- – language runtimes, frameworks
- Lesson 981 — Layer Order and Dependencies
- Middle tier
- (optional): Regional Prometheus instances aggregate metrics from their zone
- Lesson 1979 — Prometheus Federation Basics
- Middleware services
- databases, message queues, and caching layers are integrated
- Lesson 14 — Platform as a Service (PaaS) Overview
- Migrate from in-tree
- if you're using deprecated provisioners
- Lesson 1316 — Provisioner Selection and Configuration
- Migrate MongoDB workloads
- to the cloud without rewriting application code
- Lesson 442 — DocumentDB and MongoDB-Compatible Services
- Migrate workloads
- by simply redeploying the same gateway configuration to a different cloud's Kubernetes cluster
- Lesson 2772 — API Gateway Abstraction
- Migration
- Snapshots let you move volumes between availability zones or regions for better performance or compliance requirements.
- Lesson 131 — Volume Snapshots
- Migration flexibility
- Organizations can gradually migrate from one provider to another or run parallel environments during transitions.
- Lesson 2751 — What is Multicloud and Why Organizations Adopt It
- Migration is likely
- Business strategy includes eventual cloud changes
- Lesson 2777 — Lock-In vs Portability Trade-offs
- Migration Types Supported
- Lesson 2821 — Database Migration Service (DMS) Fundamentals
- Migration waves and phases
- Track which applications are in assessment, planning, execution, or validation.
- Lesson 2818 — Migration Progress Tracking and Reporting
- Min/max constraints
- – Reject pods that ask for too much or too little
- Lesson 1338 — LimitRange Objects
- Min/max limits
- Set guardrails to prevent runaway costs or insufficient capacity
- Lesson 2155 — Auto Scaling for Cost Efficiency
- Minimal downtime
- Continuous replication until cutover
- Lesson 2806 — Database Migration Service Fundamentals
- Minimal images
- (`alpine`, `scratch`) reduce size and attack surface but may lack tools
- Lesson 1001 — FROM: Base Image Selection
- Minimal lag
- changes typically replicate within seconds
- Lesson 2825 — Continuous Data Replication for Databases
- Minimal Profile
- Lesson 1586 — Istio Configuration Profiles
- Minimal resource footprint
- Critical for edge devices and dense container environments
- Lesson 2027 — Fluent Bit for Edge Collection
- Minimize cold starts
- Keep functions warm with provisioned concurrency only for latency-sensitive workloads
- Lesson 2983 — Serverless Cost Optimization Patterns
- Minimize cross-environment calls
- Group tightly-coupled applications into the same migration wave to avoid chatty cross-cloud communication
- Lesson 2829 — Dependency Mapping and Migration Order
- Minimize global scope work
- Initialize only what's needed for each request, not on every cold start.
- Lesson 622 — Edge Function Performance Optimization
- Minimize redundant overhead
- Shared control planes, monitoring agents, and base OS instances
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- Minimize risk
- by migrating small, isolated features first
- Lesson 2514 — Strangler Fig Pattern for Migration
- Minimize transfer volume
- Lesson 2786 — Data Transfer Costs and Optimization
- Minimum
- 2 nodes (ensures availability)
- Lesson 1465 — Creating Managed Node GroupsLesson 2536 — Aurora Serverless
- Minimum = 2 waiters
- (you never operate with fewer, even on slow days)
- Lesson 292 — Minimum, Maximum, and Desired Capacity
- Minimum Capacity
- – The absolute floor.
- Lesson 292 — Minimum, Maximum, and Desired CapacityLesson 310 — Capacity Limits and Constraints
- Minimum team size
- At least 4-6 engineers to avoid excessive frequency
- Lesson 2127 — On-Call Rotation Structures
- Minimum TLS Version
- Lesson 602 — SSL/TLS Configuration
- MinLength/MaxLength
- for strings, **MinValue/MaxValue** for numbers, and **AllowedPattern** for regex validation.
- Lesson 861 — Parameters Section Deep Dive
- MINOR
- (x.
- Lesson 811 — Module Versioning Best PracticesLesson 843 — Module Registry and VersioningLesson 1532 — Helm Versioning and Chart VersionsLesson 1549 — Chart Packaging and VersioningLesson 1673 — Artifact Versioning Strategies
- minutes
- instead of weeks.
- Lesson 34 — Business Agility: Time-to-Market AdvantagesLesson 961 — Containers vs Virtual Machines
- MinValue/MaxValue
- for numbers, and **AllowedPattern** for regex validation.
- Lesson 861 — Parameters Section Deep Dive
- Miss
- Cache loads from data store, stores in cache, returns to application
- Lesson 2700 — Read-Through Caching Pattern
- Missing
- Expected resources don't exist in the cluster
- Lesson 1885 — Application Health and Sync StatusLesson 1900 — Health Assessment
- Missing resource limits
- Set memory limits on the Collector to prevent runaway consumption
- Lesson 2087 — Best Practices and Performance Considerations
- Missing routes
- No path defined to a subnet or external destination
- Lesson 2190 — Route Table Verification
- Missing security controls
- Unencrypted databases or logging disabled
- Lesson 722 — IaC Security Scanning
- Mission-critical data
- High-availability tier with strict reclaim policies
- Lesson 1314 — Multiple StorageClasses Strategy
- ML-based analysis
- Algorithms identify patterns and predict optimal sizing based on historical trends, not just point- in-time snapshots
- Lesson 2979 — Right-Sizing at Scale with Automation
- Mobile apps
- need smaller payloads to conserve bandwidth and battery
- Lesson 2577 — Backend for Frontend (BFF) Pattern
- Mobile push notifications
- Lesson 557 — AWS SNS Topics and Subscriptions
- Mocking
- replaces actual cloud provider APIs with fake implementations that return predetermined responses.
- Lesson 2881 — Mocking and Stubbing Infrastructure
- Mode mismatches
- occur when one service expects mTLS (STRICT) but another sends plaintext (PERMISSIVE or disabled).
- Lesson 1630 — mTLS Troubleshooting and Verification
- Moderate complexity
- , better TCO than lift-and-shift.
- Lesson 2819 — Database Migration Strategies Overview
- Moderate settings
- (3 out of 5) offer a practical middle ground for most scenarios
- Lesson 642 — Alarm Evaluation Periods and Datapoints
- Modification opportunities
- Can underused RIs be converted to better-matched types?
- Lesson 2976 — Reserved Instance Portfolio Management
- Modified
- (existing resources with property changes)
- Lesson 851 — Stack Updates and Change SetsLesson 879 — Stack Drift Detection
- Modularity
- Could shared resources be extracted into reusable modules?
- Lesson 715 — Code Review and Peer ValidationLesson 881 — Nested StacksLesson 907 — Linked Templates and Template NestingLesson 1386 — Aggregated ClusterRolesLesson 1756 — Pipeline Triggers and Parent-Child PipelinesLesson 1758 — Dynamic Child Pipelines
- Module composition
- breaks monolithic configurations into reusable, tested modules that teams can independently maintain and version.
- Lesson 831 — Scaling Challenges and Patterns
- Module outputs
- act as labeled windows into that box, letting you selectively share specific values (like resource IDs, IP addresses, or DNS names) with the calling configuration.
- Lesson 803 — Module Output Values
- MongoDB API
- Compatible with MongoDB drivers and tools — migrate existing MongoDB apps without code changes
- Lesson 436 — Azure Cosmos DB: Architecture and APIsLesson 2534 — Azure Cosmos DB Serverless
- MongoDB compatibility
- existing drivers, tools, and queries work with minimal changes
- Lesson 442 — DocumentDB and MongoDB-Compatible Services
- MongoDB-compatible managed services
- databases that support MongoDB's query language and tools, but run on fully managed, cloud- native infrastructure.
- Lesson 442 — DocumentDB and MongoDB-Compatible Services
- Monitor access logs
- Enable CloudTrail or Azure audit logs to track who accessed or modified state files.
- Lesson 797 — Remote State Best Practices
- Monitor actual utilization
- Regularly review your scaling metrics.
- Lesson 311 — Scaling for Cost Optimization
- Monitor and Adjust Continuously
- Lesson 1343 — Right-Sizing Resources
- Monitor and rollback
- Watches for errors and can automatically revert if thresholds are breached
- Lesson 1835 — Blue/Green Deployments with CodeDeploy
- Monitor Grafana itself
- Track Grafana's own metrics (query duration, active users) to identify bottlenecks.
- Lesson 2003 — Grafana Best Practices and Performance
- Monitor index usage
- Cloud databases provide metrics showing which indexes are actually used.
- Lesson 448 — Index Design and Strategy
- Monitor metrics
- (error rates, latency, business KPIs) for the canary
- Lesson 1606 — Canary Deployments with Service MeshLesson 1665 — Canary Deployment Pattern
- Monitor node utilization
- Use Cloud Monitoring to identify underutilized nodes
- Lesson 1489 — GKE Cost Optimization and Bin Packing
- Monitor security
- Detect unusual traffic patterns, port scanning attempts, or unauthorized access attempts.
- Lesson 222 — VPC Flow Logs
- Monitor the transition
- Verify which services still use plaintext
- Lesson 1622 — mTLS Migration Strategies
- Monitoring
- – Built-in metrics and alerting dashboards
- Lesson 396 — Introduction to Managed Relational DatabasesLesson 625 — Observability vs MonitoringLesson 1917 — ArgoCD High Availability SetupLesson 2687 — Redis High Availability with SentinelLesson 2743 — Dead Letter Queues for Failed Messages
- Monitoring agents
- Automatically installs Azure Monitor agents
- Lesson 100 — Azure VM Extensions and Custom ScriptLesson 1185 — DaemonSet FundamentalsLesson 1394 — Privileged ContainersLesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Monitoring and Logging
- Components like metrics-server collect resource usage data (CPU, memory) enabling features like autoscaling and capacity planning.
- Lesson 1112 — Add-on Components and ExtensionsLesson 1505 — Managed Kubernetes Overview
- Monitoring and Observability
- You need separate monitoring tools for each provider—CloudWatch, Azure Monitor, Cloud Monitoring—or invest in unified third-party platforms that aggregate data, adding cost and integration points.
- Lesson 2756 — Multicloud Challenges: Complexity and Management Overhead
- Monitoring and Validation
- DMS tracks replication lag, validates data integrity, and provides visibility into transfer progress— essential for the migration progress tracking you've learned about.
- Lesson 2821 — Database Migration Service (DMS) Fundamentals
- Monitoring boundaries
- Set thresholds (latency > 2s, error rate > 1%, availability < 99.
- Lesson 2493 — Blast Radius and Safety Controls
- Monitoring layer
- Logging, anomaly detection, intrusion detection systems
- Lesson 2833 — Defense in Depth and Layered Security
- Monitoring Options
- Enable enhanced monitoring if needed
- Lesson 402 — Creating and Launching RDS Instances
- Monitoring replication health
- means actively tracking key indicators of the replication pipeline's performance and integrity, then alerting when thresholds are breached—before users experience impact.
- Lesson 2489 — Monitoring Replication Health
- Monitoring utilization metrics
- – Track CPU usage, memory consumption, network throughput, and disk I/O over time
- Lesson 79 — Cost Optimization with Right-Sizing
- MonitoringTimeInMinutes
- How long to watch alarms after stack operation begins (0-180 minutes)
- Lesson 890 — Stack Rollback Configuration
- Monitors
- both instances continuously for failures
- Lesson 415 — Multi-AZ Deployments FundamentalsLesson 1813 — CodeDeploy: Deployment Automation OverviewLesson 2171 — AWS Cost Anomaly Detection
- Monitors health
- Continuously checks if containers are running and healthy
- Lesson 1109 — Kubelet: The Node Agent
- Monolithic mode
- All components run in a single process.
- Lesson 2035 — Loki Components and Deployment Modes
- Monthly
- Analyze trends, validate tagging, review reservation utilization
- Lesson 2167 — Continuous Optimization Process
- More etcd storage consumed
- (etcd has limited capacity)
- Lesson 1273 — Secret Size and Performance Limits
- More frequent backup operations
- consuming compute and bandwidth
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- More predictable performance
- No "best effort" routing behavior
- Lesson 2211 — Private Connectivity Overview
- Mount namespace
- Each container has its own filesystem view.
- Lesson 963 — Process Isolation with Namespaces
- Mounting specific keys only
- Lesson 1251 — Mounting ConfigMaps as Volumes
- Mounting the entire ConfigMap
- Lesson 1251 — Mounting ConfigMaps as Volumes
- Move
- the binary to a directory in your system's PATH (like `/usr/local/bin` on Linux/Mac or `C:\Windows\System32` on Windows)
- Lesson 724 — Installing Terraform and Provider Basics
- Mozilla SOPS
- encrypts YAML/JSON files with keys from AWS KMS, Azure Key Vault, or GCP KMS.
- Lesson 1941 — Secrets Management in Flux
- Multi-AZ approach
- Servers in subnets across `us-east-1a`, `us-east-1b`, and `us-east-1c` — even if one AZ fails, servers in the other zones keep serving traffic.
- Lesson 178 — Availability Zones and Subnets
- Multi-AZ vs Multi-Region Trade-offs
- Lesson 50 — Cost Optimization Through Architecture
- Multi-Cloud Aggregation
- If you operate across AWS, Azure, and GCP, visibility means bringing all spending into a unified view rather than juggling separate portals.
- Lesson 2961 — Cost Visibility Fundamentals
- Multi-cloud integration
- Query datasets across AWS, Azure, or GCP without replication
- Lesson 2668 — Query Federation and External Data
- Multi-Cloud Support
- Unlike cloud-specific tools, Terraform works across AWS, Azure, GCP, and hundreds of other providers.
- Lesson 723 — What is Terraform and Why Use It
- Multi-cluster DNS
- Services automatically discoverable across clusters with federated DNS names
- Lesson 1514 — Cluster Federation Basics
- Multi-cluster GitOps
- extends the GitOps principles you've learned to orchestrate deployments across all your clusters from one centralized Git repository.
- Lesson 1871 — Multi-Cluster GitOps
- Multi-cluster scheduling
- Workloads placed based on cluster capacity, location, or policies
- Lesson 1514 — Cluster Federation Basics
- Multi-container pods
- Specify which container's logs you need: `kubectl logs <pod-name> -c <container-name>`.
- Lesson 1444 — Troubleshooting with Logs
- Multi-Datacenter Support
- Consul excels at spanning multiple data centers or cloud regions.
- Lesson 1593 — Consul Service Mesh Fundamentals
- Multi-environment deployment
- Deploy to dev, staging, and production regions simultaneously after approval.
- Lesson 1845 — Parallel and Sequential Stage Execution
- Multi-Factor Authentication
- , federation becomes a cornerstone of Zero Trust architecture, treating **identity as the security perimeter**.
- Lesson 2852 — Identity Federation and SSO
- Multi-host connectivity
- without manual network configuration
- Lesson 1045 — Overlay Networks for Multi-Host
- Multi-level attribute retrieval
- Lesson 876 — Complex Function Nesting
- Multi-level navigation
- Overview → Service → Endpoint → Trace → Log line
- Lesson 2109 — Contextual Links and Drill-Down
- Multi-location
- Circuits terminating at different cloud edge locations—protects against site-level outages.
- Lesson 2220 — Private Connectivity Redundancy
- Multi-protocol notifications
- Send the same alert via email, SMS, and trigger a Lambda function simultaneously.
- Lesson 557 — AWS SNS Topics and Subscriptions
- Multi-provider backbone
- Using different telco providers for physical transport—protects against carrier-specific issues.
- Lesson 2220 — Private Connectivity Redundancy
- Multi-region
- deploys workloads across multiple geographic regions *within the same cloud provider*.
- Lesson 2752 — Multicloud vs Hybrid Cloud vs Multi-Region
- Multi-Region Active-Active Deployments
- Lesson 2233 — Multi-Region Latency Optimization
- Multi-Region Coverage
- Lesson 2351 — Enabling and Configuring Audit Logs
- Multi-region databases
- Support encrypted database replication (Aurora Global, DynamoDB Global Tables)
- Lesson 2312 — AWS KMS Multi-Region Keys
- Multi-region deployments
- for disaster recovery
- Lesson 821 — Provider Aliases and Multi-Region Deployments
- Multi-Region Keys
- (from lesson 2292) let you create a primary key in one region with automatic replicas in others.
- Lesson 2308 — Encryption in Multi-Region Architectures
- Multi-Region Redundancy
- Alert only when `Region-A-Down OR Region-B-Down` (but silence if both regions fail, since that might need a different escalation path).
- Lesson 645 — Composite Alarms
- Multi-service pattern
- Detect all microservices in an `apps/` directory and deploy each.
- Lesson 1908 — Git Generator Patterns
- Multi-Stage Builds Synergy
- Lesson 1022 — Minimizing Image Size
- Multi-Step Tasks
- define complex workflows in YAML, chaining together build, test, and push operations.
- Lesson 1091 — ACR Tasks and Automated Builds
- Multi-Tenancy
- SaaS applications serve multiple customers (tenants) using the same underlying infrastructure and software instance.
- Lesson 15 — Software as a Service (SaaS) OverviewLesson 1120 — Namespaced vs Cluster-Scoped ResourcesLesson 1604 — Request Routing Based on Headers and PathsLesson 1894 — Application ProjectsLesson 2042 — Splunk Cloud and Enterprise LoggingLesson 2084 — Baggage and Cross-Cutting Concerns
- Multi-tenant authorization
- Make decisions based on customer subscription levels
- Lesson 1626 — External Authorization Integration
- Multi-User Collaboration
- As your team grows, IAM allows you to safely grant different levels of access without sharing root credentials or worrying about unauthorized changes.
- Lesson 331 — What is IAM and Why It Matters
- Multi-zone deployments
- Distribute pods across availability zones for regional resilience
- Lesson 1352 — Pod Anti-Affinity Basics
- Multicloud
- means using services from two or more cloud providers simultaneously—such as AWS, Azure, and Google Cloud—in a single IT environment.
- Lesson 2751 — What is Multicloud and Why Organizations Adopt ItLesson 2752 — Multicloud vs Hybrid Cloud vs Multi-Region
- Multicloud backup
- means storing copies of your production data from one cloud (say, AWS) into another cloud's storage service (like Google Cloud Storage or Azure Blob Storage).
- Lesson 2788 — Multicloud Backup and Archive
- Multiple alarms firing
- When several target tracking or step scaling policies trigger simultaneously, each calculates its desired capacity independently, and the highest value is selected.
- Lesson 305 — Multiple Scaling Policy Coordination
- Multiple API Server Instances
- Lesson 1114 — High Availability Control Plane
- Multiple attack surfaces
- Every service-to-service connection becomes a potential vulnerability
- Lesson 1617 — Service Mesh Security Overview
- Multiple compute instances
- need simultaneous access to the same data
- Lesson 123 — Comparing Storage Types: When to Use What
- Multiple Consumers
- Deploy several instances of your consumer application (e.
- Lesson 2720 — Competing Consumers Pattern
- Multiple declarations
- You can call `WORKDIR` multiple times; each changes the context.
- Lesson 1004 — WORKDIR: Setting Working Directory
- Multiple instances
- of the same service make correlation impossible.
- Lesson 2004 — Why Centralized Logging
- Multiple Language Support
- Run applications built in various languages and frameworks on the same platform without managing different VM images.
- Lesson 101 — Azure App Service Overview
- Multiple options
- ("Schedule on nodes with GPU *or* high memory")
- Lesson 1346 — Node Affinity vs Node Selector
- Multiple Queries
- Combine data from Log Analytics, Application Insights, and Azure metrics in one place.
- Lesson 678 — Azure Monitor Workbooks
- Multiple read models
- Create different views from the same events (analytics, search, reports)
- Lesson 574 — CQRS Pattern with Events
- Multiple recipients
- Send alerts to email, SNS topics, or Chatbot integrations
- Lesson 2170 — AWS Budgets and Alerts
- Multiple replicas
- You can create several replicas to scale further
- Lesson 418 — Read Replicas for Scalability
- Multiple tunnels
- from your on-premises device to each cloud gateway
- Lesson 2200 — High Availability VPN Connections
- Multiple update layers
- Running system updates across multiple layers instead of consolidating them.
- Lesson 985 — Layer Size and Bloat
- Multiple views
- Create different read models from the same events (pairs well with CQRS)
- Lesson 2596 — Event Sourcing Fundamentals
- Multiple violation scenarios
- Different ways rules can be broken
- Lesson 2899 — Policy Testing and Validation
- multiplexing
- sending multiple requests and responses simultaneously over one TCP connection, rather than opening separate connections for each resource.
- Lesson 254 — WebSocket and HTTP/2 SupportLesson 283 — HTTP/2 and gRPC Load Balancing
- must
- live in a public subnet because it needs direct internet access via an Internet Gateway.
- Lesson 193 — NAT Gateway DeploymentLesson 1478 — Creating a GKE Autopilot ClusterLesson 2327 — HIPAA for Healthcare DataLesson 2531 — Amazon DynamoDB FundamentalsLesson 2698 — Write- Through Caching Pattern
- Mutating
- admission controllers execute (in undefined order among themselves)
- Lesson 1406 — Admission Controller Types
- Mutating controllers
- Modify requests before acceptance (example: "Inject a sidecar container automatically")
- Lesson 1405 — Admission Control Overview
- Mutual TLS (mTLS)
- extends this by requiring both parties to present and verify digital certificates before establishing a connection.
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- MySQL/MariaDB
- might enable audit logging plugins
- Lesson 404 — Option Groups for Engine FeaturesLesson 2091 — Zipkin Fundamentals
N
- N+1 redundancy
- means having one extra unit beyond minimum requirements.
- Lesson 2460 — Capacity Planning for High Availability
- N+2 redundancy
- adds two extra units, protecting against simultaneous failures in multiple fault domains.
- Lesson 2460 — Capacity Planning for High Availability
- Name
- descriptive identifier (e.
- Lesson 393 — GCP Service AccountsLesson 729 — Resource Blocks and Meta-ArgumentsLesson 746 — Resource Addressing and ReferencesLesson 751 — Referencing Data Source AttributesLesson 897 — Parameters in ARM TemplatesLesson 938 — Resource Definitions in ConfigurationsLesson 943 — Deployment OutputsLesson 1552 — Chart Dependencies and Requirements (+1 more)
- Name and Region
- What to call it and where it physically exists (e.
- Lesson 174 — Creating a Virtual Network
- Name-based matching
- Find a resource by its exact name or name pattern
- Lesson 750 — Data Source Arguments and Filters
- named volumes
- for easier management, but the Dockerfile's job is simply to declare "this path contains persistent data.
- Lesson 1012 — VOLUME: Mount PointsLesson 1053 — Volume Management in Compose
- namespace
- is a hierarchical grouping that organizes related metrics.
- Lesson 633 — Metric Namespaces and Naming ConventionsLesson 669 — CloudWatch Metrics and NamespacesLesson 1064 — Image Naming and Tagging ConventionsLesson 1259 — ConfigMap Troubleshooting and ValidationLesson 1269 — RBAC for SecretsLesson 1381 — RoleBinding Fundamentals
- namespace level
- , not the pod level.
- Lesson 1337 — Resource Quota BasicsLesson 1399 — Pod Security Admission Controller
- Namespace-based separation
- is your first line of defense.
- Lesson 2058 — Multi-Tenancy and Log Isolation
- namespaces
- to avoid naming collisions.
- Lesson 675 — Azure Monitor Metrics and AlertsLesson 965 — Container Portability BenefitsLesson 2566 — Microservices on Kubernetes
- Naming conventions
- Enforce namespace or resource naming standards
- Lesson 1409 — Validating Admission WebhooksLesson 2963 — Tagging Strategy for Cost Allocation
- Nano-services
- (also called "micro-microservices") are excessively small services that do too little.
- Lesson 2564 — Service Size and Granularity
- NAT AMI
- (Amazon Machine Image) that comes pre-configured with NAT software.
- Lesson 195 — NAT Instance Basics
- NAT Gateway
- is a fully managed cloud service that handles Network Address Translation for you.
- Lesson 192 — NAT Gateway OverviewLesson 197 — NAT Gateway vs NAT InstanceLesson 200 — Troubleshooting Internet ConnectivityLesson 2236 — Troubleshooting Network Performance Issues
- NAT Gateway in AZ-A
- Lesson 194 — NAT Gateway High Availability
- NAT Gateway in AZ-B
- Lesson 194 — NAT Gateway High Availability
- NAT gateways
- , but the internet cannot initiate connections to them—adding a security layer.
- Lesson 173 — Private IP Address Spaces (RFC 1918)
- NAT instance
- is simply a regular EC2 instance that you configure to perform network address translation for your private subnet resources.
- Lesson 195 — NAT Instance BasicsLesson 197 — NAT Gateway vs NAT Instance
- Native backup/restore
- Use `pg_dump`/`pg_restore` for PostgreSQL, `mysqldump` for MySQL, or Oracle Data Pump
- Lesson 2822 — Homogeneous Database Migration
- Native cloud integration
- automatic backups, monitoring, IAM integration
- Lesson 442 — DocumentDB and MongoDB-Compatible Services
- Native Cloud Services
- Lesson 2440 — Automated DR Orchestration
- Native Integration
- Since it's built into GitHub, there's no need to configure webhooks or authenticate external services.
- Lesson 1682 — What is GitHub Actions and Why Use ItLesson 1946 — What is Prometheus and Why It MattersLesson 2422 — Cloud-Native Backup Services Overview
- Native Kubernetes integration
- Reads container logs automatically
- Lesson 2027 — Fluent Bit for Edge Collection
- Native mode
- for modern apps needing real-time features.
- Lesson 440 — Google Cloud Firestore and Datastore
- Natural data boundaries
- – each service owns its entities
- Lesson 2560 — Service Boundaries and Decomposition
- Negotiating leverage matters
- Ability to switch clouds improves contract terms
- Lesson 2777 — Lock-In vs Portability Trade-offs
- Nested stacks
- let you organize complex infrastructure by creating a hierarchy: a parent stack references child stack templates, each handling a specific component.
- Lesson 881 — Nested Stacks
- Network
- charged per GB of data transferred
- Lesson 30 — Pay-as-You-Go Pricing Model FundamentalsLesson 1041 — Docker Network ArchitectureLesson 2138 — Cloud Billing Structure Basics
- Network Abstraction
- Abstract VPCs, subnets, security groups, and load balancers into provider-agnostic constructs.
- Lesson 2766 — Infrastructure Abstraction Patterns
- Network ACL
- (Access Control List) is a stateless firewall that operates at the **subnet boundary**.
- Lesson 206 — Network ACL Fundamentals
- network ACLs
- (Access Control Lists).
- Lesson 201 — Security Groups vs Network ACLs OverviewLesson 210 — Security Groups vs NACLs Use Cases
- Network ACLs are stateless
- they evaluate inbound and outbound rules independently.
- Lesson 209 — Ephemeral Ports in Network Security
- Network address
- (first IP) - Identifies the subnet itself
- Lesson 179 — Reserved IP Addresses in Subnets
- Network Address Translation (NAT)
- acts as a middleman between your private resources and the internet.
- Lesson 185 — Network Address Translation (NAT) Preview
- Network bottlenecks
- Consumer acknowledgments are delayed, but producers keep publishing
- Lesson 2740 — Understanding Backpressure in Distributed Systems
- Network Chaos
- tests connectivity and **Compute Chaos** tests resource limits, **Application and State Chaos** targets the application layer itself.
- Lesson 2497 — Application and State Chaos
- Network connectivity
- (virtual network interfaces)
- Lesson 51 — What is a Virtual Machine?Lesson 2815 — Hybrid Operations and Coexistence
- Network connectivity loss
- – Primary can't communicate with the monitoring system
- Lesson 416 — Multi-AZ Failover Process
- Network Control
- Registry access follows your existing firewall and security group rules
- Lesson 1098 — Private Registry Endpoints
- Network dependencies
- Which applications talk to which services?
- Lesson 2798 — Application Discovery and Dependencies
- Network firewalls
- ask: "Is this traffic from an allowed IP?
- Lesson 2364 — What is a Web Application Firewall (WAF)
- Network Intelligence Center
- , offering **Connectivity Tests** (similar to AWS Reachability Analyzer), **Performance Dashboard** (packet loss and latency metrics), and **Firewall Insights** (identifies shadowed or unused firewall rules).
- Lesson 2194 — Provider-Specific Network Insights
- Network interface level
- Single instance monitoring
- Lesson 213 — Network Security Logging and Monitoring
- Network isolation
- High-speed, low-latency connections link AZs within a region, but failures don't cascade
- Lesson 2454 — Availability Zones and Data Center DistributionLesson 2696 — Cache Security and Access Control
- Network layer
- Firewalls, security groups, private subnets
- Lesson 48 — Security by Design and Defense in DepthLesson 2379 — DDoS Protection LayersLesson 2833 — Defense in Depth and Layered Security
- Network Load Balancer (NLB)
- works at the **transport layer** (OSI Layer 4), handling raw TCP and UDP connections.
- Lesson 261 — What is a Network Load Balancer (NLB)?
- Network Load Balancers
- uniquely support **static IP addresses** — one per availability zone.
- Lesson 266 — Static IP and Elastic IP Support
- Network Load Balancers (NLBs)
- operate at the transport layer (OSI Layer 4).
- Lesson 235 — Network Load Balancers (Layer 4)
- Network namespace
- Containers get their own network stack—separate IP addresses, routing tables, and firewall rules.
- Lesson 963 — Process Isolation with NamespacesLesson 1148 — Multi-Container PodsLesson 1403 — Host Namespaces and Ports
- Network partitions
- Isolated pods can't reach the CA for renewal
- Lesson 1628 — Certificate Rotation and Expiry
- Network Path Quality
- Public internet routes are unpredictable.
- Lesson 2789 — Network Performance and Latency Considerations
- Network performance
- Speed of data transfer to applications
- Lesson 399 — Database Instance ClassesLesson 2230 — Network Placement Groups
- Network plugins
- Managing networking on every node (like Calico or Weave)
- Lesson 1185 — DaemonSet FundamentalsLesson 1394 — Privileged Containers
- network policies
- to control which services and IP ranges can communicate with your registry.
- Lesson 1081 — Network Security for RegistriesLesson 1404 — Pod Security Best PracticesLesson 1519 — Troubleshooting Common Cluster IssuesLesson 2391 — Micro-Segmentation vs Traditional Segmentation
- Network routing
- Configuring private endpoints or VPN connections between cloud networks to securely transfer images
- Lesson 1099 — Cross-Provider Registry Integration
- Network segmentation
- Isolate cardholder data environments (CDE) using VPCs, security groups, and network ACLs
- Lesson 2326 — PCI DSS for Payment Card DataLesson 2841 — Security Boundaries and Trust ZonesLesson 2843 — Security Baseline and HardeningLesson 2846 — Zero Trust Security Model Fundamentals
- Network throughput
- and packet rates
- Lesson 411 — Enhanced MonitoringLesson 1573 — Service Mesh Performance Overhead
- Network traffic
- between availability zones, regions, or out to the internet incurs standard AWS data transfer charges.
- Lesson 1474 — EKS Pricing and Cost Considerations
- Network translation
- Since services have different private IP schemes per cloud, your discovery mechanism must return the correct endpoint—whether that's a public IP, VPN gateway address, or load balancer DNS name.
- Lesson 2784 — Multicloud Service Discovery
- Network Watcher
- includes tools like **IP Flow Verify** (checks if traffic is allowed to/from a VM), **Next Hop** (shows routing decisions), and **Connection Monitor** (tracks connectivity and latency over time).
- Lesson 2194 — Provider-Specific Network Insights
- Network-based IDS (NIDS)
- watches network traffic flowing between resources—like a security camera monitoring hallways.
- Lesson 2867 — Intrusion Detection Systems (IDS) in Cloud
- Networking
- connects everything together.
- Lesson 8 — Cloud Infrastructure ComponentsLesson 81 — VM Launch Process and InitializationLesson 2986 — Idle Resource Detection and Cleanup
- Networking Costs
- Lesson 2140 — Understanding Resource Costs
- Networking decisions
- – CNI plugins (sometimes), ingress controllers, service mesh
- Lesson 1505 — Managed Kubernetes Overview
- NetworkPolicy
- is a Kubernetes resource that acts like a firewall for your pods.
- Lesson 1234 — NetworkPolicy Fundamentals
- never
- allow `0.
- Lesson 215 — Common Network Security MistakesLesson 1028 — Build Arguments and SecretsLesson 1674 — Artifact Storage Requirements
- Never hardcode keys
- in your application code or commit them to version control
- Lesson 348 — Access Keys and Programmatic Access
- Never Trust, Always Verify
- Lesson 2846 — Zero Trust Security Model Fundamentals
- Never use in production
- it prioritizes convenience over performance and security.
- Lesson 1586 — Istio Configuration Profiles
- New instance launches
- → ASG automatically registers it with the load balancer's target group
- Lesson 320 — ASG Integration with Elastic Load Balancing
- new version
- automatically.
- Lesson 2246 — GCP Secret Manager IAM and VersioningLesson 2316 — Azure Key Vault Key Management
- Next actions
- Links to documentation or configuration guides
- Lesson 1544 — NOTES.txt and User Instructions
- Next Hop
- (shows routing decisions), and **Connection Monitor** (tracks connectivity and latency over time).
- Lesson 2194 — Provider-Specific Network Insights
- No audit trail clarity
- It's harder to track *who* did *what* when everyone uses root
- Lesson 339 — Root Account and Administrative Access
- No cache purge complexity
- No need to track and delete specific keys
- Lesson 2706 — Version-Based Cache Invalidation
- No configuration drift
- because nothing changes after creation
- Lesson 691 — Immutable Infrastructure Principle
- No Control Plane Costs
- Unlike self-managed Kubernetes, Azure handles the master nodes completely free—you only pay for the worker nodes where your applications run.
- Lesson 1490 — Introduction to Azure Kubernetes Service (AKS)
- No coordination
- Two applies running simultaneously can corrupt state or create race conditions
- Lesson 783 — Why Remote State Matters
- No endpoints
- Label mismatch between Service selector and Pods
- Lesson 1218 — Service Debugging and Troubleshooting
- No errors or crashes
- The application keeps running, but sluggishly
- Lesson 1340 — CPU Throttling Behavior
- No ETL overhead
- Query raw data immediately after landing in your lake
- Lesson 2640 — Query Engines for Data Lakes
- No guarantees
- Even after preemption starts, the high-priority pod might not schedule if something else grabs the resources first.
- Lesson 1371 — Pod Preemption Behavior
- No guardrails
- Mistakes can't be limited—you could accidentally delete your entire infrastructure
- Lesson 339 — Root Account and Administrative Access
- No infrastructure management
- No servers to patch, scale, or monitor.
- Lesson 2656 — Serverless Query Engine Overview
- No internet exposure
- Traffic never hits the public internet
- Lesson 2397 — Private Link and Endpoint Services
- No Key Extraction
- Keys stored in an HSM cannot be exported in plaintext.
- Lesson 2285 — Key Storage and Hardware Security Modules
- No locking
- Multiple `terraform apply` commands could run at once, corrupting state
- Lesson 776 — Local State Storage
- No maintenance
- No patching, updating, or instance failures to worry about
- Lesson 192 — NAT Gateway Overview
- No maintenance burden
- – the provider handles hardware, updates, and security
- Lesson 20 — Public Cloud Deployment Model
- No maintenance windows
- leading to false alarms during deployments
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- No NAT
- pods have first-class network citizens status
- Lesson 1496 — AKS Networking Models: kubenet vs Azure CNI
- No over-provisioning
- You don't buy servers for peak demand that sit idle most of the time
- Lesson 32 — Elasticity and Cost Benefits of Auto-Scaling
- No overlapping CIDR blocks
- The IP address ranges in both VPCs must be different.
- Lesson 216 — VPC Peering FundamentalsLesson 2214 — Direct Connect Gateway
- No process inspection exposure
- Secrets in environment variables appear in process listings (`ps aux`, container inspect commands).
- Lesson 2271 — Volume-Mounted Secrets
- No Rotation Support
- Changing a secret requires restarting the container; you can't rotate credentials dynamically.
- Lesson 2270 — Environment Variables for Secrets
- No sharing
- Each team member has their own separate state file on their laptop
- Lesson 776 — Local State Storage
- No Spark expertise required
- – Data engineers focus on business logic, not cluster configuration
- Lesson 2651 — ADF Mapping Data Flows
- No state synchronization
- between instances means no replication lag or consistency issues
- Lesson 2462 — Stateless Services and Horizontal Scaling
- No under-provisioning
- You won't lose customers because your website crashed during high traffic
- Lesson 32 — Elasticity and Cost Benefits of Auto-Scaling
- No unified view
- forces you to jump between machines, piecing together a story from fragments.
- Lesson 2004 — Why Centralized Logging
- No upfront hardware purchases
- Infrastructure becomes an operational expense
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the Cloud
- node affinity
- helps you place pods on specific *nodes*, **pod affinity** lets you place pods *near other pods*.
- Lesson 1351 — Pod Affinity FundamentalsLesson 1516 — Cluster Cost Optimization
- Node auto-repair and auto-upgrade
- Keeps security patches current
- Lesson 1488 — GKE Security: Private Clusters and Hardening
- Node compromise
- A breach in a privileged container = full node control
- Lesson 1394 — Privileged Containers
- Node conditions
- Inspect disk pressure, memory pressure, or PID exhaustion with `kubectl describe node`
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Node constraints
- Did you specify the pod must run on certain nodes (using labels or taints)?
- Lesson 1104 — Scheduler: Pod Placement Logic
- Node Controller
- monitors node health.
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1107 — Cloud Controller Manager
- Node Group Priorities
- When multiple node pools exist, you can configure which should scale first based on cost, performance, or availability zone preferences.
- Lesson 1510 — Cluster Autoscaler Configuration
- Node image upgrades
- replace the underlying OS and runtime on your nodes while keeping your applications running.
- Lesson 1509 — Node Image Upgrades
- Node incompatibility
- Volume requires specific node features or drivers not present
- Lesson 1302 — Troubleshooting PV and PVC Issues
- node level
- rather than as general applications.
- Lesson 1186 — DaemonSet Common Use CasesLesson 1433 — Logging Architecture in Kubernetes
- Node management
- – Choosing instance types, scaling node pools, upgrading node versions
- Lesson 1505 — Managed Kubernetes Overview
- Node Plugin
- runs as a DaemonSet—**one pod per node**.
- Lesson 1318 — CSI Architecture and ComponentsLesson 1319 — Installing and Deploying CSI Drivers
- node pool
- is a group of nodes (virtual machines) within your cluster that all share the same configuration.
- Lesson 1479 — GKE Node Pools and Machine TypesLesson 1494 — AKS Node Pools and VM Scale SetsLesson 1508 — Node Pool Management
- Node replacement
- (the preferred method) provides a clear rollback path and validates the new configuration completely before committing.
- Lesson 1506 — Cluster Upgrade Strategies
- Node selectors
- Misconfigured nodeSelector or affinity rules can exclude nodes unintentionally
- Lesson 1190 — StatefulSet and DaemonSet Troubleshooting
- Node selectors and taints
- Group workloads efficiently on cost-optimized node types
- Lesson 2984 — Container Cost Optimization
- node status
- , and **overall cluster metrics**.
- Lesson 1518 — Observability for Cluster OperationsLesson 1519 — Troubleshooting Common Cluster Issues
- Node Status Monitoring
- shows individual node health: disk pressure, memory pressure, network status, and kubelet responsiveness.
- Lesson 1518 — Observability for Cluster Operations
- Node taints
- If a node has taints that the DaemonSet doesn't tolerate, no pod will schedule there
- Lesson 1190 — StatefulSet and DaemonSet Troubleshooting
- Node-level agent
- Deploy a DaemonSet (like Fluent Bit) that reads container logs from each node and ships them to a central system
- Lesson 2049 — Kubernetes Logging Architecture
- Node-level agents
- DaemonSets like Fluent Bit collect from all pods on each node
- Lesson 2046 — Cloud-Native Logging Overview
- node-level logging agents
- collect logs from all pods on a node, sidecar containers give you **pod-specific** control.
- Lesson 1435 — Logging with Sidecar ContainersLesson 1438 — Fluentd and Fluent Bit
- NodePort
- is a Service type that extends the ClusterIP functionality by opening a specific port on every node in your Kubernetes cluster.
- Lesson 1207 — NodePort Service Type
- NoExecute
- Existing pods are evicted if they don't tolerate the taint
- Lesson 1360 — Introduction to Taints and TolerationsLesson 1361 — Taint Effects: NoSchedule, PreferNoSchedule, NoExecute
- Noisy neighbor prevention
- Keep resource-intensive pods away from each other
- Lesson 1352 — Pod Anti-Affinity Basics
- Non-critical development servers
- Lesson 104 — GCP Preemptible and Spot VMs
- Non-obvious decisions
- Why you chose a specific instance size or unusual configuration
- Lesson 717 — Documentation and Comments
- Non-transitive
- If VPC-A peers with VPC-B, and VPC-B peers with VPC-C, VPC-A cannot automatically talk to VPC-C.
- Lesson 216 — VPC Peering Fundamentals
- None mode
- does the opposite: it gives the container *no networking at all*.
- Lesson 1043 — Host and None Network Modes
- Normalization
- Different systems log events in different formats.
- Lesson 2861 — Security Information and Event Management (SIEM)
- Normalized Metrics
- Cloud providers use different units and pricing models.
- Lesson 2961 — Cost Visibility Fundamentals
- Normalized timestamps
- (converting various formats to ISO 8601)
- Lesson 2010 — Log Parsing and Enrichment
- NoSchedule
- New pods won't be scheduled here
- Lesson 1360 — Introduction to Taints and TolerationsLesson 1361 — Taint Effects: NoSchedule, PreferNoSchedule, NoExecute
- not
- used for read traffic in standard Multi-AZ.
- Lesson 417 — Multi-AZ vs Single-AZ Trade-offsLesson 793 — Backend IAM and Access ControlLesson 1007 — EXPOSE: Port DocumentationLesson 1244 — NetworkPolicy CNI RequirementsLesson 1254 — ConfigMap Volume Auto-Update with Mounted Files
- Not ideal for
- Lesson 1047 — Docker Compose Overview and Use Cases
- Notary v1
- The original implementation, battle-tested but considered legacy
- Lesson 1077 — Content Trust and Notary
- Notary v2
- Modern redesign focused on OCI standards, improved performance, and simplified architecture
- Lesson 1077 — Content Trust and Notary
- Note the RTO/RPO implications
- How quickly can you recover?
- Lesson 2450 — Single Points of Failure Identification
- Notification
- Alerts you (via scripts or APIs) when something goes wrong
- Lesson 2687 — Redis High Availability with Sentinel
- Notification Controller
- handles events and alerts.
- Lesson 1932 — Flux Controller ArchitectureLesson 1936 — Notification Controller
- Notification services
- (Slack, webhooks, email endpoints)
- Lesson 1915 — Notification and Alerting Integration
- Notification triggers
- Automated alerts at budget thresholds
- Lesson 2120 — Error Budget Policies and Decision Making
- Notification-only mode
- Keep alarms evaluating but silence the actual notifications
- Lesson 648 — Alarm Suppression and Maintenance Windows
- Notifications
- Alert teams when deployments succeed or fail
- Lesson 709 — Workflow Automation and CI/CD IntegrationLesson 1790 — Post Actions and NotificationsLesson 2901 — Policy Reporting and Remediation
- NTP amplification
- Similar technique using Network Time Protocol servers
- Lesson 2378 — DDoS Attack Types and Vectors
- number
- , and **bool**—let you define simple, single-value variables for your infrastructure configurations.
- Lesson 756 — Variable Types: PrimitivesLesson 815 — Count vs For_Each: Choosing the Right Meta- Argument
- Number of executors
- How many concurrent jobs it can handle
- Lesson 1779 — Jenkins Build Agents and Executors
- Number of secrets stored
- – Each active secret version may incur a monthly fee
- Lesson 2251 — Secrets Management Cost Optimization
- numbers
- , **booleans**, and **null values**.
- Lesson 733 — Numbers, Booleans, and Null ValuesLesson 2019 — Elasticsearch Index Templates and Mappings
- Numeric functions
- perform math operations like finding minimum/maximum values or absolute numbers
- Lesson 736 — Built-in Functions Overview
O
- OAuth 2.0
- focuses on *authorization*—granting apps limited access to user resources without sharing passwords.
- Lesson 2852 — Identity Federation and SSO
- object
- with a unique identifier (key).
- Lesson 115 — Object Storage OverviewLesson 123 — Comparing Storage Types: When to Use WhatLesson 140 — Object Storage vs. Block vs. File
- Object Lifecycle Policies
- (from lesson 158), you configure transitions as part of those rules:
- Lesson 159 — Storage Class Transitions
- Object Lock
- (AWS S3): Set retention periods where objects cannot be deleted or modified
- Lesson 2353 — Audit Log Storage and Retention
- Object mapping
- Identify equivalent features or suggest alternatives when direct translation isn't possible
- Lesson 2824 — Schema Conversion Tools
- Object storage
- replicates across multiple facilities and geographic regions
- Lesson 116 — Durability and Availability in StorageLesson 125 — Block Storage vs Other Storage TypesLesson 140 — Object Storage vs. Block vs. FileLesson 464 — Stateless Function DesignLesson 2436 — Cross-Region Replication SetupLesson 2468 — State Externalization Patterns
- Object storage credentials
- (bucket name, access keys, region)
- Lesson 1983 — Thanos Sidecar and Object Storage
- objects
- rather than files in a hierarchy (file storage) or blocks on a disk (block storage).
- Lesson 139 — What is Object Storage?Lesson 141 — Objects, Buckets, and KeysLesson 757 — Variable Types: Complex TypesLesson 818 — Working with Complex Variable Types
- Observability
- means designing your cloud infrastructure so you can see what's happening in real-time and understand *why* something went wrong—not just *that* it failed.
- Lesson 49 — Observability and Monitoring ArchitectureLesson 576 — Dead Letter QueuesLesson 625 — Observability vs MonitoringLesson 1513 — Multi-Cluster ManagementLesson 1564 — What is a Service Mesh?Lesson 1596 — Open Service Mesh (OSM) BasicsLesson 1599 — Cilium Service Mesh with eBPFLesson 1875 — Observability in GitOps (+1 more)
- Observability dashboards
- View application health, metrics, and dependencies
- Lesson 2924 — Introduction to Developer Portals
- Observability Foundation
- Lesson 624 — What Is Monitoring and Why It Matters
- Observability gaps
- Understanding what's happening across service boundaries is difficult
- Lesson 1576 — Istio Overview and Core Value Proposition
- Observability hooks
- Logging, metrics, and tracing setup
- Lesson 2929 — Software Templates and Scaffolding
- Observability plugins
- Pulling real-time metrics from Prometheus/Grafana, distributed traces from Jaeger, and logs from Elasticsearch or CloudWatch
- Lesson 2934 — Integrating CI/CD and Observability
- Observability portability
- means implementing metrics, logs, and traces using open standards that work consistently across AWS, Azure, GCP, or on-premises—without rewriting instrumentation when you change providers.
- Lesson 2774 — Observability Portability
- Observable Metrics
- Define concrete, measurable indicators of system health.
- Lesson 2492 — Steady State Hypothesis
- Observe
- Watch the cluster's current state via the API Server
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1858 — Continuous ReconciliationLesson 1869 — GitOps Reconciliation LoopLesson 2740 — Understanding Backpressure in Distributed Systems
- OCI registries
- (the same container registries that store Docker images).
- Lesson 1559 — Chart Repositories and OCI Registries
- Offset management
- tracking which messages have been processed (auto-commit or manual)
- Lesson 2609 — Kafka Producers and Consumers
- OIDC (OpenID Connect)
- Modern, token-based identity protocol built on OAuth 2.
- Lesson 395 — Cross-Provider IAM FederationLesson 1468 — IRSA: IAM Roles for Service Accounts
- OK
- – The metric is within acceptable thresholds.
- Lesson 640 — Alarm States and TransitionsLesson 670 — CloudWatch Alarms and Actions
- OK → ALARM
- Your CPU usage crosses 80% and stays there for the evaluation period you configured.
- Lesson 640 — Alarm States and Transitions
- Oldest launch template
- Remove instances using outdated configurations first
- Lesson 319 — ASG Termination Policies
- On Push (Build-Time Scanning)
- Lesson 1074 — Scan Timing and Triggers
- On schedule
- periodic rescans catch newly-discovered vulnerabilities
- Lesson 1679 — Artifact Security Scanning
- On upload
- as soon as an artifact reaches your repository (Artifactory, Nexus, Harbor)
- Lesson 1679 — Artifact Security Scanning
- On-call Engineers
- need actionable metrics front-and-center: error rates, latency percentiles, current alerts.
- Lesson 2100 — Dashboard Purpose and Audience
- On-Demand
- = reliability (always available when you need it)
- Lesson 80 — Pricing Model Selection StrategyLesson 109 — Cross-Provider Compute Feature ComparisonLesson 432 — DynamoDB Capacity Modes: Provisioned vs On-DemandLesson 2252 — What is HashiCorp Vault and Why Use ItLesson 2532 — DynamoDB Capacity Modes
- On-Demand Instances
- are like renting a hotel room by the hour—you pay for what you use with no commitment.
- Lesson 94 — AWS EC2 Launch Types and Tenancy
- On-demand mode
- automatically scales with your application's traffic.
- Lesson 432 — DynamoDB Capacity Modes: Provisioned vs On-Demand
- On-Demand Resources
- Spin up virtual machines in minutes across different **Regions and Availability Zones**, not weeks like traditional data centers.
- Lesson 13 — Infrastructure as a Service (IaaS) Overview
- On-demand self-service
- No waiting for IT approval or hardware delivery
- Lesson 34 — Business Agility: Time-to-Market Advantages
- On-demand triggers
- Manually start jobs via API or console
- Lesson 2648 — Glue Job Triggers and Workflows
- On-premises
- In your company's own data center, managed by your IT team
- Lesson 21 — Private Cloud Deployment ModelLesson 2365 — WAF Deployment Models
- On-the-fly attachment
- connect/disconnect containers without restarting them
- Lesson 1042 — Bridge Networks
- Onboarding
- New employees get one identity with appropriate access
- Lesson 383 — AWS IAM Identity Center (SSO)
- Onboarding/offboarding
- – Add new hires to appropriate groups instantly; remove departing employees just as quickly
- Lesson 349 — Groups Fundamentals
- one
- load balancer (managed by an Ingress Controller) to handle traffic for many services—saving cost and complexity.
- Lesson 1220 — Ingress vs Service Load BalancingLesson 1307 — Default StorageClassLesson 2296 — Envelope Encryption Pattern
- One connection per VPC
- Each VPC attaches once to the transit gateway
- Lesson 218 — Transit Gateway Concepts
- One instruction per line
- (though arguments can span multiple lines with `\`)
- Lesson 1000 — Dockerfile Structure and Parsing
- only
- when `environment` is "production".
- Lesson 816 — Conditional Resource CreationLesson 1227 — IngressClass ResourceLesson 1236 — Pod Selection with LabelsLesson 1345 — Labeling Nodes for SelectionLesson 1491 — AKS Architecture and Control Plane ManagementLesson 1737 — Job Rules: Basic Conditional ExecutionLesson 1749 — Only and Except (Legacy)Lesson 2659 — Athena Query Syntax and DDL
- OOMKilled Status
- Kubernetes marks the container with an OOMKilled exit reason
- Lesson 1335 — Setting Memory Limits
- OPA Gatekeeper
- , **Kyverno**, or **Kubewarden** offer more granular, customizable policy enforcement.
- Lesson 1400 — Migrating from PodSecurityPolicyLesson 1517 — Cluster Security Hardening
- OPA testing
- validates your Rego policies themselves—ensuring your compliance rules produce correct decisions:
- Lesson 2346 — Compliance Testing and Validation
- Open
- Failure threshold exceeded, requests fail immediately
- Lesson 501 — Circuit Breaker PatternLesson 2506 — Circuit Breaker for Functions
- Open (Failing)
- After failures exceed a threshold, the breaker "trips.
- Lesson 2588 — Circuit Breaker Pattern
- Open (Tripped)
- After exceeding failure thresholds, the breaker stops sending requests and immediately returns errors.
- Lesson 1612 — Circuit Breaking PatternsLesson 2581 — Circuit Breaker Pattern
- Open Policy Agent
- , **Cloud Custodian**, **Azure Policy**, **GCP Organization Policy Service**, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
- Lesson 2345 — Continuous Compliance Scanning
- Open Policy Agent (OPA)
- or a custom authorization server).
- Lesson 1626 — External Authorization IntegrationLesson 2886 — Compliance Testing with Open Policy Agent
- OpenAPI/Swagger definitions
- describing endpoints, parameters, and schemas
- Lesson 2931 — API Discovery and Documentation
- OpenTelemetry
- provides a vendor-neutral SDK and API for instrumenting applications.
- Lesson 2774 — Observability Portability
- OpenTelemetry (OTel)
- is a unified, vendor-neutral observability framework that provides a single set of APIs, SDKs, and tools for collecting **traces, metrics, and logs** across all major programming languages and platforms.
- Lesson 2073 — What is OpenTelemetry and Why It Matters
- OpenTelemetry Collector
- is a vendor-agnostic agent that sits between your instrumented applications and your observability platforms.
- Lesson 2081 — OpenTelemetry Collector Fundamentals
- Operating expenses (OpEx)
- Power, cooling, physical security, staff salaries
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the Cloud
- Operating System Boot Volumes
- The root disk where your OS lives typically uses block storage
- Lesson 113 — Block Storage Overview
- operating system image
- (or **machine image**) as a snapshot or blueprint of a complete computer system frozen in time.
- Lesson 54 — Operating System Images and AMIsLesson 55 — Public vs Private Images
- Operating System Image (AMI)
- that contains the base OS and any pre-installed software.
- Lesson 81 — VM Launch Process and Initialization
- Operational complexity
- Fewer moving parts to configure and troubleshoot
- Lesson 1599 — Cilium Service Mesh with eBPFLesson 2045 — Comparing Logging Solution Trade-offsLesson 2756 — Multicloud Challenges: Complexity and Management Overhead
- Operational dashboards
- help on-call engineers diagnose incidents in real-time
- Lesson 2100 — Dashboard Purpose and Audience
- Operational Expenditure (OpEx)
- is ongoing spending for services consumed over time.
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud ComputingLesson 2799 — TCO Analysis for Migration
- Operational overhead
- Every team implementing their own resilience patterns (retries, timeouts, circuit breakers) leads to inconsistency
- Lesson 1576 — Istio Overview and Core Value Proposition
- Operational policies
- backup requirements, monitoring standards
- Lesson 2900 — Policy Libraries and Reusability
- Operational predictability
- Desired capacity sets your baseline
- Lesson 310 — Capacity Limits and Constraints
- Operational skills
- Small teams benefit from higher-level services (PaaS); large DevOps teams can optimize with lower-level control (IaaS)
- Lesson 110 — Compute Service Selection Criteria
- Operational standards
- (monitoring, logging, backup configuration)
- Lesson 2918 — Self-Service vs. Full Autonomy
- Operations
- Create, update, or delete actions across all instances
- Lesson 883 — StackSets FundamentalsLesson 2689 — Memcached Fundamentals
- Operations Lead
- Lesson 2133 — Incident Command System
- operators
- to define matching logic between label values.
- Lesson 1349 — Node Affinity OperatorsLesson 1963 — Instant Vector SelectorsLesson 2033 — ELK/EFK on Kubernetes
- Operators beyond equality
- (In, NotIn, Exists, DoesNotExist, Gt, Lt)
- Lesson 1346 — Node Affinity vs Node Selector
- OpEx model
- where you only pay for what you actually consume.
- Lesson 33 — Cloud Cost Optimization: Right-Sizing Resources
- OpEx savings
- compared to previous CapEx spending
- Lesson 37 — Measuring Cloud Business Value: KPIs and Metrics
- Opinionated simplicity
- Focused feature set that covers essential mesh capabilities without bloat
- Lesson 1596 — Open Service Mesh (OSM) Basics
- Opsgenie
- (now part of Atlassian) provides similar incident routing but integrates tightly with Jira and other Atlassian tools, making it ideal for teams already in that ecosystem.
- Lesson 2132 — Incident Management Tools
- Optimal file sizes
- (typically 128MB–1GB) let query engines efficiently distribute work across multiple workers while minimizing metadata overhead.
- Lesson 2641 — Data Lake Performance Optimization
- Optimization
- is finding ways to reduce costs without sacrificing performance or reliability.
- Lesson 2137 — Cost Management Fundamentals
- Optimization blindness
- You can't compare apples-to-apples whether a workload would cost less on AWS vs Azure when pricing models are fundamentally different
- Lesson 2757 — Multicloud Challenges: Cost Management and Visibility
- Optimization potential
- Right-sizing, reserved instances, spot instances
- Lesson 2799 — TCO Analysis for Migration
- Optimization strategies
- Lesson 1489 — GKE Cost Optimization and Bin Packing
- Optimize algorithms
- Replace nested loops with hash maps.
- Lesson 2547 — Execution Duration Optimization
- Optimize initialization
- Move SDK clients and database connections outside handler functions
- Lesson 2983 — Serverless Cost Optimization Patterns
- Optimize read models
- for query performance, using denormalized views or materialized data
- Lesson 2597 — CQRS Pattern
- Optimize refresh intervals
- Don't set every panel to refresh every 5 seconds.
- Lesson 2003 — Grafana Best Practices and Performance
- Optimize transfer paths
- Lesson 2786 — Data Transfer Costs and Optimization
- Optimized CPU cache
- for faster data access during calculations
- Lesson 67 — Compute Optimized Instance Types
- Optimized models
- Command database can be normalized; query databases can be denormalized for speed
- Lesson 574 — CQRS Pattern with Events
- Optional arguments
- Values you *can* provide to customize behavior, but they have reasonable defaults if omitted.
- Lesson 740 — Resource Arguments and Attributes
- Optional but powerful
- Lesson 947 — Template Structure and YAML Syntax
- Oracle Database
- Lesson 398 — Supported Database Engines
- Oracle databases
- might offer options like advanced security or data compression
- Lesson 404 — Option Groups for Engine Features
- Orange (~)
- Existing resources to be modified
- Lesson 903 — Template Validation and What-If OperationsLesson 917 — Deployment What-If Operations
- ORC
- that compress well and enable column pruning—reading only the fields you need.
- Lesson 2625 — Batch Processing OptimizationLesson 2632 — File Formats for AnalyticsLesson 2662 — Athena Performance Optimization
- orchestration
- capabilities.
- Lesson 512 — Azure Functions: Durable FunctionsLesson 575 — Event Choreography vs OrchestrationLesson 580 — Saga Pattern for Distributed TransactionsLesson 2440 — Automated DR OrchestrationLesson 2513 — Saga Pattern for Distributed TransactionsLesson 2527 — Saga Pattern in ServerlessLesson 2580 — Saga Pattern for Distributed TransactionsLesson 2586 — Saga Pattern for Distributed Transactions (+2 more)
- Orchestration fits better when
- Lesson 575 — Event Choreography vs Orchestration
- Orchestration Functions
- coordinate other functions using simple code that looks synchronous but runs asynchronously:
- Lesson 512 — Azure Functions: Durable Functions
- Orchestration service polling overhead
- Lesson 2552 — Function Chaining and Orchestration Efficiency
- Orchestrator Pattern
- uses a central state machine to coordinate multiple serverless functions in a defined sequence.
- Lesson 2512 — Orchestrator Pattern with Step Functions
- Order Service
- – handles order creation and tracking
- Lesson 2560 — Service Boundaries and DecompositionLesson 2587 — Compensating Transactions
- Order-dependent
- Execute in reverse order of original saga steps
- Lesson 2735 — Compensating Transactions
- Ordered deployment and scaling
- Pods start sequentially (`0`, then `1`, then `2`), ensuring dependencies are satisfied.
- Lesson 2470 — Stateful Set Patterns in Kubernetes
- OrderedReady
- and **Parallel**—that control how StatefulSet pods are created, updated, and deleted.
- Lesson 1184 — StatefulSet Pod Management Policies
- Ordering
- Maintaining event sequence within partitions
- Lesson 2602 — Streaming Architecture PatternsLesson 2737 — Multi-Region Event Distribution
- Organization
- Group VMs by project, team, or purpose (e.
- Lesson 63 — VM Tags and Resource OrganizationLesson 169 — Object Tagging and MetadataLesson 171 — Virtual Network ConceptsLesson 391 — GCP IAM Overview and HierarchyLesson 905 — Tags and Resource MetadataLesson 2344 — GCP Organization Policy Service
- Organization and Visibility
- Lesson 92 — VM Tagging and Organization
- Organization Policies
- at any level to restrict resource configurations (like "deny public IPs" or "allowed regions").
- Lesson 2361 — Cloud Governance Tools Overview
- Organization-Level Trails
- Cloud providers offer organization-wide logging configurations that automatically capture events from all member accounts without per-account setup.
- Lesson 2354 — Centralized Audit Log Aggregation
- Organize by application
- or team (payments-keyring, analytics-keyring)
- Lesson 2318 — GCP Cloud KMS Structure and Key Rings
- Organize fields
- lets you rename columns, reorder them, or hide unnecessary ones—essential for making data human-readable.
- Lesson 1999 — Transformations and Data Processing
- Organize resources logically
- Put web servers in one subnet, databases in another, internal tools in a third
- Lesson 175 — Subnet Fundamentals
- Origin must support ranges
- your origin server sends proper `Accept-Ranges: bytes` and `Content-Range` headers
- Lesson 606 — Range Requests and Partial Content
- Origin protection
- Shields origin from traffic spikes and DDoS attacks
- Lesson 584 — Origin Servers and Edge CachingLesson 591 — Origin Shield and Cache Hierarchies
- Origin Request
- Lesson 618 — Edge Function Triggers and Events
- Origin Response
- Lesson 618 — Edge Function Triggers and Events
- Origin Server
- Your source of truth (your application servers or storage)
- Lesson 583 — CDN Architecture and Points of PresenceLesson 584 — Origin Servers and Edge Caching
- Origin servers
- are your centralized data centers where the authoritative version of content lives and complex processing happens.
- Lesson 611 — Edge vs. Origin: The Request Flow
- Origin Shield
- acts as an extra protective caching layer between edge servers and your origin, reducing load and improving cache efficiency.
- Lesson 591 — Origin Shield and Cache HierarchiesLesson 2681 — Multi-Tier Caching with CDN
- Origin-appropriate workloads
- Lesson 611 — Edge vs. Origin: The Request Flow
- Orphan deletion
- Children are left behind (owner reference removed but objects remain)
- Lesson 1125 — Owner References and Garbage Collection
- Orphaned access
- Former employees still listed in groups
- Lesson 360 — Auditing Group and Role Membership
- Orphaned Resources
- You remove a resource from Git, but it remains running in the cluster, consuming resources and potentially causing conflicts.
- Lesson 1886 — Self-Heal and Prune Options
- OS Package Vulnerabilities
- Lesson 1072 — Container Image Vulnerability Landscape
- OTel Collector
- can be deployed in two primary patterns:
- Lesson 2086 — OpenTelemetry in Kubernetes Environments
- Other Common Parameters
- include `work_mem` (memory for sorts/joins), `effective_cache_size` (helps query planner estimate available OS cache), and logging levels that balance observability with overhead.
- Lesson 451 — Database Parameter Tuning
- Other useful commands
- Lesson 1056 — Compose CLI Commands
- Out-of-order arrival
- Events from 10:05 might arrive after events from 10:10
- Lesson 2604 — Event Time vs Processing Time
- Outbound
- Translates private IP addresses to public IPs for resources making requests to the internet
- Lesson 187 — Internet Gateway FundamentalsLesson 196 — NAT Instance Configuration
- Outbound rules
- allow traffic to your destination (typically `0.
- Lesson 200 — Troubleshooting Internet ConnectivityLesson 211 — Default Security Group BehaviorLesson 406 — Security Groups for Database Access
- Outbound traffic
- What your instance can connect *to* (e.
- Lesson 202 — Security Group FundamentalsLesson 1578 — Istio Data Plane and Envoy Proxies
- Outcome
- Success or failure
- Lesson 344 — IAM Audit and Compliance LoggingLesson 2865 — CloudTrail and Audit Logging for Security
- Outdated configurations
- Old machine types that cost more than newer equivalents
- Lesson 2180 — GCP Recommender and Cost Insights
- OutOfSync
- Differences detected between Git and cluster (manual changes, drift, or new commits)
- Lesson 1885 — Application Health and Sync Status
- Output
- modifies the final log line content.
- Lesson 2037 — Promtail Log Collection and PipelinesLesson 2039 — Fluentd Plugins and Output Configuration
- Output artifact name
- (the code bundle passed to subsequent stages)
- Lesson 1840 — Source Stage Configuration
- Output bindings
- send data from your function (like writing to storage).
- Lesson 511 — Azure Functions: Bindings and Triggers
- Output plugins
- are the shipping departments that send finished products (structured logs) to their destinations
- Lesson 2021 — Logstash Architecture and PipelinesLesson 2024 — Fluentd Architecture and Design
- Output values
- allow you to explicitly expose the information you care about, making it visible after `terraform apply` completes.
- Lesson 764 — Introduction to Outputs
- Outputs
- Values you've declared to be exposed
- Lesson 775 — State File Contents and StructureLesson 847 — Template Structure and SectionsLesson 857 — CloudFormation Console and Stack ManagementLesson 859 — CloudFormation Template AnatomyLesson 894 — ARM Template Structure and JSON SyntaxLesson 899 — Outputs for Template ResultsLesson 909 — Deployment Scripts in ARM TemplatesLesson 916 — Outputs and Cross-Template Communication (+5 more)
- outside
- your function handler persist between invocations in the same context.
- Lesson 480 — Function Execution Context and ReuseLesson 482 — Function Initialization and Handler CodeLesson 2293 — Key Import and External Key StoresLesson 2541 — Database Connection Pooling for ServerlessLesson 2548 — Connection Pooling and Reuse
- Over-attributing spans
- Excessive tags/attributes increase payload size
- Lesson 2087 — Best Practices and Performance Considerations
- Over-provisioning
- means paying for capacity you don't use (a 16-core server when 4 cores would suffice).
- Lesson 33 — Cloud Cost Optimization: Right-Sizing ResourcesLesson 286 — What is Auto ScalingLesson 2155 — Auto Scaling for Cost Efficiency
- Overage charges
- Additional backup storage beyond that free allocation incurs per-GB monthly fees (usually cheaper than standard block storage but still significant at scale).
- Lesson 426 — Backup Storage and Costs
- Overall pipeline status
- (running, passed, failed, canceled)
- Lesson 1739 — Pipeline Visualization and Job Logs
- Overlap periods
- keep old credentials valid briefly during rotation to avoid connection failures
- Lesson 2279 — Secrets Rotation in Containers
- Overlay networks
- solve this by creating a virtual network layer that spans multiple Docker hosts, letting containers communicate transparently no matter where they physically run.
- Lesson 1045 — Overlay Networks for Multi-Host
- Overlays or kustomizations
- (different manifests per environment)
- Lesson 1867 — Branching Strategies for GitOps
- Overly permissive grants
- Policies using broad wildcards like `*` on sensitive actions
- Lesson 372 — Access Analyzer for Policy Review
- override
- these defaults in two flexible ways: using custom values files or command-line flags.
- Lesson 1529 — Values: Customizing Chart DeploymentsLesson 1705 — Environment Variables: Workflow and Job Level
- Override values
- Pass configuration to child charts through your parent `values.
- Lesson 1545 — Chart Dependencies
- Overwrite protection
- Retrieve any previous version if the latest is corrupted or wrong
- Lesson 156 — Object Versioning Fundamentals
- Own the lifecycle
- of that infrastructure—Terraform will create, update, and destroy it
- Lesson 753 — When to Use Resources vs Data Sources
- Owner
- Full control over everything—can manage resources *and* assign permissions to others.
- Lesson 387 — Azure Built-in RolesLesson 392 — GCP IAM Roles: Basic, Predefined, CustomLesson 2143 — Azure Cost Management Tags
- Owner references
- are metadata links that establish parent-child relationships between these objects.
- Lesson 1125 — Owner References and Garbage Collection
P
- P0 (Critical)
- Complete service outage or data loss affecting all or most users.
- Lesson 2129 — Incident Severity Levels
- P1 (High)
- Major functionality degraded or significant user segment affected.
- Lesson 2129 — Incident Severity Levels
- P2 (Medium)
- Partial service degradation, workarounds exist, or minor feature broken.
- Lesson 2129 — Incident Severity Levels
- P3 (Low)
- Minor issues, cosmetic bugs, or non-urgent operational tasks.
- Lesson 2129 — Incident Severity Levels
- P4 (Minimal)
- Feature requests, documentation issues, or "nice-to-haves.
- Lesson 2129 — Incident Severity Levels
- p50 (median)
- Half of requests were faster, half slower
- Lesson 635 — Percentiles vs AveragesLesson 1640 — Performance Metrics and Histograms
- p95
- 95% of requests completed within this time; only 5% were slower
- Lesson 635 — Percentiles vs AveragesLesson 1640 — Performance Metrics and Histograms
- p99
- 99% completed within this time; only the worst 1% exceeded it
- Lesson 635 — Percentiles vs AveragesLesson 1640 — Performance Metrics and Histograms
- PaaS
- You manage applications only
- Lesson 17 — Function as a Service (FaaS) IntroductionLesson 18 — Container as a Service (CaaS) IntroductionLesson 2842 — Shared Responsibility Model
- Package manager caches
- When you install software, package managers often cache downloads.
- Lesson 985 — Layer Size and Bloat
- Package manager dependencies
- (npm, pip, Maven, Gradle)
- Lesson 1719 — Caching Dependencies and Build Artifacts
- Package Managers
- Use APT (Debian/Ubuntu) or YUM (RHEL/CentOS) for traditional server installations.
- Lesson 1993 — Installing and Configuring Grafana
- Package Restrictions
- Block images containing blacklisted packages or require specific versions of critical libraries.
- Lesson 1084 — Compliance and Policy Enforcement
- Package Size Optimization
- Lesson 492 — Minimizing Cold Start Duration
- Packaging and Reusability
- A single Chart can deploy entire applications.
- Lesson 1520 — What is Helm and Why Use It?
- Packet and byte counts
- (volume of traffic)
- Lesson 213 — Network Security Logging and MonitoringLesson 2183 — VPC Flow Logs
- packet loss
- is how many cars mysteriously disappear en route.
- Lesson 2185 — Latency and Performance MetricsLesson 2225 — Network Performance Metrics and MeasurementLesson 2227 — Network Path Analysis and TracerouteLesson 2495 — Network Chaos Patterns
- Packet loss and jitter
- Critical metrics that reveal physical link quality issues
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Packet-per-second (PPS)
- rate measures how many individual data packets your instance can handle.
- Lesson 72 — Network Performance Across Instance Types
- Page during business hours
- 5% budget consumed in 6 hours (6x burn) + confirmed over 30 minutes
- Lesson 2121 — Multi-Window and Multi-Burn-Rate Alerting
- Page immediately
- 2% budget consumed in 1 hour (14.
- Lesson 2121 — Multi-Window and Multi-Burn-Rate Alerting
- PagerDuty
- is the industry leader, offering sophisticated alert routing, escalation policies, and deep integrations with monitoring systems.
- Lesson 2132 — Incident Management Tools
- PagerDuty/OpsGenie
- Professional on-call management systems
- Lesson 646 — Alarm Actions and NotificationsLesson 647 — Notification ChannelsLesson 2869 — Security Alerts and Notification Workflows
- panel
- the building block of dashboards.
- Lesson 1995 — Creating Your First DashboardLesson 1996 — Panel Types and Visualizations
- Parallel
- that control how StatefulSet pods are created, updated, and deleted.
- Lesson 1184 — StatefulSet Pod Management PoliciesLesson 1845 — Parallel and Sequential Stage ExecutionLesson 2517 — AWS Step Functions OverviewLesson 2521 — Parallel and Map States
- Parallel API calls
- Query multiple external services simultaneously
- Lesson 2503 — Fan-Out/Fan-In Pattern
- Parallel backups
- Maintain independent backup systems for both source and target environments during the migration window.
- Lesson 2817 — Disaster Recovery During Migration
- Parallel Development
- Frontend teams can build against API contracts while backend teams implement services
- Lesson 545 — Mock Integrations and Testing
- Parallel execution
- reduces feedback time from hours to minutes.
- Lesson 841 — Testing at Scale with TerratestLesson 1792 — Parallel Stage ExecutionLesson 2512 — Orchestrator Pattern with Step FunctionsLesson 2516 — Step Functions and State Machines
- Parallel Execution Pattern
- breaks this constraint by identifying stages that don't depend on each other and running them simultaneously.
- Lesson 1658 — Parallel Execution PatternLesson 1659 — Fan-Out/Fan-In Pattern
- Parallel processing
- Different services handling the same event differently
- Lesson 551 — Queue vs Topic PatternLesson 559 — SQS-SNS Fan-Out PatternLesson 2018 — Elasticsearch Fundamentals for Logging
- Parallel Run Approach
- means building new Terraform-managed infrastructure alongside legacy systems, testing thoroughly, then cutting over.
- Lesson 844 — Migration Strategies for Legacy Infrastructure
- Parallel state
- lets you execute multiple workflow branches at the same time.
- Lesson 2521 — Parallel and Map States
- Parallelism
- Upload multiple parts at once for faster transfers
- Lesson 166 — Multipart UploadLesson 1191 — Kubernetes Job Resource FundamentalsLesson 1192 — Job Completion Modes and Parallelism
- Parallelize when possible
- Make concurrent API calls instead of sequential ones.
- Lesson 2547 — Execution Duration Optimization
- Parameter Store
- (part of Systems Manager) offers a simpler, cost-effective option for both plain configuration and encrypted secrets, though without automatic rotation.
- Lesson 508 — AWS Lambda: Environment Variables and SecretsLesson 1827 — Environment Variables and Parameter Store
- Parameterize Everything Variable
- Hardcoded values make templates brittle.
- Lesson 919 — ARM Template Best Practices and Validation
- Parameterize policies
- Use variables for organization-specific values (allowed regions, account IDs, tag requirements) so teams can customize without forking.
- Lesson 2347 — Policy Libraries and Reusability
- Parameters
- Add dropdowns, time pickers, and text inputs that filter your entire workbook.
- Lesson 678 — Azure Monitor WorkbooksLesson 697 — Configuration Files and SyntaxLesson 847 — Template Structure and SectionsLesson 853 — Parameters for Template ReusabilityLesson 857 — CloudFormation Console and Stack ManagementLesson 859 — CloudFormation Template AnatomyLesson 883 — StackSets FundamentalsLesson 894 — ARM Template Structure and JSON Syntax (+4 more)
- Parent image build
- `ONBUILD` instructions are registered but not executed
- Lesson 1014 — ONBUILD: Triggered Instructions
- Parent layers
- → Any layers between the base and your current layer
- Lesson 978 — Base Images and Parent Layers
- Parent template structure
- Lesson 881 — Nested Stacks
- Parquet
- or **ORC** that compress well and enable column pruning—reading only the fields you need.
- Lesson 2625 — Batch Processing OptimizationLesson 2632 — File Formats for AnalyticsLesson 2662 — Athena Performance Optimization
- parse
- them into structured fields and **enrich** them with additional context.
- Lesson 2010 — Log Parsing and EnrichmentLesson 2040 — Fluent Bit for Kubernetes Logging
- Parser
- Converts unstructured log text into structured JSON.
- Lesson 2026 — Fluentd Configuration and Parsing
- Parsing
- Transform unstructured text into structured fields.
- Lesson 665 — Log Aggregation PipelinesLesson 1438 — Fluentd and Fluent Bit
- Partial Restores
- test specific components without full environment rebuilds—like restoring a single table from a database backup or a critical configuration file.
- Lesson 2428 — Backup Validation and Testing
- Participant accounts
- get permission to launch resources (like EC2 instances) into specific subnets
- Lesson 230 — Shared VPCs and Multi-Account Networking
- Partition
- Large-scale distributed workloads
- Lesson 106 — AWS Placement GroupsLesson 1183 — Partition-Based Rolling Updates
- Partition first
- (coarse filter), **then cluster** (fine filter).
- Lesson 2665 — BigQuery Data Organization
- partition key
- is a single attribute that DynamoDB uses both to identify your item *and* to decide which physical server (partition) stores it.
- Lesson 431 — DynamoDB Primary Keys and Partition KeysLesson 438 — Cosmos DB Partitioning and Request UnitsLesson 2607 — Stream Partitioning and Parallelism
- Partition keys
- solve this by dividing events into separate lanes (partitions).
- Lesson 578 — Event Ordering and PartitioningLesson 2718 — Message Ordering and Partitioning
- Partition on filter columns
- Use columns frequently in your `WHERE` clauses.
- Lesson 2661 — Athena Partitioning Strategies
- Partition Tolerance
- The system continues operating despite network splits
- Lesson 2466 — Stateful Services: Challenges and Trade-offs
- Partition-based versioning
- New data lands in versioned partitions (e.
- Lesson 2638 — Schema Evolution and Versioning
- Partitioning
- (Optional but Common)
- Lesson 129 — Volume Initialization and FormattingLesson 438 — Cosmos DB Partitioning and Request UnitsLesson 455 — Partitioning and Sharding StrategiesLesson 2622 — Batch Data Partitioning
- Partitioning strategy
- deciding which partition receives each message (round-robin, key-based hashing, or custom)
- Lesson 2609 — Kafka Producers and Consumers
- partitions
- ordered, immutable sequences of messages.
- Lesson 2608 — Introduction to Apache KafkaLesson 2645 — Glue Data Catalog Fundamentals
- pass
- , **fail**, or **advisory** (warning)
- Lesson 837 — Policy Enforcement with SentinelLesson 2517 — AWS Step Functions Overview
- Pass surveillance audits
- (periodic checks to maintain certification)
- Lesson 2325 — ISO 27001 Information Security
- Past tense verbs
- Events describe something that already happened
- Lesson 569 — Event Types and Naming Conventions
- PATCH
- (x.
- Lesson 811 — Module Versioning Best PracticesLesson 843 — Module Registry and VersioningLesson 1117 — RESTful API ConventionsLesson 1532 — Helm Versioning and Chart VersionsLesson 1549 — Chart Packaging and VersioningLesson 1673 — Artifact Versioning Strategies
- Patching and updates
- – Security fixes and version upgrades applied automatically
- Lesson 396 — Introduction to Managed Relational Databases
- path
- (e.
- Lesson 250 — HTTP Header and Method-Based RoutingLesson 329 — MIG Health Checks and AutohealingLesson 1423 — HTTP Probe Configuration
- Path patterns
- (`/api/*` goes to API servers, `/images/*` to image servers)
- Lesson 245 — Introduction to Application Load Balancers (ALB)Lesson 600 — Cache Invalidation and Purging
- Path-Based Routing
- you've already learned, advanced routing combines *multiple* content attributes:
- Lesson 275 — Content-Based Routing and Path RulesLesson 1219 — Ingress Resource Fundamentals
- Paths
- let you route different URL endpoints to different backend Services—all through a single external entry point.
- Lesson 1223 — Basic Ingress Rules and PathsLesson 1624 — Request-Level Authorization
- Pattern choice
- Active-Active Multi-Region works beautifully
- Lesson 2445 — DR for Stateful vs Stateless Apps
- Pattern complexity
- Warm Standby or Hot Standby typically required
- Lesson 2445 — DR for Stateful vs Stateless Apps
- Pattern example
- `{organization}-{environment}-{service}-{resource-type}-{region}`
- Lesson 713 — Naming Conventions and Standards
- Pattern matching
- Use regular expressions or grok patterns to extract fields like IP addresses, timestamps, or HTTP status codes
- Lesson 660 — Log Parsing and EnrichmentLesson 1443 — Log Sampling and FilteringLesson 2685 — Redis Pub/Sub and Messaging
- Paved Roads
- (covered in previous lessons), you create pre-approved, automated workflows.
- Lesson 2918 — Self-Service vs. Full Autonomy
- Pay-As-You-Go
- Only pay for what you use—storage space, compute hours, and network bandwidth.
- Lesson 13 — Infrastructure as a Service (IaaS) OverviewLesson 1820 — Pricing Model for AWS Code Services
- pay-as-you-go pricing
- paying only for what you use with no long-term commitment.
- Lesson 31 — Reserved Capacity and Savings PlansLesson 34 — Business Agility: Time-to-Market AdvantagesLesson 35 — Global Reach and Market Expansion Benefits
- pay-as-you-go pricing model
- you learned earlier, the cost benefits become clear:
- Lesson 32 — Elasticity and Cost Benefits of Auto-ScalingLesson 40 — Elasticity and Auto-Scaling Concepts
- Pay-per-GB pricing
- – dramatically cheaper than traditional storage
- Lesson 2630 — Object Storage as Data Lake Foundation
- Pay-per-query model
- You're charged based on data scanned or compute resources used per query, not for idle infrastructure sitting around 24/7.
- Lesson 2656 — Serverless Query Engine Overview
- Pay-per-use
- Charged only for build minutes consumed
- Lesson 1812 — CodeBuild: Managed Build Service OverviewLesson 1822 — CodeBuild Overview and Core Concepts
- Pay-per-use pricing
- Only pay for resources you actually consume
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the CloudLesson 2530 — Serverless Database Concepts
- Payload optimization
- Returning only fields the specific frontend needs
- Lesson 2577 — Backend for Frontend (BFF) Pattern
- Payload Size Restrictions
- limit how much data you can pass into or return from a function.
- Lesson 469 — Function Timeouts and Limits
- Payment gateway
- Mission-critical → RTO: 15 min, RPO: 0 (real-time replication)
- Lesson 2410 — Business Impact Analysis (BIA)
- Payment option
- All upfront, partial upfront, or no upfront (all upfront = biggest discount)
- Lesson 74 — Reserved Instance Pricing
- Payment Service
- – processes payments
- Lesson 2560 — Service Boundaries and DecompositionLesson 2587 — Compensating Transactions
- PCI DSS
- , **HIPAA**, and **GDPR** attestations for their infrastructure.
- Lesson 2329 — Cloud Provider Compliance CertificationsLesson 2330 — Compliance Inheritance ModelLesson 2353 — Audit Log Storage and Retention
- PCI-DSS
- , and **SOC 2** mandate specific log retention periods, encryption standards, and data handling practices.
- Lesson 2014 — Log Security and Compliance
- Peer group comparison
- Behavior inconsistent with similar roles (e.
- Lesson 2858 — Behavioral Analytics and Anomaly Detection
- Pending
- Your VM is being created and initialized.
- Lesson 82 — VM States and State TransitionsLesson 295 — Instance Lifecycle in Auto ScalingLesson 1291 — PV and PVC Binding ProcessLesson 1354 — Required vs Preferred Pod Affinity
- Per-instance deployment
- Each service instance gets its own sidecar, ensuring distributed control
- Lesson 1566 — The Sidecar Proxy Pattern
- Per-IP limits
- 100 requests per minute from any single IP
- Lesson 282 — Rate Limiting and Throttling at Load Balancer
- Per-object keys
- Multi-tenant scenarios or varying data sensitivity
- Lesson 2303 — Object Storage Encryption Options
- Per-user limits
- 1,000 API calls per hour per authenticated user
- Lesson 282 — Rate Limiting and Throttling at Load Balancer
- Percentage sampling
- Keep 10% of all traces randomly
- Lesson 2083 — Sampling Strategies in OpenTelemetry
- Perfect for auto-scaling
- Works beautifully with the elasticity patterns you've learned
- Lesson 42 — Stateless Application Design
- Performance
- Regions let you place your application closer to your users.
- Lesson 9 — Regions and Availability ZonesLesson 45 — Multi-AZ and Multi-Region DesignsLesson 220 — VPC Endpoints for AWS ServicesLesson 221 — PrivateLink and Service EndpointsLesson 231 — What is Load Balancing?Lesson 417 — Multi-AZ vs Single-AZ Trade-offsLesson 834 — State File PartitioningLesson 1033 — Docker Storage Drivers (+11 more)
- Performance analysis
- Study traffic patterns without adding overhead to production workloads
- Lesson 229 — VPC Traffic MirroringLesson 1638 — Log Formats and Customization
- Performance and Availability
- Applications experience minimal write latency since they're not blocked waiting for distant replicas.
- Lesson 2480 — Asynchronous Replication Patterns
- performance baselines
- the "normal" behavior you compare against when investigating issues.
- Lesson 2235 — Network Performance MonitoringLesson 2908 — Application Recovery Testing
- Performance Benchmarking
- Measure response times, throughput, and resource utilization across clouds.
- Lesson 2776 — Portability Testing and Validation
- Performance Dashboard
- (packet loss and latency metrics), and **Firewall Insights** (identifies shadowed or unused firewall rules).
- Lesson 2194 — Provider-Specific Network Insights
- Performance data
- Request/limit compliance, resource bottlenecks
- Lesson 1500 — AKS Monitoring with Azure Monitor
- Performance debugging
- becomes nearly impossible when you can't see how a request flows through five different services.
- Lesson 2004 — Why Centralized Logging
- Performance degradation
- happens when Terraform must evaluate thousands of resources in a single state file.
- Lesson 831 — Scaling Challenges and Patterns
- Performance flexibility
- Combine similar instance types (same vCPU/memory ratios) to maintain consistent performance.
- Lesson 309 — Mixed Instance Policies
- Performance Impact
- Lesson 1600 — Service Mesh Selection Criteria
- Performance improvements
- – Kubernetes doesn't need to watch for changes, reducing API server load (significant in clusters with thousands of ConfigMaps)
- Lesson 1255 — Immutable ConfigMaps
- Performance isolation
- is critical—you don't want "noisy neighbors" affecting your workload
- Lesson 108 — GCP Sole-Tenant Nodes
- Performance Metrics
- Remember IOPS, throughput, and latency from earlier lessons?
- Lesson 136 — Volume Monitoring and MetricsLesson 1324 — Volume Metrics and Monitoring
- Performance Optimization
- Lesson 624 — What Is Monitoring and Why It Matters
- Performance requirements
- You need faster build times with more powerful machines or persistent caching across runs
- Lesson 1690 — Self-hosted Runners OverviewLesson 2794 — Refactor/Re-architect Strategy
- Performance thresholds
- Is response time degraded beyond acceptable limits?
- Lesson 2482 — Failover Detection Mechanisms
- Performance Tier
- (`fast-ssd`): High-IOPS SSDs for databases, caching layers, and latency-sensitive applications.
- Lesson 1314 — Multiple StorageClasses Strategy
- Performance tuning
- Adjust IOPS or throughput limits independently of size on certain volume types, fine-tuning for your workload's access patterns.
- Lesson 133 — Volume Resizing and ModificationLesson 1315 — StorageClass Mount Options
- Periodic Test Restores
- Actually restore data from the DR site to a test environment and run application-level integrity checks.
- Lesson 2444 — Data Consistency Validation
- Permanent
- Legacy systems that can't refresh credentials, certain service-to-service authentication (though even this is moving away)
- Lesson 341 — Temporary vs Permanent Credentials
- Permanent credentials
- are like having a master key that never expires.
- Lesson 341 — Temporary vs Permanent Credentials
- Permanent Deletion
- – After the waiting period, the key is irreversibly destroyed.
- Lesson 2291 — Key Deletion and Recovery
- Permission changes
- Rapid privilege escalations or role modifications
- Lesson 2858 — Behavioral Analytics and Anomaly Detection
- Permissions
- Pod security context conflicts with volume ownership
- Lesson 1302 — Troubleshooting PV and PVC Issues
- Permissive mode
- allows both mTLS and plain-text traffic.
- Lesson 1621 — Enabling mTLS in IstioLesson 1622 — mTLS Migration Strategies
- Persistence
- you can detach and reattach them to different VMs
- Lesson 61 — Root and Additional Storage VolumesLesson 657 — Centralized Logging ConceptsLesson 1004 — WORKDIR: Setting Working DirectoryLesson 1102 — API Server: The Cluster GatewayLesson 1405 — Admission Control OverviewLesson 2689 — Memcached Fundamentals
- persistent
- and **ephemeral** (also called volatile).
- Lesson 111 — Storage Fundamentals: Persistence and VolatilityLesson 113 — Block Storage Overview
- Persistent hostname
- that remains constant across pod restarts
- Lesson 1178 — Pod Identity in StatefulSets
- Persistent storage
- keeps your data even when a VM stops, reboots, or terminates.
- Lesson 111 — Storage Fundamentals: Persistence and VolatilityLesson 397 — RDS Architecture and ComponentsLesson 1176 — StatefulSet FundamentalsLesson 1287 — Storage Challenges in ContainersLesson 1917 — ArgoCD High Availability Setup
- Persistent storage binding
- PersistentVolumeClaims are created per-pod and survive pod deletion, preserving state even during reschedules.
- Lesson 2470 — Stateful Set Patterns in Kubernetes
- Persistent volumes
- (block storage like AWS EBS, Azure Managed Disks, or GCP Persistent Disks) exist independently from your VM.
- Lesson 121 — Ephemeral vs Persistent Volumes in Cloud
- PersistentVolume (PV)
- is a piece of storage in your Kubernetes cluster that has been provisioned by an administrator or created dynamically using Storage Classes.
- Lesson 1289 — PersistentVolume (PV) Fundamentals
- PersistentVolumeClaim (PVC)
- is a user's request for storage in Kubernetes.
- Lesson 1290 — PersistentVolumeClaim (PVC) Fundamentals
- PersistentVolumeClaims (PVCs)
- are requests for storage by users.
- Lesson 1288 — Kubernetes Storage Abstractions
- PersistentVolumes
- mechanisms that attach external, durable storage to containers.
- Lesson 1287 — Storage Challenges in Containers
- PersistentVolumes (PVs)
- are cluster-level storage resources that exist independently of Pods.
- Lesson 1288 — Kubernetes Storage AbstractionsLesson 1528 — Uninstalling Releases
- Personal learning and experimentation
- Lesson 1062 — Public vs Private Registries
- Personal resource isolation
- Each user accesses only their own storage bucket prefix
- Lesson 367 — Policy Variables and Dynamic Policies
- Personalization
- Show user-specific content (like greetings or recommendations) without a full origin round-trip
- Lesson 610 — Edge Computing Concepts and Use CasesLesson 619 — Request and Response Manipulation
- Personnel
- System administrators, network engineers, facilities staff
- Lesson 2799 — TCO Analysis for Migration
- Personnel background checks
- Lesson 2329 — Cloud Provider Compliance Certifications
- PgBouncer
- (for PostgreSQL) or **ProxySQL** (for MySQL) sit between your app and the database, managing connections and providing a stable interface.
- Lesson 2770 — Database Abstraction Strategies
- Phase 1
- Report and notify owners (via tags) with grace periods
- Lesson 2986 — Idle Resource Detection and Cleanup
- Phase 2
- Automatic snapshot and termination for non-critical resources
- Lesson 2986 — Idle Resource Detection and Cleanup
- Phase 2: Quick Wins
- Lesson 2404 — Implementing a Zero Trust Roadmap
- Phase 3
- Policy enforcement preventing creation without proper tagging
- Lesson 2986 — Idle Resource Detection and Cleanup
- Phase 3: Segmentation Rollout
- Lesson 2404 — Implementing a Zero Trust Roadmap
- Phase 4: Continuous Verification
- Lesson 2404 — Implementing a Zero Trust Roadmap
- Phishing-resistant MFA
- requires cryptographic proof that can't be socially engineered or forwarded to attackers.
- Lesson 2850 — Multi-Factor Authentication Strategies
- Physical circuits
- Different fiber paths from your telco provider
- Lesson 2220 — Private Connectivity Redundancy
- Physical Distance
- The fundamental speed-of-light limit means data traveling from AWS US-East to GCP Europe takes ~80-100ms minimum, regardless of bandwidth.
- Lesson 2789 — Network Performance and Latency Considerations
- Physical tamper protection
- that destroys keys if attacked
- Lesson 2283 — Key Hierarchy and Root of Trust
- Physical Tamper Resistance
- HSMs are built with sensors that detect physical intrusion attempts.
- Lesson 2285 — Key Storage and Hardware Security Modules
- PID namespace
- Each container sees its own process tree, starting from PID 1.
- Lesson 963 — Process Isolation with Namespaces
- Pilot
- (traffic management), **Citadel** (certificate authority for mTLS), and **Galley** (configuration validation).
- Lesson 1577 — Istio Control Plane Components
- Pilot Light
- pattern takes its name from the small, always-on flame in a gas furnace that's ready to ignite the main burners instantly.
- Lesson 2432 — Pilot Light Pattern
- Pipeline
- A workflow that defines how your code moves from source to production.
- Lesson 1814 — CodePipeline: Orchestration Service OverviewLesson 2602 — Streaming Architecture Patterns
- Pipeline capabilities
- (Blue Ocean UI, Pipeline syntax extensions)
- Lesson 1775 — Jenkins Plugins and Extensibility
- Pipeline Configuration (`.gitlab-ci.yml`)
- Lesson 1727 — GitLab CI/CD Architecture Overview
- Pipeline Jobs
- use a declarative or scripted approach where you define your entire build process as code in a `Jenkinsfile`.
- Lesson 1774 — Freestyle Projects vs Pipeline Jobs
- Pipeline level
- In `.
- Lesson 1736 — Environment Variables in GitLab CILesson 1785 — Agent Directive and Execution Environments
- Pipeline Plugin
- Enables declarative and scripted pipelines
- Lesson 1775 — Jenkins Plugins and Extensibility
- Pipeline state is clear
- (you always know exactly where code is in the process)
- Lesson 1657 — Linear Pipeline Pattern
- Pipeline Status Monitoring
- Query `/projects/:id/pipelines/:pipeline_id` to check if a pipeline succeeded, failed, or is still running.
- Lesson 1769 — GitLab CI API and Automation
- Pipeline Throughput
- Lesson 2032 — ELK/EFK Performance Tuning
- Pipeline triggers
- and **parent-child pipelines** let you break complex workflows into manageable, reusable pieces —like calling functions from a main program.
- Lesson 1756 — Pipeline Triggers and Parent-Child Pipelines
- Pipeline-level notifications
- Get alerts when the entire pipeline starts, succeeds, or fails
- Lesson 1849 — Pipeline Notifications and EventBridge
- Pivot analysis
- lets you cross-reference multiple dimensions simultaneously.
- Lesson 2174 — Azure Cost Analysis and Views
- Placement control
- AWS Placement Groups vs Azure Availability Sets vs GCP Instance Groups
- Lesson 109 — Cross-Provider Compute Feature Comparison
- Placement groups
- let you tell AWS exactly *how* you want your instances positioned relative to each other—whether tightly packed for speed, separated for safety, or organized for large-scale distributed systems.
- Lesson 106 — AWS Placement Groups
- plaintext
- .
- Lesson 704 — State File Security ConcernsLesson 2273 — Kubernetes Secrets Security Limitations
- Plan for growth
- Choose names that scale (not `Dev-Team-3-People`)
- Lesson 350 — Creating and Organizing Groups
- Plan migrations
- Understand dependencies before making changes
- Lesson 1639 — Service Dependency Mapping
- Plan/preview generation
- What changes will actually happen?
- Lesson 721 — Continuous Integration for IaC
- Planned Migration
- When moving workloads to a new region or changing database configurations, you can set up a read replica in the target location, let it sync, then promote it during a maintenance window with minimal downtime.
- Lesson 420 — Promoting Read Replicas
- Planning
- Generate and display preview of infrastructure changes
- Lesson 709 — Workflow Automation and CI/CD Integration
- Platform as Product Mindset
- flips this: your internal platform *is* a product, and your developers are your customers.
- Lesson 2915 — Platform as Product Mindset
- Platform engineers
- may need: Full control over networking, security policies, and resource configuration
- Lesson 2920 — Abstraction Levels and User PersonasLesson 2933 — RBAC and Portal Access ControlLesson 2937 — Platform Team Structure and Responsibilities
- Platform Flexibility
- While Istio and Linkerd focus primarily on Kubernetes, Consul natively supports mixed environments—containerized workloads alongside traditional VMs or bare metal.
- Lesson 1593 — Consul Service Mesh Fundamentals
- Platform information
- Target architecture (amd64, arm64) and operating system
- Lesson 980 — Image Manifest and Metadata
- Platform Product Manager
- Defines vision, prioritizes features, measures success
- Lesson 2937 — Platform Team Structure and Responsibilities
- Platform team
- has full access across all Projects
- Lesson 1918 — RBAC and Project-Based Access ControlLesson 2937 — Platform Team Structure and Responsibilities
- Platform-level cost optimization
- (negotiating enterprise discounts, Reserved Instances, Savings Plans)
- Lesson 2954 — Shared Responsibility Model
- Platforms have roadmaps
- Prioritize features, track adoption, deprecate unused services—just like any product team.
- Lesson 2915 — Platform as Product Mindset
- plugin architecture
- Lesson 2024 — Fluentd Architecture and DesignLesson 2927 — Backstage Platform Overview
- Plugin Installation
- Jenkins offers suggested plugins (version control, build tools, notifications) or lets you pick custom ones.
- Lesson 1772 — Installing and Configuring Jenkins
- plugins
- (custom extensions), and enable **shell completion** (auto-finish commands) to work faster and with fewer errors.
- Lesson 1144 — kubectl Aliases, Plugins, and Productivity TipsLesson 1775 — Jenkins Plugins and Extensibility
- plus
- compute time ($0.
- Lesson 615 — CloudFront Functions vs Lambda@EdgeLesson 1208 — LoadBalancer Service Type
- Pod
- is the smallest deployable unit in Kubernetes—think of it as a wrapper around one or more containers that need to work closely together.
- Lesson 1145 — Pod Definition and AnatomyLesson 2566 — Microservices on Kubernetes
- pod anti-affinity
- does the opposite—it pushes pods *apart*.
- Lesson 1352 — Pod Anti-Affinity BasicsLesson 1917 — ArgoCD High Availability Setup
- Pod CIDR (secondary range)
- IP addresses allocated to pods across all nodes
- Lesson 1480 — GKE Networking Fundamentals
- Pod crashes
- Use `kubectl logs <pod-name>` to view the final messages before termination.
- Lesson 1444 — Troubleshooting with Logs
- Pod resource requests matter
- Cluster Autoscaler uses your pod's `requests` (not limits) to calculate how many nodes are needed
- Lesson 1458 — Cluster Autoscaler Integration
- Pod Security Admission Controller
- is a built-in Kubernetes feature that automatically validates pods against these standards when they're created or updated.
- Lesson 1399 — Pod Security Admission Controller
- Pod Security Context
- is a set of security configurations you attach to an entire pod—not just one container.
- Lesson 1389 — Pod Security Context OverviewLesson 1390 — Container Security ContextLesson 1391 — Running as Non-Root Users
- Pod Security Standards
- (Privileged, Baseline, Restricted) that define different security profiles.
- Lesson 1399 — Pod Security Admission ControllerLesson 1404 — Pod Security Best PracticesLesson 1488 — GKE Security: Private Clusters and Hardening
- Pod template
- The blueprint for creating new Pods (with labels, container specs, etc.
- Lesson 1155 — ReplicaSet Purpose and Architecture
- Pod template spec
- Defines the container(s) to run, just like in Deployments
- Lesson 1191 — Kubernetes Job Resource Fundamentals
- PodDisruptionBudgets are respected
- The scheduler won't violate PDBs during preemption when possible.
- Lesson 1371 — Pod Preemption Behavior
- Pods 3 and 4
- will update to the new template immediately
- Lesson 1183 — Partition-Based Rolling Updates
- Point of Presence (PoP)
- is a physical data center location where CDN infrastructure exists.
- Lesson 583 — CDN Architecture and Points of Presence
- Point your DNS records
- (like a CNAME or A record) to the API Gateway domain name
- Lesson 541 — Custom Domain Names and TLS
- Point-in-Time Recovery
- ?
- Lesson 424 — Manual Snapshots and RetentionLesson 427 — Restoring from Backups
- Point-in-Time Recovery (PITR)
- , you can rewind your database to 2:46 PM — exactly one minute before the mistake — and recover your data without losing any other changes made that day.
- Lesson 423 — Point-in-Time RecoveryLesson 444 — NoSQL Backup, Point-in-Time Recovery, and TTL
- Point-to-Point Ethernet
- Dedicated layer 2 connection from your datacenter
- Lesson 2215 — Azure ExpressRoute Fundamentals
- Points of Presence (PoPs)
- is the broader term that includes edge locations plus network connection points where cloud providers connect to internet service providers.
- Lesson 10 — Edge Locations and Points of Presence
- policies
- that define the relationship: which identities can perform which actions on which resources.
- Lesson 333 — IAM Core Concepts: Identities and ResourcesLesson 352 — Roles vs PoliciesLesson 1456 — VPA Configuration and PoliciesLesson 1890 — ArgoCD RBAC and User ManagementLesson 2120 — Error Budget Policies and Decision Making
- Policies and procedures
- define *what* you do and *how*.
- Lesson 2333 — Compliance Documentation and Evidence
- Policy
- "Can access patient records, administer medication, but cannot approve surgeries" (the permissions document)
- Lesson 352 — Roles vs PoliciesLesson 2338 — Open Policy Agent (OPA) FundamentalsLesson 2890 — Open Policy Agent (OPA) Introduction
- Policy as Code
- is about *prevention and enforcement*.
- Lesson 2336 — Policy as Code vs. Compliance as CodeLesson 2338 — Open Policy Agent (OPA) Fundamentals
- Policy compliance
- Does your infrastructure meet organizational standards?
- Lesson 721 — Continuous Integration for IaCLesson 1409 — Validating Admission Webhooks
- Policy Consistency
- Security policies, network rules, and RBAC should be standardized where possible
- Lesson 1513 — Multi-Cluster Management
- Policy control
- – You define who can use your keys via IAM and key policies
- Lesson 2300 — Server-Side Encryption with Customer-Managed Keys
- Policy Coverage
- Percentage of infrastructure under policy enforcement
- Lesson 2901 — Policy Reporting and Remediation
- policy definition
- (templates) from **policy enforcement** (constraints), enabling reusability and governance at scale.
- Lesson 1413 — OPA Gatekeeper ArchitectureLesson 2335 — Introduction to Compliance as CodeLesson 2343 — Azure Policy for Compliance Automation
- Policy Denied Logs
- capture when GCP denies an action due to security policy violations.
- Lesson 2360 — Google Cloud Audit Logs Types
- Policy enforcement
- Optionally block deployment of newly-vulnerable images
- Lesson 1085 — Continuous Vulnerability MonitoringLesson 1410 — Mutating Admission WebhooksLesson 1413 — OPA Gatekeeper ArchitectureLesson 1617 — Service Mesh Security OverviewLesson 1894 — Application ProjectsLesson 2839 — Encryption by Default
- Policy Enforcement Levels
- Policies can be `advisory` (warning only), `soft-mandatory` (blockable by override), or `hard- mandatory` (absolute block).
- Lesson 2341 — Terraform Sentinel Overview
- Policy interactions
- How multiple policies affect the same resource
- Lesson 2899 — Policy Testing and Validation
- Policy Language
- Sentinel uses its own domain-specific language designed for expressing rules.
- Lesson 2341 — Terraform Sentinel Overview
- Policy libraries
- are centralized collections of pre-written, tested compliance policies that multiple teams can import and apply to their infrastructure.
- Lesson 2347 — Policy Libraries and Reusability
- Policy organization patterns
- keep your policies maintainable as your cluster grows.
- Lesson 1246 — NetworkPolicy Best Practices
- Policy variables
- are placeholders in your IAM policies that get replaced with actual values at request time.
- Lesson 367 — Policy Variables and Dynamic Policies
- Policy violations
- Resources in wrong regions, unapproved instance types, missing tags
- Lesson 695 — IaC Security and Compliance Benefits
- policy-as-code framework
- integrated with Terraform Cloud and Terraform Enterprise.
- Lesson 837 — Policy Enforcement with SentinelLesson 2894 — Sentinel for Terraform Introduction
- Policy-based routing
- that considers application requirements and SLAs
- Lesson 2209 — SD-WAN Integration with Cloud
- Policy-driven scheduling
- enforcing your retention rules automatically
- Lesson 2423 — VM and Volume Backup Strategies
- Pool Size
- Set minimum and maximum connections based on your workload.
- Lesson 450 — Connection Pooling and ManagementLesson 2548 — Connection Pooling and Reuse
- Poor
- "Database connection pool is 60% utilized"
- Lesson 2113 — What Makes a Good SLILesson 2571 — RESTful API Design for Microservices
- Poor user experience
- during deployments or after cache invalidation
- Lesson 2707 — Cache Warming Strategies
- Popular stale content
- Consider adjusting `stale-while-revalidate` policies
- Lesson 2680 — CDN Cache Analytics and Hit Rates
- Port
- Which port to check (e.
- Lesson 329 — MIG Health Checks and AutohealingLesson 406 — Security Groups for Database AccessLesson 1423 — HTTP Probe Configuration
- Port fees
- – Fixed monthly cost for the physical connection itself (varies by bandwidth: 1Gbps, 10Gbps, 100Gbps)
- Lesson 2224 — Private Connectivity Cost Management
- Port range
- Which ports to open (e.
- Lesson 60 — Security Groups and VM FirewallsLesson 208 — NACL Allow and Deny Rules
- Portability
- Docker manages the storage location
- Lesson 1035 — Introduction to Docker VolumesLesson 1598 — Service Mesh Interface (SMI) StandardLesson 2529 — Temporal and Alternative Orchestrators
- portable
- it works the same way locally, in Kubernetes, on EC2, or anywhere containers run.
- Lesson 666 — Cloud-Native Logging StandardsLesson 867 — Pseudo ParametersLesson 973 — What is a Container Image?
- Portfolio management
- treats all your commitments holistically, optimizing coverage and utilization enterprise-wide.
- Lesson 2976 — Reserved Instance Portfolio Management
- Post-build
- Tag the image appropriately and push it to your ECR repository
- Lesson 1830 — CodeBuild with Docker and ECR
- post-build actions
- are what you do after cooking (garnish, plate, clean up).
- Lesson 1776 — Build Steps and Post-Build ActionsLesson 1780 — Workspace Management and Build Artifacts
- Post-cutover
- After applications connect, verifying read/write operations
- Lesson 2830 — Data Validation and Consistency Checks
- Post-deployment verification
- confirms runtime state matches policies
- Lesson 2345 — Continuous Compliance Scanning
- Post-incident time off
- Grant recovery time after major incidents
- Lesson 2127 — On-Call Rotation Structures
- Powerful query language
- (PromQL) for flexible analysis
- Lesson 1946 — What is Prometheus and Why It Matters
- PowerShell
- act as the deployment engines that understand Bicep natively.
- Lesson 922 — Bicep Tooling and CLI
- PR-Based Workflows
- Developers submit infrastructure requests via pull requests to a central repository.
- Lesson 2926 — Self-Service Infrastructure Patterns
- Practical impact
- If a user updates their profile on the primary, then immediately refreshes the page (hitting a replica), they might see their old data for a few seconds.
- Lesson 419 — Read Replica Lag and Consistency
- Pre-aggregate with Recording Rules
- If you repeatedly run complex queries, use recording rules to pre-compute them.
- Lesson 1976 — Query Optimization and Best Practices
- Pre-allocates
- a pool of Elastic Network Interfaces (ENIs) to the node
- Lesson 1470 — Amazon VPC CNI Plugin
- Pre-build
- Authenticate to ECR and pull any base images needed
- Lesson 1830 — CodeBuild with Docker and ECR
- Pre-configured images
- Supports multiple languages and runtimes out-of-the-box
- Lesson 1812 — CodeBuild: Managed Build Service Overview
- Pre-configured templates
- that follow security and compliance policies
- Lesson 2917 — Golden Paths and Paved RoadsLesson 2940 — Golden Paths and Paved Roads
- Pre-defined permissions
- You cannot modify the policy attached to these roles
- Lesson 357 — Service-Linked Roles
- Pre-deployment gate
- blocks releases that fail compliance checks
- Lesson 2345 — Continuous Compliance Scanning
- Pre-Deployment Gates
- Lesson 1074 — Scan Timing and Triggers
- Pre-production focus
- Primarily in dev/staging environments
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Pre-production validation
- where your staging environment processes actual request shapes.
- Lesson 1609 — Traffic Mirroring (Shadowing)
- pre-signed URL
- is a special web address that includes temporary authorization credentials embedded directly in the URL itself.
- Lesson 154 — Object URLs and Pre-Signed URLsLesson 165 — Pre-Signed URLs and Temporary Access
- Pre-warmed applications
- Keep applications loaded in memory for faster activation without full boot cycles
- Lesson 88 — VM Hibernation
- Precise attribution
- Map costs to teams, projects, or customers using tags at the finest grain
- Lesson 2172 — AWS Cost and Usage Reports
- Precise extraction
- Lesson 1138 — kubectl Output Formatting Options
- Predictable endpoints
- Hard-coded integrations remain stable
- Lesson 266 — Static IP and Elastic IP Support
- Predictable initialization
- Database replicas can initialize in order, with replicas waiting for the primary
- Lesson 1179 — Ordered Deployment and Scaling
- Predictable performance
- No "noisy neighbors" competing for resources
- Lesson 21 — Private Cloud Deployment ModelLesson 1334 — Setting CPU Limits
- Predictable pod names
- following the pattern `<statefulset-name>-<ordinal>` (e.
- Lesson 1178 — Pod Identity in StatefulSets
- Predictable throughput
- Guaranteed bandwidth from 50 Mbps to 100+ Gbps
- Lesson 2811 — Network Optimization for Migration
- Predictable variable costs
- Your bill reflects actual business activity
- Lesson 30 — Pay-as-You-Go Pricing Model Fundamentals
- Predictive Refresh
- ) pattern solves a problem with traditional caching: when popular data expires, the next request suffers a cache miss and must fetch from the slower backend.
- Lesson 2701 — Refresh-Ahead Caching Pattern
- Predictive scaling
- flips this model by using machine learning to analyze historical traffic patterns and predict future demand, then scaling resources **proactively** before traffic spikes hit.
- Lesson 302 — Predictive Scaling Fundamentals
- Predictive warm-up
- involves invoking functions just before anticipated load spikes—for example, warming up 30 seconds before a known batch job or traffic surge.
- Lesson 2544 — Cold Start Mitigation Strategies
- preempt
- (evict) to free up the necessary resources.
- Lesson 1371 — Pod Preemption BehaviorLesson 1373 — Combining Taints, Tolerations, and Priority
- Preemptible VMs
- (older model) and **Spot VMs** (newer, more flexible model).
- Lesson 104 — GCP Preemptible and Spot VMs
- Preemption is not immediate
- There's a delay while lower-priority pods terminate gracefully.
- Lesson 1371 — Pod Preemption Behavior
- Prefect
- modernizes this with better error handling and simpler state management.
- Lesson 2626 — Workflow Orchestration Tools
- PreferNoSchedule
- Scheduler tries to avoid this node
- Lesson 1360 — Introduction to Taints and TolerationsLesson 1361 — Taint Effects: NoSchedule, PreferNoSchedule, NoExecute
- preferred
- node affinity lets you give Kubernetes *suggestions* about where you'd like Pods to run.
- Lesson 1348 — Preferred Node Affinity RulesLesson 1351 — Pod Affinity FundamentalsLesson 1352 — Pod Anti-Affinity BasicsLesson 1354 — Required vs Preferred Pod AffinityLesson 1355 — Inter-Pod Affinity PatternsLesson 1356 — Anti-Affinity for High AvailabilityLesson 1357 — Affinity Weight and Priorities
- Preferred rules
- guide optimization while maintaining cluster utilization
- Lesson 1354 — Required vs Preferred Pod Affinity
- Prefix
- Matches if the URL path *begins* with the specified path
- Lesson 1223 — Basic Ingress Rules and PathsLesson 1228 — Path Types and Matching
- Premium
- Enterprise-grade tier offering geo-replication across multiple Azure regions, content trust for image signing, private link support for VNet integration, and highest throughput limits for large- scale deployments.
- Lesson 1090 — Azure Container Registry (ACR) OverviewLesson 2691 — Azure Cache for Redis
- Premium network connectivity
- for rapid data synchronization
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Premium tier
- 1,000 requests/second, 1,000,000 requests/day
- Lesson 539 — API Gateway Throttling and Rate LimitsLesson 540 — API Keys and Usage Plans
- Premium_LRS
- Premium SSD, locally redundant, production workloads
- Lesson 1311 — Azure Disk StorageClasses
- Preserved across service boundaries
- through trace context propagation
- Lesson 2069 — Correlation with Logs and Metrics
- Presto
- , and **Spark SQL** read directly from Parquet, ORC, or CSV files organized in your data lake zones, executing SQL queries without copying data into a separate database.
- Lesson 2640 — Query Engines for Data LakesLesson 2657 — Amazon Athena Fundamentals
- Prevent abuse
- from malicious actors attempting DDoS attacks or scraping
- Lesson 2385 — Rate Limiting and Throttling
- Prevent backend overload
- before expensive compute resources get hit
- Lesson 282 — Rate Limiting and Throttling at Load Balancer
- Prevent deletion
- of stateful resources during updates
- Lesson 856 — Stack Policies for Update Protection
- Prevention
- Stop violations before they're deployed rather than detecting them afterward
- Lesson 2888 — Policy as Code Fundamentals
- Prevention Mode (Block)
- The WAF actively blocks traffic matching your rules.
- Lesson 2367 — WAF Rule Types and Modes
- Prevents Configuration Drift
- When administrators manually modify running systems, configurations diverge from the documented baseline.
- Lesson 2838 — Immutable Infrastructure for Security
- preview
- before making any real changes to your infrastructure.
- Lesson 698 — Planning and PreviewLesson 941 — Deployment Lifecycle Operations
- Price-capacity-optimized
- Balances cost and interruption risk
- Lesson 2978 — Spot Instance Fleet Management
- Primary
- `origin1.
- Lesson 597 — Origin Settings and FailoverLesson 2288 — Key Versioning and Backward CompatibilityLesson 2320 — GCP Cloud KMS Key Rotation and VersionsLesson 2475 — Database Replication FundamentalsLesson 2476 — Primary-Replica Architecture
- Primary controller
- Handles all active requests and orchestrates builds
- Lesson 1802 — Jenkins High Availability Architecture
- Primary instance hardware failure
- – Server crashes or becomes unresponsive
- Lesson 416 — Multi-AZ Failover Process
- primary key
- to uniquely identify each item.
- Lesson 430 — DynamoDB: Fundamentals and Data ModelLesson 431 — DynamoDB Primary Keys and Partition KeysLesson 787 — DynamoDB for State LockingLesson 2312 — AWS KMS Multi-Region Keys
- Primary-Replica Architecture
- , changes written to the primary database must propagate to replica servers.
- Lesson 2477 — Replication Lag and Consistency
- Principal
- *Who* is trying to access (a specific user, account, or everyone)
- Lesson 164 — Bucket Policies and Access ControlLesson 355 — Role Trust PoliciesLesson 362 — Principal, Action, and Resource ElementsLesson 379 — AWS IAM Roles and Trust PoliciesLesson 856 — Stack Policies for Update Protection
- Principals
- Define *who* gets access—IAM users, service accounts, applications, or roles.
- Lesson 2289 — Key Policies and Access Control
- Principle of Least Privilege
- means giving users, applications, and services *only* the minimum permissions they need to perform their specific tasks—nothing more.
- Lesson 334 — The Principle of Least PrivilegeLesson 345 — Users vs Service AccountsLesson 354 — Cross- Account RolesLesson 357 — Service-Linked RolesLesson 386 — Azure RBAC FundamentalsLesson 388 — Azure Custom RolesLesson 390 — Azure Service PrincipalsLesson 1080 — Registry Access Control and RBAC (+7 more)
- Prioritize
- vulnerabilities by risk and business context
- Lesson 2868 — Vulnerability Scanning and Management
- Prioritize local zone
- – Route to instances in the same availability zone first
- Lesson 1615 — Locality-Aware Load Balancing
- Prioritize weaknesses
- by business impact (does this affect revenue-critical paths?
- Lesson 2500 — Measuring and Improving Resilience
- Priority determines the winner
- Lesson 1373 — Combining Taints, Tolerations, and Priority
- PriorityClass
- is a cluster-level Kubernetes resource that assigns a numeric priority value to pods.
- Lesson 1369 — PriorityClass Resources
- Privacy
- GDPR (Europe) and CCPA (California) dictate personal data handling
- Lesson 2322 — Introduction to Compliance in Cloud
- private
- (requiring authentication) or **public** (accessible to anyone).
- Lesson 154 — Object URLs and Pre-Signed URLsLesson 988 — Container Registry Fundamentals
- Private by default
- All ECR repositories are private unless you explicitly configure public access through ECR Public.
- Lesson 1086 — AWS ECR Fundamentals
- Private connectivity redundancy
- means architecting multiple independent paths so that if one circuit, router, or even an entire data center fails, your traffic automatically reroutes through backup connections without disruption.
- Lesson 2220 — Private Connectivity Redundancy
- private endpoints
- or **VPC endpoints** (in cloud environments).
- Lesson 1081 — Network Security for RegistriesLesson 1517 — Cluster Security Hardening
- Private Hosted Zone
- is like an internal phone book that only works inside your virtual network.
- Lesson 224 — Private Hosted Zones
- Private Hosted Zones
- (custom internal domain names), you must **associate the zone with both VPCs**.
- Lesson 225 — DNS Resolution Between VPCs
- Private images
- are custom snapshots you create from configured VMs for your organization's exclusive use.
- Lesson 55 — Public vs Private Images
- Private infrastructure access
- Your workflows must reach internal databases, on-premises systems, or private networks that aren't internet-accessible
- Lesson 1690 — Self-hosted Runners Overview
- Private key
- Stays securely on your local machine (never share this!
- Lesson 57 — SSH Key Pairs for Linux VMs
- Private Link
- (similar concepts in Azure/GCP) allows you to access cloud services—whether provider-managed (like S3, databases) or third-party SaaS—using private IP addresses from your VPC.
- Lesson 221 — PrivateLink and Service EndpointsLesson 2397 — Private Link and Endpoint Services
- Private network access
- Jobs that must reach internal databases, APIs, or services not exposed to the internet
- Lesson 1720 — Self-Hosted Runners
- Private peering
- Routes to your Azure VNets
- Lesson 2204 — ExpressRoute Routing and BGPLesson 2215 — Azure ExpressRoute FundamentalsLesson 2222 — Private Peering and Exchange Points
- private registries
- for your organization's proprietary modules.
- Lesson 843 — Module Registry and VersioningLesson 991 — Public vs Private RegistriesLesson 1271 — ImagePullSecrets for Private Registries
- Private Registry
- (Terraform Cloud/Enterprise): For organization-internal modules that shouldn't be public
- Lesson 805 — Publishing Modules to Terraform Registry
- Private Service Connect
- or **VPC peering**, allowing secure communication without crossing the public internet.
- Lesson 516 — Google Cloud Functions: VPC Connectivity and Networking
- private subnet
- houses resources that should remain isolated from direct internet access.
- Lesson 176 — Public vs Private SubnetsLesson 182 — Subnet Route Table AssociationsLesson 189 — Public vs Private Subnets
- Private Subnet in AZ-A
- → routes to → **NAT Gateway in AZ-A**
- Lesson 194 — NAT Gateway High Availability
- Private Subnet in AZ-B
- → routes to → **NAT Gateway in AZ-B**
- Lesson 194 — NAT Gateway High Availability
- Private Subnets
- Lesson 176 — Public vs Private SubnetsLesson 185 — Network Address Translation (NAT) PreviewLesson 186 — Virtual Network Best PracticesLesson 189 — Public vs Private SubnetsLesson 191 — NAT Fundamentals
- PrivateLink
- (AWS terminology) or **Private Link** (similar concepts in Azure/GCP) allows you to access cloud services—whether provider-managed (like S3, databases) or third-party SaaS—using private IP addresses from your VPC.
- Lesson 221 — PrivateLink and Service Endpoints
- Privilege creep
- Users accumulating permissions they no longer need
- Lesson 360 — Auditing Group and Role Membership
- Privilege escalation
- Unexpected `AttachUserPolicy` or role assumption
- Lesson 2865 — CloudTrail and Audit Logging for Security
- Privilege escalation attempts
- – Someone adding admin permissions to their account or creating new privileged identities deserves immediate attention.
- Lesson 2356 — Real-Time Audit Log Monitoring
- Privileged Access Management
- and **Multi-Factor Authentication**, federation becomes a cornerstone of Zero Trust architecture, treating **identity as the security perimeter**.
- Lesson 2852 — Identity Federation and SSO
- privileged container
- runs with nearly all the capabilities of the host machine—essentially running as root on the underlying node.
- Lesson 1394 — Privileged ContainersLesson 1395 — Linux Capabilities
- proactive
- (preventing or immediately detecting issues).
- Lesson 2334 — Continuous Compliance vs Point-in-TimeLesson 2873 — Threat Intelligence Integration
- Proactive monitoring and alerting
- is like having sensors that notify you when the temperature starts climbing, giving you time to pull over safely.
- Lesson 457 — Monitoring and Alerting for Performance
- Proceeds or stops
- based on the reviewer's decision (approve/reject)
- Lesson 1844 — Manual Approval Actions
- Process Inspection
- Environment variables are visible to any process inspection tool (`ps`, `/proc` filesystem).
- Lesson 2270 — Environment Variables for Secrets
- Processing complexity imbalance
- A producer sends lightweight JSON messages instantly, while the consumer performs database writes or external API calls
- Lesson 2740 — Understanding Backpressure in Distributed Systems
- Processing Power
- The Collector can batch data for efficiency, sample high-volume traces, enrich spans with additional context, filter sensitive information, and transform data formats before export.
- Lesson 2081 — OpenTelemetry Collector Fundamentals
- Processing Time
- is when your streaming system receives and processes that event.
- Lesson 2604 — Event Time vs Processing Time
- Processing time variance
- How much work time fluctuates
- Lesson 2742 — Queue Depth and Capacity Planning
- processors
- (grok parsers, remappers, enrichers) to extract structured fields from unstructured logs.
- Lesson 2043 — Datadog Logs and Log ManagementLesson 2081 — OpenTelemetry Collector FundamentalsLesson 2082 — Collector Pipeline: Receivers, Processors, Exporters
- producer
- ) needs to send work to another service (the **consumer**), it doesn't call the consumer directly.
- Lesson 550 — Message Queue FundamentalsLesson 568 — Event Producers and Consumers
- Producer function
- receives the request, validates it, writes a message to a queue, and returns immediately
- Lesson 2505 — Async Processing with Queues
- producers
- are services or components that detect something meaningful happening and publish an event to notify other parts of the system.
- Lesson 568 — Event Producers and ConsumersLesson 2609 — Kafka Producers and ConsumersLesson 2710 — Message Queue Fundamentals Revisited
- Produces deployment artifacts
- (JAR files, Docker images, ZIP archives)
- Lesson 1822 — CodeBuild Overview and Core Concepts
- Product Catalog Service
- – manages product information
- Lesson 2560 — Service Boundaries and Decomposition
- Product launches
- – Major releases where traffic spikes immediately
- Lesson 2676 — Cache-Warming and Preloading
- Production
- Servers pull the exact image version they need using tags or digests
- Lesson 988 — Container Registry FundamentalsLesson 1672 — Artifact LifecycleLesson 2089 — Jaeger OverviewLesson 2090 — Jaeger Deployment Models
- Production environment
- The same container image that passed all tests gets deployed to production, guaranteeing consistency.
- Lesson 965 — Container Portability BenefitsLesson 1667 — Multi-Environment PromotionLesson 1672 — Artifact Lifecycle
- Production mindset
- Often runs in production with safety guardrails
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Production parity
- Development containers can mirror production configurations closely, catching environment- specific bugs early.
- Lesson 970 — Developer Workflow Improvements
- Production promotion
- happens after staging validation (often requires manual gate)
- Lesson 1651 — Environment Promotion Strategies
- Production systems
- Token-based auth with automatic rotation
- Lesson 1068 — Registry Authentication Methods
- Production with moderate traffic
- General-purpose medium or large
- Lesson 399 — Database Instance Classes
- Programmatic access
- Use billing APIs to pull data into your own systems
- Lesson 2151 — Custom Cost Reports and Export
- Progressing
- The rollout is actively updating Pods
- Lesson 1169 — Deployment Rollout StatusLesson 1885 — Application Health and Sync StatusLesson 1900 — Health Assessment
- Progressive Disclosure
- Show high-level summaries prominently; drill-down details can be smaller or lower on the page.
- Lesson 2101 — Information Hierarchy and LayoutLesson 2943 — Platform Documentation and Onboarding
- Progressive rollout
- Activate for 5% of users, then 25%, then 100%
- Lesson 1666 — Feature Flag Integration
- Progressive rollouts
- combine canary principles with automated rollback triggers based on metrics, which you can implement with **workflow APIs** and external monitoring integration.
- Lesson 1725 — Deployment Strategies and Blue-Green Patterns
- Progressive security policies
- Add authorization policies service-by-service
- Lesson 1601 — Service Mesh Adoption Patterns
- Progressive validation
- Test in lower environments before production
- Lesson 1868 — Environment Promotion Patterns
- project
- Reference files from other GitLab projects
- Lesson 1757 — Pipeline Templates and IncludesLesson 1892 — Application Spec StructureLesson 2143 — Azure Cost Management TagsLesson 2344 — GCP Organization Policy Service
- Project teams
- Detailed task status, blockers, dependencies
- Lesson 2818 — Migration Progress Tracking and Reporting
- Project-based Matrix
- combines both: global permissions plus per-job overrides.
- Lesson 1781 — Jenkins User Management and Security
- Project-level
- Specific to one project (highest precedence)
- Lesson 1763 — Custom CI/CD Variables and InheritanceLesson 2319 — GCP Cloud KMS IAM and Permissions
- Projecting specific columns
- Lesson 677 — Kusto Query Language (KQL) Basics
- Projects
- are where actual work happens.
- Lesson 391 — GCP IAM Overview and HierarchyLesson 1918 — RBAC and Project-Based Access ControlLesson 2144 — GCP Labels for Cost Tracking
- Prometheus
- can scrape.
- Lesson 1324 — Volume Metrics and MonitoringLesson 1518 — Observability for Cluster OperationsLesson 2774 — Observability Portability
- Prometheus Metrics
- Lesson 1944 — Flux Monitoring and Troubleshooting
- Prometheus Operator
- transforms this operational burden into declarative, Kubernetes-native workflows.
- Lesson 1989 — Prometheus Operator for Kubernetes
- Prometheus scrapes metrics
- it actively pulls them from HTTP endpoints at regular intervals.
- Lesson 1953 — Scraping and Service Discovery
- Promotion Logic
- Move the artifact by updating its tags/metadata, not by copying or rebuilding
- Lesson 1676 — Artifact Promotion Patterns
- PromQL
- (Prometheus Query Language) returns data in two forms:
- Lesson 1962 — PromQL Basics and Data Model
- Proof of ongoing operation
- demonstrates continuous compliance.
- Lesson 2333 — Compliance Documentation and Evidence
- properties
- (size, toppings, crust style).
- Lesson 938 — Resource Definitions in ConfigurationsLesson 947 — Template Structure and YAML SyntaxLesson 949 — Template Properties and References
- Properties/Attributes
- Specifications for each resource (size, region, name)
- Lesson 697 — Configuration Files and Syntax
- Pros
- Lesson 287 — Auto Scaling vs Manual ScalingLesson 1916 — GitOps Repository PatternsLesson 2065 — Instrumentation TypesLesson 2281 — Symmetric vs Asymmetric EncryptionLesson 2575 — Service Discovery PatternsLesson 2595 — Cache-Aside and Read-Through PatternsLesson 2686 — Redis Persistence and DurabilityLesson 2698 — Write-Through Caching Pattern
- Protect backend resources
- from being overwhelmed by legitimate traffic spikes
- Lesson 2385 — Rate Limiting and Throttling
- Protect databases
- from accidental replacement or deletion
- Lesson 856 — Stack Policies for Update Protection
- Protect downstream systems
- Prevent cascading delays in event-driven architectures
- Lesson 476 — Function Timeout Configuration
- Protected deletion
- You can only delete them when no resources are using the service
- Lesson 357 — Service-Linked Roles
- Protected Health Information (PHI)
- any individually identifiable health data such as medical records, diagnoses, treatment plans, or billing information.
- Lesson 2327 — HIPAA for Healthcare Data
- Protected media streaming
- Distribute video content that expires after viewing
- Lesson 165 — Pre-Signed URLs and Temporary Access
- Protected variables
- only expose to pipelines running on protected branches (like `main` or `production`).
- Lesson 1763 — Custom CI/CD Variables and Inheritance
- Protection against accidental changes
- – Prevents unintended updates that could disrupt running applications
- Lesson 1255 — Immutable ConfigMaps
- Protocol
- TCP, UDP, ICMP, etc.
- Lesson 60 — Security Groups and VM FirewallsLesson 208 — NACL Allow and Deny RulesLesson 213 — Network Security Logging and MonitoringLesson 222 — VPC Flow LogsLesson 246 — ALB Listeners and RulesLesson 329 — MIG Health Checks and AutohealingLesson 406 — Security Groups for Database AccessLesson 1242 — Port and Protocol Specifications (+1 more)
- Protocol compatibility
- Forwards seamlessly to Fluentd using the Forward protocol
- Lesson 2027 — Fluent Bit for Edge Collection
- Protocol hints
- Indicating the original visitor's protocol with `X-Forwarded-Proto: https`
- Lesson 599 — Custom Headers and Origin Requests
- Protocol Overhead
- Chatty protocols that require multiple round-trips amplify latency problems.
- Lesson 2789 — Network Performance and Latency Considerations
- Protocol Support
- NLBs work with any TCP or UDP traffic—not just HTTP/HTTPS.
- Lesson 235 — Network Load Balancers (Layer 4)
- Protocol translation
- and routing
- Lesson 1566 — The Sidecar Proxy PatternLesson 2577 — Backend for Frontend (BFF) Pattern
- Prototyping
- Quickly spinning up multi-container architectures
- Lesson 1059 — Compose Best Practices and Limitations
- Provide a second verification
- from one of these methods:
- Lesson 342 — Multi-Factor Authentication (MFA) Basics
- Provider
- Which provider manages it
- Lesson 775 — State File Contents and StructureLesson 1928 — Flux Notifications and AlertsLesson 1936 — Notification ControllerLesson 2786 — Data Transfer Costs and Optimization
- Provider console
- Verify VM health, security groups (EKS), firewall rules (GKE), or NSG rules (AKS)
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Provider locations
- Different cloud provider edge sites (PoPs)
- Lesson 2220 — Private Connectivity Redundancy
- Provider plugins
- for each secrets backend (Vault, AWS, Azure, GCP)
- Lesson 2276 — Secrets Store CSI Driver
- Provider secures
- Physical datacenters, network infrastructure, hypervisor, hardware
- Lesson 2842 — Shared Responsibility Model
- Provider verifies
- The provider team runs the contract against their service, proving they satisfy all consumer expectations
- Lesson 2585 — Contract Testing and API Contracts
- Provider-Managed Keys
- The cloud platform generates, stores, and manages encryption keys for you automatically.
- Lesson 130 — Volume Encryption
- Providers
- AWS Route 53, Azure Traffic Manager, Google Cloud DNS, and third-party services like Cloudflare or NS1.
- Lesson 2783 — Global Load Balancing Across Clouds
- Provides pre-built dashboards
- Out-of-the-box views for cluster health, workload performance, and resource utilization
- Lesson 1487 — GKE Monitoring with Cloud Monitoring
- Provision a machine
- (physical, VM, or container) running Linux, Windows, or macOS
- Lesson 1720 — Self-Hosted Runners
- Provision green environment
- Creates new instances with your updated application
- Lesson 1835 — Blue/Green Deployments with CodeDeploy
- Provisioned capacity mode
- requires you to specify exactly how many read and write operations per second your table will handle.
- Lesson 432 — DynamoDB Capacity Modes: Provisioned vs On-Demand
- Provisioned Concurrency
- goes further: it keeps a specified number of function instances *initialized and ready* at all times.
- Lesson 479 — Reserved and Provisioned ConcurrencyLesson 493 — Provisioned ConcurrencyLesson 2544 — Cold Start Mitigation StrategiesLesson 2550 — Concurrency Management
- Provisioned IOPS SSD
- Guarantees consistent high IOPS for demanding applications (think e-commerce during peak hours)
- Lesson 454 — Database Storage Performance
- provisioner
- (like AWS EBS, Azure Disk, or NFS)
- Lesson 1303 — StorageClass FundamentalsLesson 1304 — StorageClass Parameters
- Provisioning
- is the actual process of allocating and configuring resources.
- Lesson 699 — Apply and Provisioning
- Provisioning EC2 instances
- with the right instance types
- Lesson 96 — AWS Elastic Beanstalk Introduction
- Provisions
- a clean build environment using a Docker image
- Lesson 1812 — CodeBuild: Managed Build Service Overview
- ProxySQL
- (for MySQL) sit between your app and the database, managing connections and providing a stable interface.
- Lesson 2770 — Database Abstraction Strategies
- Prune
- tells ArgoCD to delete resources from the cluster when they're removed from Git.
- Lesson 1886 — Self-Heal and Prune Options
- pub/sub pattern
- (publish-subscribe).
- Lesson 557 — AWS SNS Topics and SubscriptionsLesson 2578 — Event-Driven Communication
- Pub/Sub Triggers
- Messages published to a Pub/Sub topic automatically invoke your function.
- Lesson 515 — Google Cloud Functions: Event-Driven Architecture
- public
- (accessible to anyone).
- Lesson 154 — Object URLs and Pre-Signed URLsLesson 189 — Public vs Private SubnetsLesson 988 — Container Registry Fundamentals
- Public Bicep Registries
- host community-maintained modules that anyone can use.
- Lesson 929 — Module Registries
- public images
- provided by cloud vendors or the community, or create **custom images** with your specific software stack pre-configured for faster deployments.
- Lesson 54 — Operating System Images and AMIsLesson 55 — Public vs Private Images
- Public IP addresses
- or **endpoints** for accessing deployed services
- Lesson 899 — Outputs for Template Results
- Public peering
- Multiple networks connect to a shared switch fabric at an IXP, exchanging traffic via BGP
- Lesson 2222 — Private Peering and Exchange Points
- Public registries
- like Docker Hub's public repositories allow anyone on the internet to pull (download) your images.
- Lesson 991 — Public vs Private Registries
- public subnet
- is one whose resources can directly communicate with the internet, while a **private subnet** houses resources that should remain isolated from direct internet access.
- Lesson 176 — Public vs Private SubnetsLesson 181 — Default Routes and Local RoutesLesson 182 — Subnet Route Table AssociationsLesson 189 — Public vs Private SubnetsLesson 193 — NAT Gateway DeploymentLesson 195 — NAT Instance BasicsLesson 200 — Troubleshooting Internet Connectivity
- Public Subnets
- Lesson 176 — Public vs Private SubnetsLesson 186 — Virtual Network Best PracticesLesson 189 — Public vs Private Subnets
- Public vs. Private
- Internet-facing resources isolated from internal systems
- Lesson 2390 — Network Segmentation Fundamentals
- Publish test results
- Display JUnit reports in Jenkins
- Lesson 1776 — Build Steps and Post-Build Actions
- Publish-Subscribe (pub-sub) pattern
- is an event-driven messaging model where publishers send events to a topic without knowing who (if anyone) will receive them, and multiple subscribers can independently receive copies of the same event.
- Lesson 571 — Publish-Subscribe Pattern
- Publisher
- sends an event to a **topic** (a named channel)
- Lesson 571 — Publish-Subscribe PatternLesson 2578 — Event-Driven Communication
- pull
- .
- Lesson 636 — Metric Collection MethodsLesson 1060 — What is a Container RegistryLesson 1727 — GitLab CI/CD Architecture OverviewLesson 1853 — GitOps vs Traditional Operations
- Pull (read)
- Download images—most restrictive, suitable for production workloads
- Lesson 1080 — Registry Access Control and RBAC
- Pull delivery
- Your application actively fetches messages when ready.
- Lesson 562 — Google Cloud Pub/Sub
- pull model
- , your monitoring system periodically connects to your services and scrapes metrics from an exposed endpoint.
- Lesson 636 — Metric Collection MethodsLesson 1727 — GitLab CI/CD Architecture OverviewLesson 2609 — Kafka Producers and Consumers
- Pull request generator
- Creates temp apps for each PR
- Lesson 1907 — ApplicationSets for Dynamic Applications
- Pull Request Workflow
- Accept contributions through standard PR processes with clear review criteria.
- Lesson 2944 — Inner Source and Contribution Models
- Pull request workflows
- Review dashboard changes like code
- Lesson 2111 — Dashboard as Code and Version Control
- Pull requests
- become the standard way to propose infrastructure changes, creating accountability and reducing errors.
- Lesson 687 — IaC Benefits: Version Control and Collaboration
- pull-based
- deployment, unlike traditional CI/CD that pushes changes.
- Lesson 1854 — The Four Principles of GitOpsLesson 1865 — Pull-Based vs Push-Based GitOps
- pull-based model
- is considered more aligned with GitOps principles because it implements **continuous reconciliation** (principle #4 we learned earlier).
- Lesson 1865 — Pull-Based vs Push-Based GitOpsLesson 1869 — GitOps Reconciliation LoopLesson 1877 — What is ArgoCD and GitOps CDLesson 1919 — Introduction to Flux and GitOps Philosophy
- Pull-based scraping
- that works well with Kubernetes service discovery
- Lesson 1946 — What is Prometheus and Why It Matters
- pull-through cache
- (or **registry mirror**) acts as a local intermediary between your container hosts and the upstream registry.
- Lesson 997 — Registry Mirroring and CachingLesson 1097 — Registry Mirroring and Caching
- pulls
- changes, comparing them to the actual cluster state and reconciling differences.
- Lesson 1865 — Pull-Based vs Push-Based GitOpsLesson 1877 — What is ArgoCD and GitOps CDLesson 1946 — What is Prometheus and Why It Matters
- Pulls your source
- from repositories like CodeCommit, GitHub, or S3
- Lesson 1822 — CodeBuild Overview and Core Concepts
- Purge
- Fast, reliable, but can cause origin stampedes if many users request simultaneously
- Lesson 2675 — Cache Invalidation Strategies
- Purge (Hard Delete)
- Lesson 2675 — Cache Invalidation Strategies
- Purge protection
- settings can prevent even administrators from bypassing recovery windows
- Lesson 2291 — Key Deletion and Recovery
- purpose
- and **scope**.
- Lesson 214 — Security Group Best PracticesLesson 1419 — The Three Types of Probes
- Purpose Limitation
- Data collected for one purpose can't be repurposed without consent.
- Lesson 2328 — GDPR Data Protection Requirements
- push
- and **pull**.
- Lesson 636 — Metric Collection MethodsLesson 996 — Multi-Architecture ImagesLesson 1060 — What is a Container Registry
- Push (write)
- Upload new images or tags—needed by build pipelines
- Lesson 1080 — Registry Access Control and RBAC
- Push delivery
- Pub/Sub sends messages to a webhook endpoint you configure (like an HTTP endpoint or Cloud Function).
- Lesson 562 — Google Cloud Pub/Sub
- push-based
- approach.
- Lesson 1853 — GitOps vs Traditional OperationsLesson 1865 — Pull-Based vs Push-Based GitOps
- pushes
- changes into your infrastructure—a CI server authenticates to your cluster, runs `kubectl apply`, and forces the new state.
- Lesson 1857 — Pull-Based Deployment ModelLesson 1865 — Pull-Based vs Push-Based GitOps
- Pushgateway
- acts as a **holding area**—these jobs push their metrics here, and Prometheus scrapes the gateway.
- Lesson 1947 — Prometheus Architecture ComponentsLesson 1959 — Pushgateway for Short-Lived Jobs
- PUT
- Create or update (write) an object
- Lesson 144 — HTTP-Based Access ModelLesson 1117 — RESTful API Conventions
- PUT operation
- uploads data to create or replace an object in a bucket.
- Lesson 153 — Basic Object Operations
- Python
- `--mount=type=cache,target=/root/.
- Lesson 1027 — Cache Mounts for DependenciesLesson 2078 — Installing and Configuring OpenTelemetry SDKs
Q
- Quality control
- Only tested, reviewed modules are published
- Lesson 843 — Module Registry and Versioning
- Quality of Service class
- (from lesson 1336): BestEffort pods go first, then Burstable, and finally Guaranteed pods are evicted only as a last resort.
- Lesson 1341 — OOMKilled and Memory Pressure
- Quality of Service Classes
- , you saw how individual pods get priority.
- Lesson 1337 — Resource Quota Basics
- quantiles
- (like "95% of requests completed within X seconds") using functions like `histogram_quantile()`.
- Lesson 1951 — Metric Types: HistogramLesson 1973 — Histogram and Quantile Queries
- Quarantine instances
- by applying restrictive tags or moving them to isolated subnets
- Lesson 2871 — Automated Incident Response
- Quarantine Pattern
- Route invalid records to a separate "dead letter" location (like an S3 bucket or database table) for investigation rather than failing the entire job.
- Lesson 2624 — Data Quality in Batch Pipelines
- Quarterly
- Reassess architectural patterns, renegotiate commitments, adjust showback/chargeback
- Lesson 2167 — Continuous Optimization Process
- Quay.io
- , and **GitHub Container Registry** allow anyone to pull (download) images without authentication.
- Lesson 1062 — Public vs Private Registries
- Querier
- Provides a **unified query interface** that aggregates data from multiple Sidecars and Store Gateways.
- Lesson 1982 — Thanos Architecture OverviewLesson 2035 — Loki Components and Deployment Modes
- queriers
- (execute PromQL), and **compactors** (optimize storage).
- Lesson 1986 — Mimir for Large-Scale MetricsLesson 2034 — Loki Architecture and Design Philosophy
- queries
- that read data.
- Lesson 574 — CQRS Pattern with EventsLesson 2338 — Open Policy Agent (OPA) FundamentalsLesson 2597 — CQRS PatternLesson 2727 — CQRS Pattern BasicsLesson 2728 — Combining Event Sourcing and CQRS
- Queries your cloud provider
- (AWS, Azure, GCP) to check the current real-world status
- Lesson 774 — What is Terraform State
- Query
- logs using this ID to see the complete request timeline across all services
- Lesson 2057 — Correlation IDs and Tracing ContextLesson 2890 — Open Policy Agent (OPA) IntroductionLesson 2891 — Rego Language Basics
- Query API
- Flexible queries against cost and usage data with filters, grouping, and aggregation
- Lesson 2176 — Azure Cost Exports and APIs
- Query Cache
- (where supported) stores results of frequently executed queries.
- Lesson 451 — Database Parameter Tuning
- Query caching
- Repeated queries return cached results instantly
- Lesson 1984 — Thanos Query and Query Frontend
- Query Capabilities
- KQL (Kibana Query Language) and Elasticsearch queries provide rich, flexible searching across all log content.
- Lesson 2045 — Comparing Logging Solution Trade-offs
- Query Complexity
- Lesson 2110 — Dashboard Performance and Query Optimization
- Query existing infrastructure
- that's managed elsewhere or already exists
- Lesson 753 — When to Use Resources vs Data Sources
- Query layer
- Implement role-based access control (RBAC) so users can only query their tenant's data
- Lesson 2058 — Multi-Tenancy and Log IsolationLesson 2088 — Tracing Backend Architecture
- Query mode
- – Exposes an API that Thanos Query can use to retrieve historical data from object storage
- Lesson 1983 — Thanos Sidecar and Object Storage
- Query parameters
- – `?
- Lesson 250 — HTTP Header and Method-Based RoutingLesson 275 — Content-Based Routing and Path Rules
- query performance
- (older logs = slower searches)
- Lesson 656 — Log Retention and Storage RequirementsLesson 2831 — Performance Tuning Post-Migration
- Query Performance Insight
- for similar visibility, and Google Cloud provides **Query Insights** for Cloud SQL.
- Lesson 456 — Performance Insights and Diagnostics Tools
- Query processing
- Cost per TB of data scanned by your queries
- Lesson 2664 — Google BigQuery as Serverless Query Engine
- Query response time
- Slow storage means queries take longer, even with perfect indexes
- Lesson 454 — Database Storage Performance
- Query results
- List all Kubernetes namespaces, AWS regions, or service names from your metrics
- Lesson 2107 — Dashboard Variables and Filters
- Query Rewriting
- means restructuring SQL to achieve the same result more efficiently.
- Lesson 449 — Query Optimization Techniques
- Query service
- and **UI** provide trace retrieval and visualization
- Lesson 2090 — Jaeger Deployment Models
- Query specific fields
- Find all logins for a particular user instantly
- Lesson 654 — Structured vs Unstructured LogsLesson 2047 — Structured Logging in Applications
- Query splitting
- Large time-range queries are broken into smaller chunks, processed in parallel, and reassembled
- Lesson 1984 — Thanos Query and Query Frontend
- Query String Forwarding
- determines which parameters are passed to your origin.
- Lesson 598 — Query String and Cookie Forwarding
- Query string handling
- Whether to include query parameters in cache keys
- Lesson 595 — Cache Behavior Configuration
- Query strings
- Route requests with `?
- Lesson 236 — Application Load Balancers (Layer 7)Lesson 245 — Introduction to Application Load Balancers (ALB)Lesson 2375 — Custom Rules and Request Inspection
- Query variables
- Populated by running a query against your data source (e.
- Lesson 1998 — Variables and Templating
- Query-based
- Pull events from a data source (like Prometheus) that match certain conditions
- Lesson 2000 — Annotations and Time Range Controls
- Queue
- Holds messages in order until they're consumed
- Lesson 550 — Message Queue FundamentalsLesson 2505 — Async Processing with Queues
- Queue Depth
- How many I/O operations are waiting to be processed.
- Lesson 136 — Volume Monitoring and MetricsLesson 1950 — Metric Types: Gauge
- Queue Depth (Message Count)
- Lesson 566 — Queue Monitoring and Metrics
- Queue length
- Monitor for sustained growth indicating under-provisioning
- Lesson 1806 — Performance Tuning and Resource Management
- Queue triggers
- React to messages in Azure Storage Queues or Service Bus
- Lesson 511 — Azure Functions: Bindings and Triggers
- queued
- (delayed until capacity frees up), depending on the invocation type and configuration.
- Lesson 478 — Function Concurrency LimitsLesson 1694 — Workflow Status and Logs
- Queues
- implement a **point-to-point** model.
- Lesson 551 — Queue vs Topic PatternLesson 2710 — Message Queue Fundamentals Revisited
- Quick action
- Drain and replace problematic nodes with fresh ones from your node pool.
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Quick cloud benefits
- You immediately gain cloud advantages like improved hardware, better disaster recovery options, and pay-as-you-go pricing.
- Lesson 2792 — Rehost (Lift-and-Shift) Strategy
- Quick Deployment Cycles
- Push a new version of your app and have it running in production within seconds, not minutes.
- Lesson 967 — Fast Startup and Scaling
- Quick Tasks
- let you build an image on-demand in Azure without local Docker installed:
- Lesson 1091 — ACR Tasks and Automated Builds
- Quota
- total requests allowed per day/week/month
- Lesson 2540 — Serverless API Rate Limiting and Throttling
- Quoted Strings
- are your everyday text values wrapped in double quotes:
- Lesson 732 — String Literals and String Interpolation
R
- Race conditions
- where two operations interfere with each other
- Lesson 777 — State Locking Fundamentals
- Rack-level domains
- Servers sharing physical power/networking
- Lesson 2452 — Fault Domains and Isolation Boundaries
- Random access
- means jumping to different locations unpredictably—like flipping through a dictionary to look up specific words.
- Lesson 119 — Storage Access Patterns and Workload Types
- Random Port Publishing
- When you run `docker container run -P` (capital P), Docker will publish all `EXPOSE`d ports to random host ports
- Lesson 1007 — EXPOSE: Port Documentation
- Random read/write patterns
- dominate your workload
- Lesson 123 — Comparing Storage Types: When to Use What
- Random small reads/writes
- (database operations) stress IOPS
- Lesson 134 — Volume Performance Optimization
- Range partitioning
- Divide keys into ranges (A-M goes to partition 1, N-Z to partition 2)
- Lesson 2607 — Stream Partitioning and Parallelism
- Range requests
- let clients ask for specific byte ranges of a file instead of the entire thing, and the server responds with **partial content** (HTTP 206 status).
- Lesson 606 — Range Requests and Partial Content
- Range vector
- Time-series data over a specified time window.
- Lesson 1962 — PromQL Basics and Data Model
- Range-based
- Orders from 2020-2022 on Shard A, 2023-2024 on Shard B
- Lesson 455 — Partitioning and Sharding Strategies
- Ransomware isolation
- Attackers who compromise your primary cloud account won't automatically have access to backups in a different provider with separate credentials.
- Lesson 2788 — Multicloud Backup and Archive
- Rapid detection
- Use aggressive health check intervals (every 5-10 seconds)
- Lesson 2456 — Failover Mechanisms and Automation
- Rapid environment creation
- With IaC, creating identical environments becomes trivial.
- Lesson 688 — IaC Benefits: Speed and Efficiency
- Rate Limiting
- sets the maximum number of requests allowed per time window (e.
- Lesson 531 — Throttling and Rate LimitingLesson 1231 — Rate Limiting and IP WhitelistingLesson 1443 — Log Sampling and FilteringLesson 2083 — Sampling Strategies in OpenTelemetryLesson 2364 — What is a Web Application Firewall (WAF)Lesson 2372 — Rate Limiting and Bot ManagementLesson 2385 — Rate Limiting and ThrottlingLesson 2388 — Anycast and Traffic Scrubbing (+3 more)
- rate limits
- cap total requests over a longer period (like requests per day or month).
- Lesson 539 — API Gateway Throttling and Rate LimitsLesson 540 — API Keys and Usage PlansLesson 2589 — Bulkhead Pattern for Isolation
- Rate profiles
- Legitimate bots follow predictable patterns; malicious ones spike irregularly
- Lesson 2372 — Rate Limiting and Bot Management
- Ratios
- – Enforce relationships (e.
- Lesson 1338 — LimitRange ObjectsLesson 2102 — Metric Selection and Relevance
- Raw disk access
- When applications need direct control over storage layout
- Lesson 124 — Block Storage Overview
- Raw Zone (Bronze/Landing)
- Lesson 2631 — Data Lake Zones and Organization
- RBAC
- (Role-Based Access Control) is Kubernetes' built-in authorization mechanism that determines whether a user, service account, or application can perform specific actions on cluster resources.
- Lesson 1374 — Introduction to Kubernetes RBACLesson 1404 — Pod Security Best PracticesLesson 1918 — RBAC and Project-Based Access Control
- RBAC policies
- (covered earlier in lesson 1269) to restrict which ServiceAccounts can read specific Secrets.
- Lesson 1274 — Secret Security Best Practices
- RDB
- creates point-in-time snapshots of your entire dataset at configurable intervals (e.
- Lesson 2686 — Redis Persistence and Durability
- RDB (snapshots)
- Periodic dumps of the entire dataset to disk — fast recovery, but you might lose recent writes
- Lesson 2684 — Redis Architecture and Data Structures
- RDP client software
- Windows includes Remote Desktop Connection built-in; Mac and Linux users need a client like Microsoft Remote Desktop
- Lesson 58 — Windows VMs and RDP Access
- RDS architecture
- is the kitchen, staff, and storage system working behind the scenes so you can simply order your meal (run queries) without worrying about ingredients, cooking equipment, or cleanup.
- Lesson 397 — RDS Architecture and Components
- Re-run all jobs
- Retries the entire workflow (useful for transient failures)
- Lesson 1696 — Workflow Run History and Re-runs
- Re-run failed jobs
- Only re-executes jobs that failed (saves time and resources)
- Lesson 1696 — Workflow Run History and Re-runs
- Re-run the same experiment
- after fixes to validate improvement
- Lesson 2500 — Measuring and Improving Resilience
- Reachability Analyzer
- and **Network Access Analyzer**.
- Lesson 2194 — Provider-Specific Network Insights
- Reachability Verification
- Before deploying a new service or updating firewall rules, you can verify whether your database will be reachable from your application servers, or if your load balancer can connect to backend instances.
- Lesson 2188 — Network Path Analysis Tools
- reactive
- waiting for metrics like CPU or request count to cross thresholds before taking action.
- Lesson 302 — Predictive Scaling FundamentalsLesson 2334 — Continuous Compliance vs Point-in-TimeLesson 2873 — Threat Intelligence Integration
- read
- phase, before resource creation
- Lesson 748 — Data Source Block SyntaxLesson 1680 — Artifact Repository Access ControlLesson 2068 — Trace Analysis Patterns
- Read Capacity Units (RCUs)
- and **Write Capacity Units (WCUs)** in advance.
- Lesson 432 — DynamoDB Capacity Modes: Provisioned vs On-DemandLesson 2532 — DynamoDB Capacity Modes
- Read Model (Queries)
- Event consumers listen for events and update specialized query databases optimized for fast reads (e.
- Lesson 574 — CQRS Pattern with Events
- read replica
- is a separate, continuously updated copy of your primary database instance that handles read- only queries.
- Lesson 418 — Read Replicas for ScalabilityLesson 419 — Read Replica Lag and Consistency
- Read Replica Scaling
- takes the replication concepts you've learned and uses them as a performance strategy, not just availability.
- Lesson 2481 — Read Replica Scaling
- Read replicas
- work the same way for your managed database.
- Lesson 452 — Read Replicas for Performance ScalingLesson 453 — Caching Strategies for DatabasesLesson 2692 — Google Cloud Memorystore
- Read scalability
- (queries can hit replicas, not just primaries)
- Lesson 2018 — Elasticsearch Fundamentals for LoggingLesson 2480 — Asynchronous Replication Patterns
- Read-heavy workloads
- Far more reads than writes
- Lesson 2682 — In-Memory Caching FundamentalsLesson 2694 — Database Query Result Caching
- read-only
- access to metrics—not write or delete
- Lesson 334 — The Principle of Least PrivilegeLesson 418 — Read Replicas for ScalabilityLesson 771 — terraform plan ExplainedLesson 1805 — Folder-Based Organization and RBAC
- Read-only access
- Users can pull images but not push
- Lesson 992 — Registry Authentication and Authorization
- Read-only root filesystems
- Lesson 1389 — Pod Security Context Overview
- read-through
- patterns solve this by introducing a cache layer, but they differ in *who* manages that cache.
- Lesson 2595 — Cache-Aside and Read-Through PatternsLesson 2681 — Multi-Tier Caching with CDN
- Read-write access
- Users can pull and push images
- Lesson 992 — Registry Authentication and Authorization
- Read/Write Operations
- Tracking the balance of read and write operations helps you understand usage patterns and optimize volume type selection.
- Lesson 136 — Volume Monitoring and Metrics
- Read/write ratio
- High read volumes justify accepting some staleness to reduce database load
- Lesson 2709 — Cache Consistency and Trade-offs
- Readability
- Declarative is more structured and self-documenting
- Lesson 1783 — Declarative vs Scripted Pipeline Syntax
- Readability First
- Use high contrast between text and backgrounds.
- Lesson 2105 — Color Theory and Accessibility
- Readiness
- Control traffic flow during temporary unavailability
- Lesson 1419 — The Three Types of Probes
- readiness probes
- , verify operational readiness:
- Lesson 1427 — Designing Effective Health Check EndpointsLesson 1429 — Health Checks and Rolling Updates
- Reading transaction logs
- or using database triggers to detect changes
- Lesson 2809 — Continuous Data Replication and CDC
- README files
- Overview of what infrastructure the code provisions, prerequisites, and how to use it
- Lesson 717 — Documentation and Comments
- README.md
- at its root with these essential sections:
- Lesson 813 — Module Documentation and StandardsLesson 1522 — Charts: Helm's Packaging Format
- reads
- but slow down **writes**.
- Lesson 448 — Index Design and StrategyLesson 747 — Data Sources Overview
- Real-Time Alerting
- When correlation rules trigger, SIEM generates alerts for security teams to investigate immediately.
- Lesson 2861 — Security Information and Event Management (SIEM)
- Real-Time Analytics
- Lesson 2601 — Streaming Use Cases
- Real-time comparison
- Current spending is continuously compared against predictions
- Lesson 2987 — Cost Anomaly Detection Systems
- Real-Time Dashboards
- display critical metrics:
- Lesson 2386 — DDoS Monitoring and MetricsLesson 2818 — Migration Progress Tracking and Reporting
- Real-Time Data Processing
- Applications that need to hold and analyze streaming data in memory.
- Lesson 68 — Memory Optimized Instance Types
- Real-time enrichment
- Join streaming data with reference tables in external databases
- Lesson 2668 — Query Federation and External Data
- Real-time notifications
- Chat applications, live dashboards, user activity feeds
- Lesson 2685 — Redis Pub/Sub and Messaging
- Real-Time Subscriptions
- Clients subscribe to data changes (like chat messages or live updates).
- Lesson 2537 — Serverless GraphQL APIs
- Real-Time vs. Historical Data
- Visibility requires both live dashboards showing current burn rates and historical trends to identify patterns and anomalies.
- Lesson 2961 — Cost Visibility Fundamentals
- Real-world conditions
- Network partitions, latency spikes, resource exhaustion
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Reality Check
- If your RTO is 4 hours but your MTTR is 8 hours, you're not meeting your recovery objectives.
- Lesson 2412 — Mean Time to Recovery (MTTR)
- Reason
- – Why it happened (especially useful for failures)
- Lesson 850 — Stack Creation Process and Events
- Rebalancing
- automatic reassignment of partitions when consumers join or leave
- Lesson 2609 — Kafka Producers and Consumers
- Receiver
- (optional): Accepts remote-write data directly, eliminating the need for Prometheus servers in some scenarios.
- Lesson 1982 — Thanos Architecture Overview
- Receivers
- Ingest telemetry data (OTLP, Jaeger, Zipkin protocols)
- Lesson 2081 — OpenTelemetry Collector FundamentalsLesson 2082 — Collector Pipeline: Receivers, Processors, Exporters
- Receives instructions
- The kubelet watches the API Server for pod specifications assigned to its node
- Lesson 1109 — Kubelet: The Node Agent
- Recent burn rate
- Has the error budget consumption accelerated in the last hour?
- Lesson 2124 — SLO-Based Deployment Gating
- Recertify every three years
- Lesson 2325 — ISO 27001 Information Security
- recipe card
- for baking identical cookies.
- Lesson 314 — ASG Launch Templates and ConfigurationsLesson 1881 — ArgoCD Application Resource
- reclaim policy
- that dictates the PV's fate.
- Lesson 1294 — PV Reclaim PoliciesLesson 1306 — Reclaim Policies in StorageClasses
- Recommendation engine
- Generates specific resize actions (e.
- Lesson 2979 — Right-Sizing at Scale with Automation
- Recommendation engines
- (like AWS Cost Explorer or third-party tools) analyze usage history to suggest:
- Lesson 2976 — Reserved Instance Portfolio Management
- Recommender
- Analyzes historical resource usage and generates recommendations
- Lesson 1455 — Vertical Pod Autoscaler (VPA) Basics
- Reconcile
- The controller automatically applies changes to bring the cluster back to the desired state
- Lesson 1869 — GitOps Reconciliation Loop
- reconciliation loop
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1869 — GitOps Reconciliation LoopLesson 1932 — Flux Controller Architecture
- Recording rules
- are pre-computed queries that Prometheus evaluates at regular intervals and stores the results as new time series.
- Lesson 1957 — Recording RulesLesson 1958 — Alerting RulesLesson 1961 — Federation for Multi-Cluster MonitoringLesson 1979 — Prometheus Federation Basics
- Recovering
- After consecutive successful checks, restore to active rotation
- Lesson 2465 — Stateless Service Health Checks
- Recovery
- If a consumer crashed or a database was corrupted, replay events from a specific point to rebuild the correct state without manual intervention.
- Lesson 579 — Event Replay and Time TravelLesson 650 — Alarm Testing and ValidationLesson 1919 — Introduction to Flux and GitOps Philosophy
- Recovery granularity
- Restore to any point in time, not just backup windows
- Lesson 2429 — Continuous Data Protection (CDP)
- Recovery Point Objective (RPO)
- is the maximum amount of data, measured in time, that your business can afford to lose during a disaster.
- Lesson 2408 — Recovery Point Objective (RPO)Lesson 2416 — Compliance and Regulatory DR RequirementsLesson 2425 — Object Storage Versioning and LifecycleLesson 2902 — DR Testing Fundamentals and Objectives
- Recovery requirements
- determine how far back you need to restore from.
- Lesson 2420 — Backup Retention Policies
- Recovery time
- How long until normal operation resumed?
- Lesson 2500 — Measuring and Improving Resilience
- Recovery Time Objective (RTO)
- is the maximum amount of time your application or service can be offline after a disaster before the impact becomes unacceptable to your business.
- Lesson 2407 — Recovery Time Objective (RTO)Lesson 2416 — Compliance and Regulatory DR RequirementsLesson 2902 — DR Testing Fundamentals and Objectives
- Recovery Window
- – Before the waiting period expires, authorized users can **cancel the deletion** and restore the key to active status.
- Lesson 2291 — Key Deletion and Recovery
- Recycle
- (deprecated): This policy was intended to scrub data (`rm -rf /volume/*`) and make the PV available again.
- Lesson 1294 — PV Reclaim Policies
- Red
- Critical threshold breached (CPU > 85%, response time > 500ms)
- Lesson 2106 — Threshold Indicators and Alerts
- Red (-)
- Resources to be deleted (in Complete mode)
- Lesson 903 — Template Validation and What-If OperationsLesson 917 — Deployment What-If Operations
- Redirect Requests
- Lesson 256 — ALB Request and Response Modifications
- Redirects
- Detect old URL patterns in requests and redirect to new paths without a round-trip to your origin server.
- Lesson 619 — Request and Response Manipulation
- Redis
- provides:
- Lesson 1878 — ArgoCD Architecture OverviewLesson 2469 — Distributed Caching for Stateful DataLesson 2692 — Google Cloud Memorystore
- Redis ACLs
- (Access Control Lists): Define users with specific command permissions—e.
- Lesson 2696 — Cache Security and Access Control
- Redis AUTH
- Requires a password before any commands execute
- Lesson 2696 — Cache Security and Access Control
- Redis Cluster mode
- For datasets exceeding single-instance limits, Memorystore for Redis Cluster shards data across nodes (similar to Redis Cluster you learned earlier)
- Lesson 2692 — Google Cloud Memorystore
- Redrive policy
- Points to the DLQ and sets `maxReceiveCount` (typically 3-5 attempts)
- Lesson 2743 — Dead Letter Queues for Failed Messages
- Reduce
- Implement safeguards like pilot migrations, comprehensive testing, rollback procedures
- Lesson 2803 — Risk Assessment and Mitigation
- Reduce Cardinality
- High cardinality (many unique label combinations) creates exponentially more time series.
- Lesson 1976 — Query Optimization and Best Practices
- Reduce costs
- by rejecting excessive requests before they consume backend capacity
- Lesson 282 — Rate Limiting and Throttling at Load BalancerLesson 2385 — Rate Limiting and ThrottlingLesson 2883 — Ephemeral Test Environments
- Reduce dependencies
- Smaller deployment packages = faster cold starts
- Lesson 2983 — Serverless Cost Optimization Patterns
- Reduce deployment package size
- Your function code stays small; dependencies live separately
- Lesson 507 — AWS Lambda: Layers and Dependencies
- Reduce idle capacity
- One tenant's peak usage might occur during another's quiet period
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- Reduce time ranges
- Avoid querying years of data when minutes suffice.
- Lesson 2003 — Grafana Best Practices and Performance
- Reduced Attack Surface
- No public DNS resolution or internet-facing endpoints
- Lesson 1098 — Private Registry EndpointsLesson 2397 — Private Link and Endpoint Services
- Reduced complexity
- No need for dozens of VPC peering connections
- Lesson 230 — Shared VPCs and Multi-Account Networking
- Reduced costs
- Fewer egress charges from public registries
- Lesson 1097 — Registry Mirroring and CachingLesson 1615 — Locality-Aware Load Balancing
- Reduced CPU load
- on your application servers (no encryption overhead)
- Lesson 253 — SSL/TLS Termination at ALB
- Reduced downtime
- Problems caught at 80% capacity are easier to fix than total failures
- Lesson 639 — Introduction to Alarms and Alerting
- Reduced duplication
- No need to copy credentials or endpoint URLs into every namespace.
- Lesson 1279 — ClusterSecretStore Resource
- Reduced financial risk
- No expensive equipment becoming obsolete
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud Computing
- Reduced Latency
- Content travels shorter distances, loading in milliseconds instead of seconds.
- Lesson 582 — What is a CDN and Why Use One
- Reduced network overhead
- Changes affect only the relevant slice, not all endpoints
- Lesson 1212 — EndpointSlices
- Reduced origin load
- Most requests served from edge; origin handles only cache misses
- Lesson 584 — Origin Servers and Edge Caching
- Reduced processing overhead
- Consumers skip irrelevant messages
- Lesson 2715 — Message Attributes and Filtering
- Reduced staffing needs
- Less time managing physical infrastructure
- Lesson 28 — Understanding Total Cost of Ownership (TCO) in the Cloud
- Reduces attack surface
- by blocking unauthorized modifications
- Lesson 1392 — Read-Only Root FilesystemLesson 2838 — Immutable Infrastructure for Security
- Reducing bandwidth
- requirements (less data travels to central clouds)
- Lesson 25 — Edge and Distributed Cloud
- Reducing cognitive load
- developers don't reinvent security, monitoring, or deployment patterns
- Lesson 2935 — Golden Paths and Paved Roads
- Reducing latency
- Images are served from the geographically closest replica
- Lesson 1093 — ACR Geo-Replication
- Redundancy
- By spreading your application across multiple availability zones, you protect against hardware failures, power outages, or natural disasters.
- Lesson 9 — Regions and Availability ZonesLesson 1071 — Registry High Availability Basics
- Redundant, geographically distributed resources
- ready to activate instantly
- Lesson 2409 — Relationship Between RTO, RPO, and Cost
- Reference Documentation
- API specs, configuration schemas, and service catalog details.
- Lesson 2943 — Platform Documentation and Onboarding
- Reference runners in workflows
- using the `runs-on` key with your custom labels
- Lesson 1720 — Self-Hosted Runners
- Reference security groups
- from target instances to only accept traffic from the ALB
- Lesson 260 — ALB Security Features and WAF Integration
- Reference values
- from infrastructure you don't control in this configuration
- Lesson 753 — When to Use Resources vs Data Sources
- References
- let you use values from one resource when configuring another.
- Lesson 949 — Template Properties and ReferencesLesson 2528 — Workflow Best Practices
- Refine monitoring and alerting
- to ensure you can detect the chaos you're introducing
- Lesson 2494 — Chaos Experiments in Non-Production
- Refined/Curated Zone
- Cleaned, validated, processed data
- Lesson 2627 — Data Lake Concepts and Architecture
- Refresh-Ahead
- (or **Predictive Refresh**) pattern solves a problem with traditional caching: when popular data expires, the next request suffers a cache miss and must fetch from the slower backend.
- Lesson 2701 — Refresh-Ahead Caching Pattern
- Refreshes current state
- – Queries your cloud provider APIs to see what actually exists right now
- Lesson 771 — terraform plan Explained
- Regex
- extracts values from log lines into temporary key-value pairs.
- Lesson 2037 — Promtail Log Collection and Pipelines
- region
- is a specific geographic area (like "US East" or "Europe West") where a cloud provider has multiple data centers.
- Lesson 9 — Regions and Availability ZonesLesson 1492 — Creating an AKS Cluster via Azure PortalLesson 2786 — Data Transfer Costs and Optimization
- Region selection
- Deploy resources only in compliant regions
- Lesson 2332 — Geographic and Regional Compliance
- Region/Location
- `useast1`, `eu-west`
- Lesson 713 — Naming Conventions and StandardsLesson 728 — Provider Configuration Blocks
- Regional
- Each pipeline region needs its own artifact store
- Lesson 1847 — Pipeline Artifacts and Artifact StoresLesson 2368 — AWS WAF Fundamentals
- Regional and Global Scope
- Lesson 945 — Deployment Manager Limitations and Scope
- Regional clusters
- Geographic distribution with shared configurations
- Lesson 1871 — Multi-Cluster GitOps
- Regional compliance
- Keep data in specific geographic regions
- Lesson 1313 — StorageClass Topology Constraints
- Regional Consolidation
- Since cloud providers log events regionally, aggregation means copying logs from all regions into one central location.
- Lesson 2354 — Centralized Audit Log Aggregation
- Regional disasters
- (natural disasters, power grid failures)
- Lesson 2426 — Cross-Region and Cross-Account Backup
- Regional Edge Caches
- Mid-tier caches serving multiple edge locations (not all CDNs have this tier)
- Lesson 583 — CDN Architecture and Points of Presence
- Regional MIG
- Instances spread across multiple zones within a region (e.
- Lesson 326 — GCP Managed Instance Groups (MIG) Overview
- Regional restrictions
- Limit deployments to approved regions only
- Lesson 837 — Policy Enforcement with Sentinel
- regions
- and **availability zones** spread across the planet.
- Lesson 9 — Regions and Availability ZonesLesson 2452 — Fault Domains and Isolation BoundariesLesson 2453 — Geographic Distribution and Multi-Region Design
- Regions and Availability Zones
- , not weeks like traditional data centers.
- Lesson 13 — Infrastructure as a Service (IaaS) OverviewLesson 35 — Global Reach and Market Expansion Benefits
- Register the runner
- using a unique token, assigning it labels (like `self-hosted`, `linux`, `gpu`)
- Lesson 1720 — Self-Hosted Runners
- Registry
- Stable, community-vetted modules
- Lesson 804 — Module Sources and VersioningLesson 1061 — Registry vs Repository Terminology
- Rego
- (OPA's policy language) to define the validation logic that examines Kubernetes resource requests.
- Lesson 1414 — Writing Constraint TemplatesLesson 2338 — Open Policy Agent (OPA) FundamentalsLesson 2886 — Compliance Testing with Open Policy AgentLesson 2890 — Open Policy Agent (OPA) Introduction
- Regular audits
- Review and prune unused permissions quarterly
- Lesson 2834 — Principle of Least Privilege
- Regular Cadences
- create predictable cycles for review and action:
- Lesson 2989 — Continuous Optimization Programs
- Regular maintenance
- Archive unused dashboards, review slow queries, and update deprecated features.
- Lesson 2003 — Grafana Best Practices and Performance
- Regular office hours
- where developers can discuss pain points directly with platform teams
- Lesson 2946 — Feedback Loops and User Research
- Regular, scheduled testing
- validates that your DR plan remains effective as your infrastructure evolves.
- Lesson 2415 — DR Testing and Validation Frequency
- Regulatory compliance
- Enforce GDPR, HIPAA, or financial regulations dynamically
- Lesson 1626 — External Authorization Integration
- Regulatory requirements
- demanding geographic data distribution
- Lesson 2426 — Cross-Region and Cross-Account Backup
- Regulatory requirements demand multicloud
- Data residency or sovereignty rules force distribution
- Lesson 2777 — Lock-In vs Portability Trade-offs
- Reject early
- Analytics tracking, non-essential reporting, preview features
- Lesson 2593 — Load Shedding and Graceful Degradation
- Relationships
- How resources connect to each other
- Lesson 697 — Configuration Files and SyntaxLesson 2928 — Software Catalog in Backstage
- Relative paths
- Imported files are resolved relative to the main configuration file's location.
- Lesson 950 — Template Imports and OrganizationLesson 1004 — WORKDIR: Setting Working Directory
- Relatively static data
- or data where slight staleness is acceptable (product catalogs, configuration settings)
- Lesson 2694 — Database Query Result Caching
- release
- .
- Lesson 1525 — Installing a Chart: Basic DeploymentLesson 1526 — Helm Releases: Managing Deployments
- Reliability
- No unexpected side effects from incremental changes
- Lesson 46 — Immutable Infrastructure PrinciplesLesson 151 — Object Size Limits and Multipart UploadsLesson 231 — What is Load Balancing?Lesson 559 — SQS-SNS Fan-Out PatternLesson 1327 — CSI Driver Selection and ComparisonLesson 2041 — Vector Log Processing PipelineLesson 2512 — Orchestrator Pattern with Step Functions
- Reliability and Uptime
- Lesson 624 — What Is Monitoring and Why It Matters
- Remediate
- by applying changes to bring actual state back to desired state
- Lesson 1858 — Continuous ReconciliationLesson 2343 — Azure Policy for Compliance AutomationLesson 2362 — Policy-Based Governance AutomationLesson 2868 — Vulnerability Scanning and Management
- Remediation
- Enable default encryption with approved KMS key
- Lesson 2337 — Compliance Requirements Translation
- Remediation Workflows
- Build automated processes to identify untagged resources and either apply default tags or notify owners for correction.
- Lesson 2964 — Cost Allocation Tags
- Remote backends
- like S3 with DynamoDB or Terraform Cloud provide built-in locking capabilities, making them essential for team environments.
- Lesson 786 — State Locking Fundamentals
- Remote Desktop Protocol (RDP)
- is Microsoft's proprietary protocol that lets you remotely access and control a Windows computer over a network.
- Lesson 58 — Windows VMs and RDP Access
- Remote Execution
- means `terraform apply` runs in Terraform Cloud's infrastructure—not your laptop.
- Lesson 836 — Terraform Cloud for Team Collaboration
- Remote Read
- allows Prometheus to fetch older data from those external systems when executing queries.
- Lesson 1981 — Remote Write and Remote Read
- Remote state
- means storing your state file in a centralized, shared location — like an S3 bucket, Azure Blob Storage, or a specialized backend service.
- Lesson 703 — Local vs Remote StateLesson 834 — State File Partitioning
- Remote state data sources
- let configurations reference outputs from other state files, maintaining separation while enabling necessary cross-references.
- Lesson 831 — Scaling Challenges and PatternsLesson 835 — Dependency Management Between Stacks
- Remote Write
- lets Prometheus continuously stream scraped metrics to external storage backends (like Thanos, Cortex, or cloud-native solutions).
- Lesson 1981 — Remote Write and Remote Read
- Remove a volume
- Lesson 1036 — Creating and Managing Volumes
- Remove instances
- without losing critical data or breaking user sessions
- Lesson 2462 — Stateless Services and Horizontal Scaling
- Remove PSPs
- Once confident, delete the old PodSecurityPolicy objects
- Lesson 1400 — Migrating from PodSecurityPolicy
- Remove unused dependencies
- – Only include libraries your function actually needs.
- Lesson 485 — Function Packaging and Deployment Size
- Remove unused volumes
- Lesson 1036 — Creating and Managing Volumes
- Removing users
- revokes their access to that group's permissions immediately.
- Lesson 351 — Assigning Users to Groups
- Renders templates
- locally by combining your chart files with values
- Lesson 1521 — Helm Architecture: Client and Library
- Repeat
- Continuously loop forever
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1869 — GitOps Reconciliation LoopLesson 2514 — Strangler Fig Pattern for Migration
- Repeat Incidents
- How many incidents are "reruns" of previous problems.
- Lesson 2135 — Incident Metrics and Learning
- Repeatability
- You can destroy and recreate entire environments instantly—perfect for disaster recovery or creating temporary test environments.
- Lesson 47 — Infrastructure as Code PhilosophyLesson 686 — IaC Benefits: Consistency and Repeatability
- Repeated labels or annotations
- across resources
- Lesson 1557 — Advanced Templating with Named Templates
- Replace failed instances
- immediately with identical copies
- Lesson 2462 — Stateless Services and Horizontal Scaling
- Replica controller(s)
- Standby instance(s) ready to take over if the primary fails
- Lesson 1802 — Jenkins High Availability Architecture
- Replica Promotion
- The system selects a replica—typically the one with the least replication lag—and promotes it to primary status, enabling writes
- Lesson 2483 — Automatic Failover Process
- replicas
- Number of Pod copies (3 in this case)
- Lesson 1161 — Creating Your First DeploymentLesson 2018 — Elasticsearch Fundamentals for LoggingLesson 2475 — Database Replication Fundamentals
- ReplicaSet
- is a Kubernetes controller that ensures a specified number of identical Pod replicas are always running in your cluster.
- Lesson 1155 — ReplicaSet Purpose and Architecture
- ReplicaSet Controller
- ensures the right number of pod replicas exist.
- Lesson 1105 — Controller Manager: Maintaining Desired State
- Replication
- is the practice of maintaining multiple copies of your registry data across different storage backends or geographic locations.
- Lesson 1071 — Registry High Availability Basics
- Replication focus
- Configuration and container images only
- Lesson 2445 — DR for Stateful vs Stateless Apps
- replication lag
- .
- Lesson 419 — Read Replica Lag and ConsistencyLesson 454 — Database Storage PerformanceLesson 2476 — Primary-Replica ArchitectureLesson 2477 — Replication Lag and ConsistencyLesson 2480 — Asynchronous Replication PatternsLesson 2826 — Database Cutover Planning
- Replication Lag Monitoring
- Track timestamps to ensure data isn't falling dangerously behind real-time operations.
- Lesson 2444 — Data Consistency ValidationLesson 2817 — Disaster Recovery During Migration
- Replication/availability
- – Multi-region secrets cost more than single-region
- Lesson 2251 — Secrets Management Cost Optimization
- Reply-To Addresses
- The request message specifies which queue the response should be sent to.
- Lesson 2579 — Request-Reply over Message Queues
- Reporting
- Dashboards showing compliance status and violations
- Lesson 2335 — Introduction to Compliance as Code
- Reports status
- Sends heartbeat signals and pod/container status back to the API Server
- Lesson 1109 — Kubelet: The Node Agent
- Repository
- = A specific bookshelf for one book series (e.
- Lesson 1061 — Registry vs Repository TerminologyLesson 1064 — Image Naming and Tagging ConventionsLesson 1552 — Chart Dependencies and Requirements
- Repository access levels
- (read/write/admin) determine who can even propose changes
- Lesson 1874 — GitOps Access Control
- Repository name
- The path and name identifying the image (e.
- Lesson 990 — Image Naming and Tagging Conventions
- Repository Proxies
- act like local mirrors of your remote artifact repositories.
- Lesson 1681 — Artifact Distribution and Caching
- repository structure
- .
- Lesson 834 — State File PartitioningLesson 2929 — Software Templates and Scaffolding
- Reproducibility
- Deployments always use the exact same image version
- Lesson 982 — Image Digest and Content AddressingLesson 995 — Image Manifest and DigestLesson 1067 — Image Digests and ImmutabilityLesson 1532 — Helm Versioning and Chart VersionsLesson 1647 — Version Control as the Source of TruthLesson 1809 — Jenkins Configuration as Code (JCasC)
- Repurchase
- strategy (sometimes called "Replace" or "Drop and Shop") means abandoning your current application entirely and moving to a different product—typically a cloud-native SaaS solution.
- Lesson 2795 — Repurchase Strategy
- Reputation databases
- (maintained by security vendors and cloud providers) provide dynamic, continuously-updated intelligence about IP addresses showing malicious patterns across the internet.
- Lesson 2373 — Geo-Blocking and IP Reputation
- Request and response mapping
- lets you transform data structures, headers, and parameters as they flow through your API Gateway.
- Lesson 529 — Request and Response Mapping
- Request Arrival
- Your browser connects to this nearby edge server, typically within milliseconds.
- Lesson 586 — CDN Request Flow and Routing
- Request Body
- Inspect POST data for malicious payloads, especially in JSON or form submissions.
- Lesson 2375 — Custom Rules and Request Inspection
- request context
- metadata about who's making the call, when, how, and where.
- Lesson 366 — Condition Keys and ContextLesson 367 — Policy Variables and Dynamic Policies
- Request Count
- Lesson 290 — Scaling Triggers and MetricsLesson 304 — Scaling Metrics SelectionLesson 535 — API Gateway Monitoring and Logs
- Request manipulation
- means altering incoming HTTP details before they reach your origin:
- Lesson 619 — Request and Response Manipulation
- Request Mapping
- modifies incoming data before it reaches your backend:
- Lesson 529 — Request and Response Mapping
- Request metadata
- timestamp, source IP, HTTP method, URI, headers
- Lesson 2374 — WAF Logging and Monitoring
- Request method
- `POST` requests → write-optimized backend
- Lesson 275 — Content-Based Routing and Path Rules
- Request queuing
- Prevents overloading downstream Query components
- Lesson 1984 — Thanos Query and Query Frontend
- Request rate limits
- exist per bucket or per prefix.
- Lesson 155 — Object Storage Performance Characteristics
- Request routing
- based on paths, methods, and headers
- Lesson 2502 — API Gateway Integration PatternLesson 2576 — API Gateway Pattern
- Request-based
- Evaluates multiple parameters (headers, query strings, context)
- Lesson 544 — API Gateway Authorization StrategiesLesson 2115 — Request-Based vs. Window-Based SLIs
- Request-Response
- (traditional): Service A asks Service B to do something and waits for an answer.
- Lesson 567 — Event-Driven Architecture OverviewLesson 2522 — Step Functions Integration PatternsLesson 2552 — Function Chaining and Orchestration Efficiency
- Request/response sizes
- Lesson 1632 — Automatic Metrics Collection
- RequestAuthentication
- resource validates these tokens automatically at the sidecar proxy level, ensuring only requests with valid JWTs reach your services.
- Lesson 1627 — JWT Authentication and Validation
- Requester
- sends a message to `service-request-queue` with `correlationId: "abc123"` and `replyTo: "my- reply-queue"`
- Lesson 2579 — Request-Reply over Message Queues
- Requester DNS resolution
- – allows VPC-A to resolve private DNS names in VPC-B
- Lesson 225 — DNS Resolution Between VPCs
- requests
- and **limits**.
- Lesson 1329 — Understanding Resource Requests and LimitsLesson 1335 — Setting Memory LimitsLesson 2984 — Container Cost Optimization
- required
- node affinity (the "must have" rules you just learned), **preferred** node affinity lets you give Kubernetes *suggestions* about where you'd like Pods to run.
- Lesson 1348 — Preferred Node Affinity RulesLesson 1351 — Pod Affinity FundamentalsLesson 1352 — Pod Anti-Affinity BasicsLesson 1354 — Required vs Preferred Pod AffinityLesson 1355 — Inter-Pod Affinity PatternsLesson 1356 — Anti-Affinity for High AvailabilityLesson 1359 — Affinity TroubleshootingLesson 1495 — System vs User Node Pools (+2 more)
- Required arguments
- Values you *must* provide for the resource to be created.
- Lesson 740 — Resource Arguments and Attributes
- Required fields
- Does the request include all mandatory parameters?
- Lesson 538 — Request ValidationLesson 1558 — Helm Schema Validation
- Required in every template
- Lesson 947 — Template Structure and YAML Syntax
- Required labels example
- Enforce that all namespaces have an "owner" label:
- Lesson 1415 — Implementing Constraints
- Required rules
- reduce scheduling flexibility and can cause pod starvation
- Lesson 1354 — Required vs Preferred Pod Affinity
- Required vs preferred rules
- (hard requirements vs soft preferences)
- Lesson 1346 — Node Affinity vs Node Selector
- Requirements typically include
- Lesson 160 — Cross-Region Replication Basics
- Requires route table updates
- After establishing the peering connection, you must add routes in each VPC's route tables pointing to the other VPC's CIDR range via the peering connection.
- Lesson 216 — VPC Peering Fundamentals
- Requires stable, persistent storage
- tied to specific Pod identities
- Lesson 1177 — StatefulSet vs Deployment Use Cases
- Reserved Capacity
- for predictable workloads, and applying the **OpEx model** where you only pay for what you actually consume.
- Lesson 33 — Cloud Cost Optimization: Right-Sizing ResourcesLesson 2224 — Private Connectivity Cost Management
- Reserved Concurrency
- allocates a dedicated portion of your account's concurrency limit to a specific function.
- Lesson 479 — Reserved and Provisioned ConcurrencyLesson 2550 — Concurrency ManagementLesson 2983 — Serverless Cost Optimization Patterns
- Reserved Instance recommendations
- based on your usage patterns
- Lesson 2175 — Azure Budgets and Advisor
- Reserved Instances
- Lock you into specific configurations
- Lesson 76 — Savings Plans and Committed Use DiscountsLesson 80 — Pricing Model Selection StrategyLesson 94 — AWS EC2 Launch Types and TenancyLesson 2153 — Reserved Instances and Savings PlansLesson 2155 — Auto Scaling for Cost EfficiencyLesson 2446 — Cost Optimization in DR Design
- Reserved Instances (RIs)
- and **Savings Plans** like buying in bulk or signing a gym membership.
- Lesson 2153 — Reserved Instances and Savings Plans
- Reserved/Committed
- AWS Reserved Instances = Azure Reserved VMs = GCP Committed Use Discounts
- Lesson 109 — Cross-Provider Compute Feature Comparison
- Reset tolerance
- Prometheus can detect and handle counter resets automatically when calculating rates
- Lesson 1949 — Metric Types: Counter
- Resilience
- If a consumer is down, events wait in the queue
- Lesson 567 — Event-Driven Architecture OverviewLesson 576 — Dead Letter QueuesLesson 1097 — Registry Mirroring and CachingLesson 1100 — Kubernetes Cluster Architecture OverviewLesson 2578 — Event-Driven CommunicationLesson 2794 — Refactor/Re-architect Strategy
- Resilience and redundancy
- Distributing workloads across providers protects against provider-specific outages or regional failures.
- Lesson 2751 — What is Multicloud and Why Organizations Adopt It
- Resize
- pools by adjusting node count (manual or autoscaling)
- Lesson 1479 — GKE Node Pools and Machine Types
- Resizing
- means switching your VM to a different instance type or size—like upgrading from a `t3.
- Lesson 89 — Instance Resize and Type Changes
- Resolution
- refers to the granularity of time intervals at which metrics are stored or queried—higher resolution means more frequent data points, lower resolution means broader time windows.
- Lesson 634 — Metric Aggregation and Resolution
- Resolvers
- These are the serverless functions that fetch data when a GraphQL field is requested.
- Lesson 2537 — Serverless GraphQL APIs
- Resource
- *Which* bucket or objects the rule applies to
- Lesson 164 — Bucket Policies and Access ControlLesson 333 — IAM Core Concepts: Identities and ResourcesLesson 335 — IAM Policies: The Language of PermissionsLesson 337 — Effect, Action, and Resource in PoliciesLesson 361 — Policy Structure and SyntaxLesson 362 — Principal, Action, and Resource ElementsLesson 856 — Stack Policies for Update ProtectionLesson 2865 — CloudTrail and Audit Logging for Security
- resource block
- is where you actually create infrastructure in Terraform.
- Lesson 729 — Resource Blocks and Meta-ArgumentsLesson 739 — Resource Blocks and the Resource LifecycleLesson 752 — Data Sources and Dependencies
- Resource constraints
- If a node lacks CPU/memory, the DaemonSet pod won't fit
- Lesson 1190 — StatefulSet and DaemonSet TroubleshootingLesson 2740 — Understanding Backpressure in Distributed Systems
- Resource consumption
- Each sidecar proxy requires its own CPU and memory allocation.
- Lesson 1573 — Service Mesh Performance OverheadLesson 1599 — Cilium Service Mesh with eBPF
- Resource count
- Distribute based on number of instances, containers, or services each team runs
- Lesson 2149 — Shared Services Cost Allocation
- Resource deletion events
- – Deleting audit logs themselves, removing backup snapshots, or terminating critical infrastructure warrants instant investigation.
- Lesson 2356 — Real-Time Audit Log Monitoring
- Resource dependencies
- Connect resources by referencing one resource's ID in another's configuration
- Lesson 863 — Intrinsic Function Ref
- Resource efficiency
- No idle agents consuming memory or CPU
- Lesson 1801 — Kubernetes Plugin for Dynamic AgentsLesson 2081 — OpenTelemetry Collector Fundamentals
- Resource exhaustion
- – memory, CPU, or connection pools depleting
- Lesson 2744 — Rate Limiting Fundamentals
- resource group
- is a logical container that holds related Azure resources.
- Lesson 904 — Resource Groups and Template ScopeLesson 1492 — Creating an AKS Cluster via Azure Portal
- Resource grouping
- through Resource Groups (logical containers)
- Lesson 893 — Introduction to Azure Resource Manager (ARM)
- Resource identifiers
- that reveal your architecture
- Lesson 704 — State File Security ConcernsLesson 2962 — Cloud Billing Data Structure
- Resource IDs
- needed for linking resources across deployments
- Lesson 899 — Outputs for Template Results
- Resource isolation
- Log processing overhead doesn't compete with your application's CPU and memory.
- Lesson 2050 — Sidecar Pattern for Logging
- Resource Lifecycle Manager
- ARM tracks every resource from creation through updates to deletion, maintaining consistency and relationships between resources.
- Lesson 893 — Introduction to Azure Resource Manager (ARM)
- Resource Limits
- Always set memory and CPU limits on logging DaemonSets.
- Lesson 1442 — Logging Performance and OverheadLesson 1588 — Istio Proxy ConfigurationLesson 1667 — Multi-Environment Promotion
- Resource limits too low
- Pods hit limits before HPA triggers
- Lesson 1459 — Autoscaling Best Practices and Troubleshooting
- Resource Mappings
- – These connect your IaC configuration (what you *wrote* in code) to real cloud resources (what actually *exists*).
- Lesson 701 — State File Contents and Structure
- Resource naming
- Do resources follow your team's naming conventions?
- Lesson 715 — Code Review and Peer Validation
- Resource naming conventions
- you want to standardize
- Lesson 898 — Variables for Template Simplification
- Resource Normalization
- ArgoCD can normalize resources before comparison—like converting equivalent YAML representations or handling known Kubernetes quirks (e.
- Lesson 1901 — Diff Customization
- Resource overcommitment
- occurs when the *sum of all resource requests* across Pods scheduled on a node exceeds the node's actual capacity.
- Lesson 1339 — Resource Overcommitment
- Resource permissions
- Lambda needs permission to access both Secrets Manager and your target system
- Lesson 2240 — AWS Secrets Manager Rotation
- Resource reallocation
- Calculate engineering hours currently wasted on manual cost management
- Lesson 2956 — Executive Buy-in and Sponsorship
- Resource requirements
- Does the node have enough CPU and memory available?
- Lesson 1104 — Scheduler: Pod Placement Logic
- Resource Risks
- Skill gaps in cloud technologies, insufficient team capacity, budget overruns.
- Lesson 2803 — Risk Assessment and Mitigation
- Resource scope
- All S3 buckets with tag `DataClassification=Customer`
- Lesson 2337 — Compliance Requirements Translation
- Resource standards
- Mandate naming conventions, require specific tags
- Lesson 837 — Policy Enforcement with Sentinel
- Resource tampering
- Deletion of security groups, logging configs, or encryption keys
- Lesson 2865 — CloudTrail and Audit Logging for Security
- Resource targeting
- reduces graph complexity but should not replace proper module boundaries
- Lesson 839 — Parallel Execution and Performance
- Resource Throttling
- Under load, reduce resource-intensive features first.
- Lesson 2458 — Graceful Degradation Patterns
- Resource type
- `vm`, `bucket`, `network`
- Lesson 713 — Naming Conventions and StandardsLesson 1119 — Resource Types and Kinds
- Resource usage
- Sudden access to sensitive data repositories never touched before
- Lesson 2858 — Behavioral Analytics and Anomaly Detection
- Resource variations
- (high-CPU for compilations, GPU for ML tasks)
- Lesson 1798 — Distributed Builds and Agent Architecture
- Resource whitelist/blacklist
- What Kubernetes resources are allowed (or forbidden)?
- Lesson 1887 — ArgoCD Projects for Multi-Tenancy
- resource_type
- The provider resource type (e.
- Lesson 746 — Resource Addressing and ReferencesLesson 751 — Referencing Data Source Attributes
- Resource-based
- A special collection room has a sign on the door: "Only faculty members and researchers may enter.
- Lesson 336 — Identity-Based vs Resource-Based PoliciesLesson 394 — GCP IAM ConditionsLesson 2967 — Shared Cost Allocation
- Resource-based example
- "Bucket-X allows reads from Alice's account"
- Lesson 336 — Identity-Based vs Resource-Based Policies
- Resource-based policies
- (permissions on the storage itself)
- Lesson 122 — Storage Security BasicsLesson 336 — Identity-Based vs Resource-Based PoliciesLesson 362 — Principal, Action, and Resource ElementsLesson 1088 — ECR Authentication and IAM Integration
- Resource-level decisions
- (instance types, scaling policies, storage tiers)
- Lesson 2954 — Shared Responsibility Model
- ResourceQuota
- is like a spending limit on a shared credit card for an entire team.
- Lesson 1337 — Resource Quota Basics
- resources
- are the rooms, equipment, and data they might need to access (databases, storage, virtual machines, networks).
- Lesson 333 — IAM Core Concepts: Identities and ResourcesLesson 335 — IAM Policies: The Language of PermissionsLesson 386 — Azure RBAC FundamentalsLesson 391 — GCP IAM Overview and HierarchyLesson 697 — Configuration Files and SyntaxLesson 845 — Introduction to AWS CloudFormationLesson 847 — Template Structure and SectionsLesson 857 — CloudFormation Console and Stack Management (+5 more)
- Resources array
- The heart of the file—a list of all managed resources
- Lesson 775 — State File Contents and Structure
- Resources generated dynamically
- (same timestamp, different output)
- Lesson 2674 — ETag and Conditional Requests
- Resources it affects
- Which buckets, instances, or services
- Lesson 375 — Policy Documentation and Governance
- Resources section
- (required): Defines the GCP resources to create
- Lesson 947 — Template Structure and YAML Syntax
- Response Aggregation
- The gateway can call multiple services and combine their responses into one payload, reducing client-side complexity and round trips.
- Lesson 2576 — API Gateway Pattern
- Response formatting
- Transforming data structures to match frontend expectations
- Lesson 2577 — Backend for Frontend (BFF) Pattern
- Response manipulation
- means changing what comes back from the origin:
- Lesson 619 — Request and Response Manipulation
- Response Mapping
- transforms what comes back from your backend:
- Lesson 529 — Request and Response MappingLesson 2538 — API Gateway with Database Integration
- response time
- and **processing duration** reveal performance degradation.
- Lesson 2187 — Load Balancer Health and MetricsLesson 2554 — Performance Testing and Benchmarking
- Response time expectations
- (minutes for critical, hours for warnings, review as-time-permits for info)
- Lesson 649 — Alert Severity and Prioritization
- Responsibilities
- Declare severity, assign roles, make final decisions, approve communications.
- Lesson 2133 — Incident Command System
- Restart
- happens when live migration isn't possible (certain instance types or older hardware).
- Lesson 91 — VM Maintenance and Updates
- Restart policy
- Must be `OnFailure` or `Never` (not `Always`)
- Lesson 1191 — Kubernetes Job Resource FundamentalsLesson 1335 — Setting Memory Limits
- RESTful Interface
- Exposes all Kubernetes resources via HTTP/HTTPS endpoints
- Lesson 1116 — Kubernetes API Server Overview
- Restore Testing
- is the gold standard: actually restoring data to a test environment and validating functionality.
- Lesson 2428 — Backup Validation and Testing
- Restrict access tightly
- Use backend IAM policies that follow least privilege.
- Lesson 797 — Remote State Best Practices
- Result
- Any web server can connect to the database; no manual IP management needed
- Lesson 205 — Security Group Chaining and ReferencesLesson 2350 — Cloud Trail Services Overview
- Resumability
- You can pause and resume large uploads without starting over
- Lesson 151 — Object Size Limits and Multipart UploadsLesson 166 — Multipart Upload
- Resume Normal Replication
- Re-establish primary-to-DR replication for future protection.
- Lesson 2443 — Failback Procedures
- Retain
- The resource is preserved and remains in your AWS account even after stack deletion
- Lesson 852 — Stack Deletion and Retention PoliciesLesson 888 — DeletionPolicy and RetainLesson 1294 — PV Reclaim PoliciesLesson 2796 — Retire and Retain Strategies
- Retain full lifecycle control
- over key material for compliance auditing
- Lesson 2293 — Key Import and External Key Stores
- Retention
- is how long you keep logs before deleting them.
- Lesson 656 — Log Retention and Storage Requirements
- retention period
- (e.
- Lesson 167 — Object Lock and RetentionLesson 565 — Message Retention and Expiration
- Retention Policies
- Specify how many snapshots to keep or how long to keep them.
- Lesson 132 — Snapshot Lifecycle ManagementLesson 2353 — Audit Log Storage and RetentionLesson 2610 — Kafka Retention and StorageLesson 2631 — Data Lake Zones and Organization
- Retention pressure
- keeping months of high-resolution data requires terabytes
- Lesson 1977 — Challenges of Running Prometheus at Scale
- Retire
- (decommissioning) and **Retain** (keeping on-premises).
- Lesson 2796 — Retire and Retain Strategies
- Retries and idempotence
- ensuring messages arrive despite network issues without duplication
- Lesson 2609 — Kafka Producers and Consumers
- Retries and timeouts
- when calls fail
- Lesson 1564 — What is a Service Mesh?Lesson 1602 — Traffic Routing Fundamentals in Service Mesh
- Retrieve the RoleID
- (static identifier, low sensitivity)
- Lesson 2258 — AppRole Authentication for Applications
- Retrieving a secret
- requires appropriate IAM permissions.
- Lesson 2239 — AWS Secrets Manager Fundamentals
- Retry
- Flaky integration tests, network-dependent operations, external API calls
- Lesson 1751 — Job Retry and TimeoutLesson 2583 — Bulkhead Pattern for Isolation
- Retry attempts
- How many times to retry (0-2 is common)
- Lesson 488 — Function Error Handling and Retries
- Retry configuration
- and whether retries were exhausted
- Lesson 2526 — Workflow Monitoring and Debugging
- Retry with backoff
- Requeue failed tasks with increasing delays
- Lesson 2723 — Delay Queues and Message Timers
- Return Fixed Responses
- Lesson 256 — ALB Request and Response Modifications
- Reusability
- Create templates for dev, staging, and production environments
- Lesson 403 — Database Parameter GroupsLesson 711 — Code Organization and Module StructureLesson 805 — Publishing Modules to Terraform RegistryLesson 863 — Intrinsic Function RefLesson 881 — Nested StacksLesson 950 — Template Imports and OrganizationLesson 954 — Introduction to Composite TypesLesson 955 — Creating Custom Composite Types (+2 more)
- Reusable modules
- in a dedicated directory, versioned independently
- Lesson 833 — Repository Structure for Large Projects
- Reusable templates
- – Define a permission set once, then bind it to different namespaces as needed
- Lesson 1382 — Creating a ClusterRole
- Reusable workflows
- let you define a workflow once and call it from other workflows like a function.
- Lesson 1716 — Workflow Templates and Reusable Workflows
- Reuse configurations
- Write once, deploy many times across environments or projects
- Lesson 798 — What Are Terraform Modules
- Reuse connections carefully
- While connection pooling helps in origin functions, edge functions often don't persist long enough to benefit.
- Lesson 622 — Edge Function Performance Optimization
- Revenue enabled
- by global reach across multiple Regions
- Lesson 37 — Measuring Cloud Business Value: KPIs and Metrics
- Revenue impact
- Show how cost efficiency improves profit margins or enables competitive pricing
- Lesson 2956 — Executive Buy-in and Sponsorship
- Revert in Git
- Use `git revert` or merge a rollback PR to restore previous manifests
- Lesson 1873 — Rollback and Recovery
- Review Gates
- Require human approval before applying changes to production
- Lesson 709 — Workflow Automation and CI/CD Integration
- Review resource requests
- Ensure pods have appropriate CPU/memory requests
- Lesson 1519 — Troubleshooting Common Cluster Issues
- Review route entries
- Look at destination CIDR blocks and their targets.
- Lesson 2190 — Route Table Verification
- Review the change set
- carefully for unexpected modifications or replacements
- Lesson 878 — Stack Updates and Change Sets
- Review the changes
- CloudFormation presents a detailed breakdown of the impact
- Lesson 851 — Stack Updates and Change Sets
- revision
- a snapshot of that version.
- Lesson 1170 — Rollback and Revision HistoryLesson 1531 — Release History and StatusLesson 1556 — Helm Rollback Strategies
- Revision-based deployments
- that let you run multiple control plane versions side-by-side, testing new versions gradually before full rollout.
- Lesson 1590 — Istio Upgrade and Version Management
- Revocation power
- – Delete or disable keys to make encrypted data inaccessible
- Lesson 2300 — Server-Side Encryption with Customer-Managed Keys
- Revoke credentials
- by deactivating IAM access keys or disabling user accounts
- Lesson 2871 — Automated Incident Response
- RFC 1918
- defines three special IP ranges reserved exclusively for private networks—these addresses can be reused by anyone inside their own network without conflict, because they never appear on the public internet.
- Lesson 173 — Private IP Address Spaces (RFC 1918)
- Rich Marketplace
- Thousands of pre-built actions (reusable components) are available for common tasks—from Docker builds to cloud deployments—saving you from writing everything from scratch.
- Lesson 1682 — What is GitHub Actions and Why Use It
- Richer routing rules
- (header-based, weighted traffic splits, redirects)
- Lesson 1233 — Gateway API Introduction
- Right to Access
- Users can request copies of their data
- Lesson 2328 — GDPR Data Protection Requirements
- Right to Data Portability
- Receive data in a structured, machine-readable format
- Lesson 2328 — GDPR Data Protection Requirements
- Right to Erasure
- ("Right to be Forgotten"): Deletion under certain circumstances
- Lesson 2328 — GDPR Data Protection Requirements
- right-size
- each execution environment without installing everything everywhere.
- Lesson 1785 — Agent Directive and Execution EnvironmentsLesson 2160 — Idle Resource Detection
- Right-size resource requests
- Set accurate CPU/memory requests—not too high (wastes space) or too low (causes throttling)
- Lesson 1489 — GKE Cost Optimization and Bin Packing
- Right-size your capacity limits
- Set your minimum capacity to the absolute lowest number of instances that can handle baseline traffic.
- Lesson 311 — Scaling for Cost Optimization
- right-sizing
- your resources (covered in step 2152), analyze your steady-state workloads—services running 24/7 or predictably.
- Lesson 2153 — Reserved Instances and Savings PlansLesson 2155 — Auto Scaling for Cost Efficiency
- Right-sizing bandwidth
- – Don't pay for 10Gbps if 1Gbps suffices
- Lesson 2224 — Private Connectivity Cost Management
- Rightsizing opportunities
- Oversized Compute Engine instances that could drop tiers
- Lesson 2180 — GCP Recommender and Cost Insights
- Rightsizing with Code
- Lesson 694 — Cost Optimization Through IaC
- Rising latency
- Check network, add cluster nodes, or optimize data structures
- Lesson 2695 — Cache Monitoring and Performance Metrics
- Risk assessment
- Identify threats to your information assets
- Lesson 2325 — ISO 27001 Information SecurityLesson 2797 — Migration Assessment Framework
- Risk mitigation
- problems impact only a small percentage
- Lesson 276 — Weighted Target Groups and Canary DeploymentsLesson 2956 — Executive Buy-in and Sponsorship
- Risk of loss
- If someone's laptop crashes or they delete the file, you lose track of your infrastructure
- Lesson 776 — Local State Storage
- Risk signals
- Unusual login times, impossible travel scenarios, threat intelligence feeds
- Lesson 2399 — Context-Aware Access Controls
- Risk tolerance
- – Your organization's appetite for disruption determines wave size and timing
- Lesson 2812 — Migration Wave Planning and Execution
- Risk treatment
- Implement controls from Annex A (114 security controls across 14 domains)
- Lesson 2325 — ISO 27001 Information Security
- role
- (activated when the role is assumed)
- Lesson 352 — Roles vs PoliciesLesson 1375 — RBAC API Objects OverviewLesson 1377 — Role vs ClusterRoleLesson 1380 — Creating a Basic Role
- Role assumptions
- Which identities (users, services, accounts) can assume each role?
- Lesson 360 — Auditing Group and Role Membership
- Role-based access control (RBAC)
- for security
- Lesson 893 — Introduction to Azure Resource Manager (ARM)Lesson 1080 — Registry Access Control and RBACLesson 2014 — Log Security and ComplianceLesson 2933 — RBAC and Portal Access Control
- Role-based access controls
- and **multi-tenancy** let organizations segregate data by department or security level—critical for compliance in regulated industries.
- Lesson 2042 — Splunk Cloud and Enterprise Logging
- Role-Based Strategy
- (via the Role-Based Authorization Strategy plugin) lets you define roles (like "developer," "viewer," "admin") with bundled permissions, then assign users to roles.
- Lesson 1781 — Jenkins User Management and Security
- Role-oriented design
- (infrastructure admins manage Gateways; developers manage Routes)
- Lesson 1233 — Gateway API Introduction
- RoleBinding
- Binds a Role (or ClusterRole) to subjects *within a specific namespace*.
- Lesson 1375 — RBAC API Objects OverviewLesson 1381 — RoleBinding Fundamentals
- RoleBindings
- and **ClusterRoleBindings** define *who* can do it.
- Lesson 1375 — RBAC API Objects Overview
- RoleID
- = username (less sensitive, can be baked into images)
- Lesson 2258 — AppRole Authentication for Applications
- roleRef
- Points to the Role you want to assign (the "what")
- Lesson 1381 — RoleBinding FundamentalsLesson 1383 — ClusterRoleBinding Usage
- roles
- (web tier, database tier) rather than individual instances.
- Lesson 214 — Security Group Best PracticesLesson 333 — IAM Core Concepts: Identities and ResourcesLesson 352 — Roles vs PoliciesLesson 359 — Group and Role Naming ConventionsLesson 393 — GCP Service AccountsLesson 1375 — RBAC API Objects OverviewLesson 1377 — Role vs ClusterRoleLesson 1388 — RBAC Best Practices (+2 more)
- Roll back immediately
- if you detect problems, affecting only the canary group
- Lesson 1665 — Canary Deployment Pattern
- Roll back instantly
- if problems arise by reverting traffic weights
- Lesson 1606 — Canary Deployments with Service Mesh
- Roll out sidecars gradually
- New connections automatically use mTLS when both sides support it
- Lesson 1622 — mTLS Migration Strategies
- Rollback
- Traditional ops requires re-running old pipelines.
- Lesson 1853 — GitOps vs Traditional Operations
- Rollback capability
- Reverting to a previous state means reverting a Git commit
- Lesson 1856 — Git as Single Source of TruthLesson 1868 — Environment Promotion PatternsLesson 2111 — Dashboard as Code and Version ControlLesson 2246 — GCP Secret Manager IAM and VersioningLesson 2316 — Azure Key Vault Key Management
- Rollback procedures
- Define exactly how to abort and reverse the experiment instantly
- Lesson 2493 — Blast Radius and Safety Controls
- Rollback readiness
- Always maintain the ability to route back to the monolith
- Lesson 2569 — Microservices Migration Strategies
- Rollback safety
- Instantly revert percentages if issues arise
- Lesson 1605 — Traffic Splitting and Weighted Routing
- ROLLBACK_COMPLETE
- – All partial resources cleaned up after failure
- Lesson 850 — Stack Creation Process and Events
- ROLLBACK_IN_PROGRESS
- – Failed creation, deleting partial resources
- Lesson 850 — Stack Creation Process and EventsLesson 877 — Stack Creation and Lifecycle
- Rolling back
- to a previous version if something breaks:
- Lesson 1526 — Helm Releases: Managing Deployments
- Rolling Deployment
- Updates instances in batches, gradually replacing old versions while maintaining partial availability.
- Lesson 1831 — CodeDeploy Overview and Deployment Types
- Rolling updates
- Deploy new template versions gradually without downtime
- Lesson 103 — GCP Instance Groups and TemplatesLesson 328 — MIG Rolling Updates and Canary DeploymentsLesson 1059 — Compose Best Practices and LimitationsLesson 1166 — Updating DeploymentsLesson 1509 — Node Image UpgradesLesson 1663 — Rollback and Recovery Patterns
- RollingUpdate
- (default) gradually replaces old DaemonSet pods with new ones, node by node.
- Lesson 1188 — DaemonSet Update Strategies
- root account
- (sometimes called the master account or superuser) is the very first account created when you set up a cloud provider account.
- Lesson 339 — Root Account and Administrative AccessLesson 377 — AWS IAM Users and Root Account
- Root cause analysis
- Identify patterns like "all errors happen when `region=us-east-1`"
- Lesson 2064 — Span Attributes and TagsLesson 2134 — Post-Incident Reviews and Blameless PostmortemsLesson 2874 — Post-Incident Review and Improvement
- root module
- that lives in your working directory.
- Lesson 798 — What Are Terraform ModulesLesson 800 — Root Module vs Child Modules
- root volume
- .
- Lesson 61 — Root and Additional Storage VolumesLesson 83 — Starting and Stopping VMsLesson 85 — VM Termination and Deletion
- Rotation
- Periodically replace old keys with new ones
- Lesson 343 — Access Keys and Credential ManagementLesson 2244 — Azure Key Vault Rotation and VersioningLesson 2280 — Introduction to Key Management Systems
- Rotation fairness
- Balance weekend/holiday coverage equitably
- Lesson 2127 — On-Call Rotation Structures
- Rotation flexibility
- – Enable automatic key rotation on your schedule
- Lesson 2300 — Server-Side Encryption with Customer-Managed Keys
- Rotation happens transparently
- (apps get new values automatically)
- Lesson 2248 — Secrets in Application Code
- Rotation lag
- Cached keys continue encrypting new data even after rotation begins
- Lesson 2305 — Data Key Caching Pattern
- Rotation success rate
- Are renewals completing successfully?
- Lesson 1628 — Certificate Rotation and Expiry
- Rotation windows
- Implement a grace period where both old and new secrets work simultaneously, allowing services to transition smoothly.
- Lesson 2247 — GCP Secret Manager Rotation Strategies
- Round Robin
- Distributes requests evenly across all healthy instances in sequence.
- Lesson 1569 — Load Balancing in Service Mesh
- Round-robin
- Requests cycle through instances sequentially
- Lesson 2457 — Load Distribution for AvailabilityLesson 2464 — Stateless HA Patterns: Load BalancingLesson 2607 — Stream Partitioning and Parallelism
- Round-trip time (RTT)
- measures the full journey there and back.
- Lesson 2185 — Latency and Performance Metrics
- Route all traffic
- through an API Gateway initially pointing to the monolith
- Lesson 2514 — Strangler Fig Pattern for Migration
- Route controller
- Configures network routes in the cloud for pod-to-pod communication across nodes
- Lesson 1107 — Cloud Controller Manager
- Route filters
- act like selective gatekeepers for Microsoft peering.
- Lesson 2204 — ExpressRoute Routing and BGP
- Route only private ranges
- (`private-ranges-only`): Only RFC 1918 private IP traffic uses the connector; internet traffic goes direct—optimizes performance and connector costs
- Lesson 516 — Google Cloud Functions: VPC Connectivity and Networking
- Route priority conflicts
- More specific routes overriding your intended path
- Lesson 2190 — Route Table Verification
- Route selectively
- Use an API Gateway or routing layer to direct requests for that feature to the new service
- Lesson 2598 — Strangler Fig Pattern for Migration
- route table
- is like a GPS navigation system for your cloud network.
- Lesson 180 — Route Tables BasicsLesson 188 — Attaching Internet Gateways to VPCsLesson 193 — NAT Gateway DeploymentLesson 2236 — Troubleshooting Network Performance Issues
- Route Table Updates
- Lesson 196 — NAT Instance Configuration
- Router/gateway address
- (often second IP) - Where traffic exits the subnet
- Lesson 179 — Reserved IP Addresses in Subnets
- routes
- ) that answer the question: "If traffic is trying to reach IP address X, where should I send it?
- Lesson 180 — Route Tables BasicsLesson 520 — What is an API Gateway?Lesson 665 — Log Aggregation PipelinesLesson 1581 — VirtualService Fundamentals
- Routing
- Lesson 527 — API Gateway Request FlowLesson 563 — Message Attributes and MetadataLesson 599 — Custom Headers and Origin RequestsLesson 665 — Log Aggregation PipelinesLesson 2602 — Streaming Architecture Patterns
- Routing asymmetry
- when paths differ in each direction
- Lesson 2227 — Network Path Analysis and Traceroute
- Routing configuration
- Which CIDR blocks should traverse the tunnel
- Lesson 2779 — Cross-Cloud VPN Connections
- Routing inefficiencies
- (traffic taking circuitous paths instead of direct routes)
- Lesson 2227 — Network Path Analysis and Traceroute
- Routing policies
- (failover, weighted, geoproximity) that specify primary and secondary targets
- Lesson 2437 — DNS-Based Failover
- Row Count Validation
- The simplest check—compare table row counts between source and target.
- Lesson 2830 — Data Validation and Consistency Checks
- RPO
- control, often measured in minutes or seconds.
- Lesson 2424 — Database Backup ApproachesLesson 2428 — Backup Validation and TestingLesson 2429 — Continuous Data Protection (CDP)Lesson 2436 — Cross-Region Replication SetupLesson 2475 — Database Replication Fundamentals
- RPO (Recovery Point Objective)
- How much data loss is acceptable?
- Lesson 2405 — What is Disaster Recovery (DR)?
- RPO > 0
- is acceptable (seconds to minutes of potential loss)
- Lesson 2480 — Asynchronous Replication Patterns
- RPO is near-zero
- No data loss concerns for the app itself
- Lesson 2445 — DR for Stateful vs Stateless Apps
- RPO of 1 hour
- → Hourly snapshots or continuous replication required
- Lesson 2408 — Recovery Point Objective (RPO)
- RPO of near-zero
- → Real-time synchronous replication to standby systems
- Lesson 2408 — Recovery Point Objective (RPO)
- RTO
- needs (restore speed) against **RPO** requirements (data loss tolerance)
- Lesson 2424 — Database Backup ApproachesLesson 2428 — Backup Validation and Testing
- RTO (Recovery Time Objective)
- How quickly must systems be restored?
- Lesson 2405 — What is Disaster Recovery (DR)?
- RTO of days
- Cold standby or backup-restore approaches become acceptable—you can restore from snapshots or backups when needed.
- Lesson 2407 — Recovery Time Objective (RTO)
- RTO of hours
- Warm standby environments may suffice—pre-provisioned infrastructure that's running but not serving production traffic.
- Lesson 2407 — Recovery Time Objective (RTO)
- Rule effectiveness
- which custom rules generate the most blocks
- Lesson 2374 — WAF Logging and Monitoring
- Rule match details
- which rules triggered (allow, block, count mode)
- Lesson 2374 — WAF Logging and Monitoring
- Rule refinement
- involves adjusting rule sensitivity without disabling protection entirely:
- Lesson 2376 — WAF Tuning and False Positive Management
- Rule-based filtering
- using signatures for known attack patterns
- Lesson 2364 — What is a Web Application Firewall (WAF)
- Ruler
- Evaluates recording and alerting rules across the global dataset (optional, but useful for global alerts).
- Lesson 1982 — Thanos Architecture Overview
- rules
- once, and the cloud provider executes them automatically.
- Lesson 158 — Object Lifecycle PoliciesLesson 243 — Load Balancer Listeners and RulesLesson 246 — ALB Listeners and RulesLesson 249 — Path-Based RoutingLesson 1378 — Defining Permissions with RulesLesson 1382 — Creating a ClusterRoleLesson 1411 — Webhook Configuration and RegistrationLesson 1661 — Conditional Execution Pattern (+4 more)
- Rules/Filters
- Criteria that determine which messages each subscription receives
- Lesson 561 — Azure Service Bus Topics
- Run in parallel
- Both old and new systems handle their respective requests
- Lesson 2598 — Strangler Fig Pattern for Migration
- Run only for tags
- Lesson 1737 — Job Rules: Basic Conditional Execution
- Run states in parallel
- (fan-out multiple operations simultaneously)
- Lesson 2516 — Step Functions and State Machines
- Runbooks
- Step-by-step operational procedures for common tasks
- Lesson 717 — Documentation and CommentsLesson 2130 — Runbooks and Playbooks
- Runners (Execution Engines)
- Lesson 1727 — GitLab CI/CD Architecture Overview
- Running
- – Your VM is powered on and actively executing.
- Lesson 62 — VM States: Running, Stopped, TerminatedLesson 82 — VM States and State Transitions
- Runs tests
- you've defined (unit tests, integration tests, etc.
- Lesson 1822 — CodeBuild Overview and Core Concepts
- runtime
- the language environment (like Python 3.
- Lesson 483 — Function Runtime SelectionLesson 505 — AWS Lambda: Core Features and Configuration
- Runtime arguments
- When users run your container with arguments, those replace `CMD` but still go to `ENTRYPOINT`.
- Lesson 1009 — ENTRYPOINT: Container Executable
- Runtime environments
- pre-installed languages, frameworks, and libraries
- Lesson 14 — Platform as a Service (PaaS) Overview
- Runtime initialization
- – Starting the language runtime (Node.
- Lesson 463 — Cold Starts and Warm Starts
- Runtime language
- (compiled languages like Go start faster than interpreted ones)
- Lesson 491 — Cold Start FundamentalsLesson 2543 — Cold Start Fundamentals
- Runtime Selection
- Lesson 492 — Minimizing Cold Start Duration
- RuntimeDefault
- The container runtime's default profile (blocks ~44 risky syscalls)
- Lesson 1397 — Seccomp Profiles
- Rust-based micro-proxies
- instead of general-purpose proxies, making its data plane extremely fast and resource-efficient.
- Lesson 1591 — Linkerd Overview and Architecture
S
- S3
- Triggers on object uploads (async)
- Lesson 506 — AWS Lambda: Event Sources and TriggersLesson 1826 — Source Providers and Integration
- S3 (and object storage)
- provides incredibly cheap, durable storage.
- Lesson 2096 — Backend Storage Considerations
- S3 backends
- , you enable server-side encryption in your backend configuration:
- Lesson 792 — State Encryption at RestLesson 794 — State Versioning and History
- S3 caching
- when builds might run on different instances or when you need persistent, project-wide cache storage—especially valuable after auto-scaling events or when using multiple build projects that share dependencies.
- Lesson 1829 — Build Caching Strategies
- S3 Cross-Region Replication (CRR)
- automatically replicates objects from a source bucket to one or more destination buckets in different AWS regions.
- Lesson 2439 — Storage Replication Strategies
- S3 destination
- Where AWS deposits the files (often integrated with Athena or Glue)
- Lesson 2172 — AWS Cost and Usage Reports
- S3-managed keys (SSE-S3)
- by default, or you can specify **AWS KMS keys (SSE-KMS)** for enhanced key management and audit logging—critical for compliance requirements.
- Lesson 1828 — Artifact Management and S3 Integration
- SaaS
- You manage nothing but usage
- Lesson 17 — Function as a Service (FaaS) IntroductionLesson 2842 — Shared Responsibility Model
- Safe but realistic
- , using your Chaos Engineering safety controls and blast radius limits from previous lessons
- Lesson 2499 — GameDays and Chaos Testing Practices
- Safe scaling
- Removing the newest replica first protects established cluster members
- Lesson 1179 — Ordered Deployment and Scaling
- Safety
- Test parameter changes without affecting running instances immediately
- Lesson 403 — Database Parameter GroupsLesson 698 — Planning and PreviewLesson 1035 — Introduction to Docker VolumesLesson 1884 — Sync Policies and Manual vs Auto Sync
- saga
- breaks a distributed transaction into a sequence of local transactions, each updating one service.
- Lesson 580 — Saga Pattern for Distributed TransactionsLesson 2586 — Saga Pattern for Distributed TransactionsLesson 2729 — Saga Pattern for Distributed Transactions
- Saga pattern
- breaks a long-running business transaction into a sequence of local transactions, each handled by a different service or function.
- Lesson 2513 — Saga Pattern for Distributed TransactionsLesson 2587 — Compensating TransactionsLesson 2735 — Compensating Transactions
- SageMaker-specific Savings Plans
- first—they offer deeper discounts (up to 64%) than Compute Plans for ML services, but only apply to SageMaker.
- Lesson 2977 — Savings Plans Optimization Strategies
- Same-Region Replication (SRR)
- is a feature that automatically duplicates objects from one bucket to another bucket *within the same geographic region*.
- Lesson 162 — Same-Region Replication
- SAML/OAuth
- – single sign-on with providers like Google or GitHub
- Lesson 1781 — Jenkins User Management and Security
- sampling
- and **filtering** come in.
- Lesson 663 — Log Sampling and FilteringLesson 1442 — Logging Performance and OverheadLesson 1443 — Log Sampling and FilteringLesson 1643 — Observability Performance ImpactLesson 2056 — Log Sampling and FilteringLesson 2071 — Instrumentation Overhead
- Sampling and Alerts
- Check quality on data samples before processing full batches.
- Lesson 2624 — Data Quality in Batch Pipelines
- Sandbox
- Contains a container's network stack (IP address, routing table, DNS settings).
- Lesson 1041 — Docker Network Architecture
- Sandbox environments
- where developers can experiment safely
- Lesson 2943 — Platform Documentation and Onboarding
- Sandbox First
- Begin with a non-production namespace to validate configuration
- Lesson 1601 — Service Mesh Adoption Patterns
- Save
- your view with a meaningful name like "Production DB Costs by Month"
- Lesson 2174 — Azure Cost Analysis and Views
- Save report configurations
- Reuse common views without rebuilding them
- Lesson 2151 — Custom Cost Reports and Export
- Savings Plans
- Flexible across instance families, sizes, and sometimes regions
- Lesson 76 — Savings Plans and Committed Use DiscountsLesson 2153 — Reserved Instances and Savings Plans
- Scalability
- Add or remove resources based on demand, leveraging the **Key Characteristics of Cloud Computing** like elasticity.
- Lesson 13 — Infrastructure as a Service (IaaS) OverviewLesson 231 — What is Load Balancing?Lesson 559 — SQS-SNS Fan-Out PatternLesson 567 — Event-Driven Architecture OverviewLesson 657 — Centralized Logging ConceptsLesson 1045 — Overlay Networks for Multi-HostLesson 1100 — Kubernetes Cluster Architecture OverviewLesson 1224 — Host-Based Routing (+11 more)
- Scalability and agility
- Provisioning resources in minutes instead of weeks, scaling automatically to handle demand spikes, and launching new services faster.
- Lesson 2790 — Introduction to Cloud Migration
- Scalability by Design
- Lesson 38 — Understanding Cloud Architecture Fundamentals
- Scale
- Built on object storage systems (like AWS S3, Azure Data Lake Storage, or Google Cloud Storage), they can grow to petabytes or exabytes economically.
- Lesson 2627 — Data Lake Concepts and Architecture
- Scale independently
- handle millions of reads without impacting write throughput
- Lesson 2597 — CQRS Pattern
- Scale Practices
- Lesson 1864 — GitOps Adoption Strategy
- Scale up
- Pods that can't be scheduled due to insufficient resources
- Lesson 1502 — Scaling AKS Node Pools
- Scale-down is cautious
- Cluster Autoscaler waits ~10 minutes before removing underutilized nodes to avoid thrashing
- Lesson 1458 — Cluster Autoscaler Integration
- Scale-Down Settings
- Tune when and how nodes are removed.
- Lesson 1510 — Cluster Autoscaler Configuration
- Scale-down triggers
- Nodes running below a utilization threshold (typically 50%) for a sustained period, with workloads that can be safely moved elsewhere
- Lesson 1483 — GKE Cluster Autoscaling
- Scale-in protection
- lets you flag specific instances as "do not terminate" until you're ready.
- Lesson 308 — Scale-In Protection and TerminationLesson 2155 — Auto Scaling for Cost Efficiency
- Scale-Up Behavior
- Configure how quickly new nodes are added when pods are pending.
- Lesson 1510 — Cluster Autoscaler Configuration
- Scale-up is reactive
- Nodes typically take 2-5 minutes to provision, creating temporary lag
- Lesson 1458 — Cluster Autoscaler Integration
- Scale-up triggers
- Pods stuck in "Pending" state because no node has enough CPU, memory, or other resources
- Lesson 1483 — GKE Cluster Autoscaling
- scales automatically
- running one build or hundreds simultaneously without configuration.
- Lesson 1822 — CodeBuild Overview and Core ConceptsLesson 2640 — Query Engines for Data Lakes
- Scales out
- (adds more instances) when traffic increases
- Lesson 40 — Elasticity and Auto-Scaling Concepts
- Scaling
- AWS Auto Scaling Groups vs Azure VM Scale Sets vs GCP Managed Instance Groups
- Lesson 109 — Cross-Provider Compute Feature ComparisonLesson 396 — Introduction to Managed Relational DatabasesLesson 2613 — Streaming Performance Considerations
- Scaling In
- When traffic drops below a threshold, remove excess servers
- Lesson 286 — What is Auto ScalingLesson 291 — Scaling Out vs Scaling InLesson 308 — Scale-In Protection and Termination
- Scaling Out
- When CPU usage exceeds 70%, add 2 more servers
- Lesson 286 — What is Auto ScalingLesson 291 — Scaling Out vs Scaling In
- Scaling policies
- define *when* and *how much* to scale.
- Lesson 289 — Auto Scaling ComponentsLesson 313 — AWS Auto Scaling Groups (ASG) Overview
- Scaling policy
- Manual, metric-based (CPU, memory), or schedule-based
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- Scaling policy monitoring
- means actively observing how your scaling policies behave in real-world conditions, reviewing their history, and adjusting them based on what you learn.
- Lesson 312 — Scaling Policy Monitoring
- Scaling rules
- Policies that trigger scale-out or scale-in based on metrics like CPU usage or custom telemetry
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- Scaling thresholds
- Define when to add/remove capacity (e.
- Lesson 2155 — Auto Scaling for Cost Efficiency
- Scenario-based
- , simulating real-world disasters (network failures, compute crashes, state corruption)
- Lesson 2499 — GameDays and Chaos Testing Practices
- schedule
- rather than on code changes—like nightly builds, weekly security scans, or monthly reports.
- Lesson 1652 — Pipeline Triggers and EventsLesson 1898 — Sync WindowsLesson 2160 — Idle Resource DetectionLesson 2176 — Azure Cost Exports and APIs
- Schedule for Deletion
- – You mark a key for deletion but it enters a "pending deletion" state instead of disappearing immediately.
- Lesson 2291 — Key Deletion and Recovery
- Schedule large transfers
- during off-peak times if using NAT Instances instead
- Lesson 199 — Internet Connectivity Costs
- Schedule regular reviews
- (monthly or quarterly) with stakeholders including engineering, product, and support teams.
- Lesson 2125 — Iterating and Refining SLOs Over Time
- Schedule workloads wisely
- Use AKS virtual nodes (lesson 1503) for burst traffic rather than permanently sizing for peak load.
- Lesson 1504 — AKS Cost Management and Cluster Sizing
- Schedule-based scaling
- adjusts capacity at predetermined times.
- Lesson 322 — VMSS Scaling Policies and Rules
- Scheduled
- Production deployments only during maintenance windows
- Lesson 1651 — Environment Promotion Strategies
- Scheduled CI/CD jobs
- that run `terraform plan -detailed-exitcode` (exits with code 2 if drift detected)
- Lesson 842 — Drift Detection and Remediation
- Scheduled Deletion
- Grace period before permanent destruction
- Lesson 2280 — Introduction to Key Management Systems
- Scheduled events
- Use cron-like schedules as events to run periodic maintenance tasks.
- Lesson 2501 — Event-Driven Invocation PatternLesson 2676 — Cache-Warming and Preloading
- Scheduled exports
- Automate daily or monthly dumps of detailed line-item data
- Lesson 2151 — Custom Cost Reports and Export
- Scheduled for destruction
- awaiting 24-hour minimum deletion window
- Lesson 2320 — GCP Cloud KMS Key Rotation and Versions
- Scheduled maintenance windows
- Pre-configure recurring or one-time windows
- Lesson 648 — Alarm Suppression and Maintenance Windows
- Scheduled re-scans
- Registry periodically re-analyzes the same image layers against updated vulnerability databases
- Lesson 1085 — Continuous Vulnerability Monitoring
- Scheduled reminders
- Send a notification 24 hours after user signup
- Lesson 2723 — Delay Queues and Message Timers
- Scheduled retrieval
- Run Lambda functions, Azure Functions, or Cloud Run jobs daily to fetch yesterday's costs and update dashboards.
- Lesson 2973 — Cost Allocation APIs and Automation
- Scheduled Scaling
- Add capacity every Monday at 9 AM for expected workload
- Lesson 286 — What is Auto ScalingLesson 694 — Cost Optimization Through IaC
- Scheduled Scaling action
- (adding capacity at 9 AM) on the same Auto Scaling group.
- Lesson 305 — Multiple Scaling Policy Coordination
- Scheduled Scanning
- Lesson 1074 — Scan Timing and Triggers
- Scheduled tasks
- Run nightly reports, cleanup jobs, or periodic backups without maintaining always-on servers
- Lesson 470 — FaaS Use Cases and Anti-Patterns
- Scheduled triggers
- Run jobs on a cron-like schedule (daily at 2 AM, every 6 hours, etc.
- Lesson 2648 — Glue Job Triggers and Workflows
- Scheduled warm-ups
- use scheduled job patterns (previously covered) to invoke functions periodically, keeping them warm.
- Lesson 2544 — Cold Start Mitigation Strategies
- Scheduler
- (`scheduler`): Pod scheduling decisions
- Lesson 1473 — EKS Logging and CloudWatch Integration
- Schedules
- define *when* backups run.
- Lesson 2431 — Backup Automation and OrchestrationLesson 2626 — Workflow Orchestration Tools
- Scheduling the winner
- Once resources are freed, the high-priority pod is scheduled.
- Lesson 1371 — Pod Preemption Behavior
- schema
- is a blueprint that defines what inputs your template expects, their data types, and any constraints.
- Lesson 953 — Template Schemas and ValidationLesson 2573 — GraphQL in MicroservicesLesson 2658 — Athena Data Catalogs and Databases
- Schema autonomy
- Each service can evolve its data model without coordination
- Lesson 2561 — Database per Service Pattern
- Schema evolution
- is the art of changing your data structure without breaking existing consumers.
- Lesson 2638 — Schema Evolution and VersioningLesson 2654 — Schema Evolution and Versioning
- Schema Management
- Track column names, types, and relationships automatically
- Lesson 2637 — Data Catalog and Metadata Management
- Schema migration
- Converting table structures, indexes, and constraints
- Lesson 2806 — Database Migration Service Fundamentals
- Schema Registry
- Tools like AWS Glue Data Catalog or Apache Hudi store schema versions centrally.
- Lesson 2638 — Schema Evolution and VersioningLesson 2732 — Event Schema Evolution
- Schema translation
- Convert table definitions, indexes, constraints, and data types
- Lesson 2824 — Schema Conversion Tools
- Schema Validation
- Ensure incoming data matches expected types, column names, and structures.
- Lesson 2624 — Data Quality in Batch Pipelines
- Schema versioning
- Include a `schemaVersion` field in every event.
- Lesson 2732 — Event Schema Evolution
- schema-on-read
- you store everything first and decide how to use it later.
- Lesson 2627 — Data Lake Concepts and ArchitectureLesson 2628 — Data Warehouse vs Data LakeLesson 2630 — Object Storage as Data Lake FoundationLesson 2640 — Query Engines for Data Lakes
- Scientific simulations
- Physics modeling, genomics research, computational chemistry
- Lesson 70 — Accelerated Computing Instance Types
- SCM Polling
- Jenkins regularly checks the repository for changes (e.
- Lesson 1773 — Jenkins Jobs and Build TriggersLesson 1789 — Triggers and Automated Execution
- SCM provider generator
- Queries GitHub/GitLab for repositories
- Lesson 1907 — ApplicationSets for Dynamic Applications
- scope
- .
- Lesson 214 — Security Group Best PracticesLesson 675 — Azure Monitor Metrics and AlertsLesson 904 — Resource Groups and Template ScopeLesson 935 — Introduction to Google Cloud Deployment ManagerLesson 1377 — Role vs ClusterRoleLesson 1736 — Environment Variables in GitLab CILesson 1898 — Sync WindowsLesson 2170 — AWS Budgets and Alerts (+2 more)
- Scope their ISMS
- (which services, regions, and data centers)
- Lesson 2325 — ISO 27001 Information Security
- Scrape configs
- define individual monitoring jobs and their targets:
- Lesson 1956 — Prometheus Configuration Basics
- Scrape frequency
- Every 15 seconds vs.
- Lesson 1960 — Data Retention and StorageLesson 1990 — Capacity Planning and Resource Limits
- Scrape interval optimization
- is the art of finding the sweet spot for each job.
- Lesson 1988 — Scrape Interval Optimization
- Scripted recovery procedures
- execute the actual DR steps: restoring databases, failing over DNS, activating standby systems.
- Lesson 2906 — Automated DR Test Frameworks
- Scripts and Infrastructure-as-Code
- Lesson 2440 — Automated DR Orchestration
- SDP Client
- Installed on user devices, initiates authentication before any network traffic flows
- Lesson 2400 — Software-Defined Perimeter (SDP)
- SDP Controller
- Authenticates users and devices, verifies authorization policies
- Lesson 2400 — Software-Defined Perimeter (SDP)
- SDP Gateway
- Acts as the enforcement point, creating encrypted tunnels only to verified users
- Lesson 2400 — Software-Defined Perimeter (SDP)
- Seal wrap
- adds encryption on top of already-encrypted secrets.
- Lesson 2267 — Vault Auto-Unseal and Seal Wrap
- Sealed Secrets
- (commonly used with Kubernetes) lets you encrypt secrets into "SealedSecret" resources that can safely live in Git.
- Lesson 1870 — Handling Secrets in GitOpsLesson 1941 — Secrets Management in FluxLesson 2277 — Sealed Secrets for GitOpsLesson 2278 — Container Registry Authentication
- sealed state
- encrypted and inaccessible.
- Lesson 2253 — Vault Architecture and ComponentsLesson 2255 — Initializing and Unsealing Vault
- Seamless scaling
- You can add or remove servers instantly without worrying about "lost" user sessions
- Lesson 42 — Stateless Application DesignLesson 2474 — Designing for Stateless-First Architecture
- Search and analytics
- engines indexing massive document sets
- Lesson 69 — Storage Optimized Instance Types
- Search and filtering
- Quickly find all production VMs or all VMs owned by a specific team
- Lesson 63 — VM Tags and Resource Organization
- Search bar
- Type field queries like `level:ERROR` or `service.
- Lesson 2029 — Kibana Index Patterns and Discover
- Seasonal trends
- Increased traffic during holidays or special events
- Lesson 302 — Predictive Scaling Fundamentals
- seconds
- (often milliseconds).
- Lesson 961 — Containers vs Virtual MachinesLesson 967 — Fast Startup and Scaling
- Secret Access Key
- A private password that must be kept secure
- Lesson 343 — Access Keys and Credential ManagementLesson 348 — Access Keys and Programmatic Access
- Secret management
- Use Vault, Sealed Secrets, or SOPS instead of cloud-native vaults
- Lesson 2773 — Configuration Management Portability
- Secret management services
- Use tools like AWS Secrets Manager, Azure Key Vault, or HashiCorp Vault to store and retrieve secrets programmatically
- Lesson 714 — Secrets Management in IaC
- secret management systems
- like AWS Secrets Manager, HashiCorp Vault, Azure Key Vault, or Google Secret Manager.
- Lesson 1275 — External Secrets OverviewLesson 2828 — Connection String and Configuration Updates
- Secret scanning
- hunts for accidentally embedded sensitive data like API keys, passwords, database credentials, or private keys hardcoded in your image layers.
- Lesson 1083 — Malware and Secret Scanning
- Secret types
- signal to Kubernetes (and administrators) what kind of sensitive data you're storing and how it should be handled.
- Lesson 1264 — Secret Types and Use Cases
- SecretID
- = password (highly sensitive, delivered securely at runtime)
- Lesson 2258 — AppRole Authentication for Applications
- SecretProviderClass
- resources that define *what* to fetch and *where* to mount it
- Lesson 2276 — Secrets Store CSI Driver
- secrets
- require special handling to prevent leaking credentials into image layers.
- Lesson 1028 — Build Arguments and SecretsLesson 1260 — Kubernetes Secrets OverviewLesson 2237 — Introduction to Secrets Management in CloudLesson 2242 — Azure Key Vault FundamentalsLesson 2245 — GCP Secret Manager Fundamentals
- Secrets Manager
- stores sensitive credentials with automatic rotation support, encryption at rest, and fine-grained access control.
- Lesson 508 — AWS Lambda: Environment Variables and Secrets
- Secrets passing
- Securely share secrets without exposing them
- Lesson 1716 — Workflow Templates and Reusable Workflows
- Secrets stay secure
- State files aren't scattered across laptops where they might be committed to version control
- Lesson 783 — Why Remote State Matters
- Secrets Store CSI Driver
- takes a different approach: it uses Kubernetes' Container Storage Interface (CSI) to mount secrets from external stores (like Vault, AWS Secrets Manager, or Azure Key Vault) *directly as files* in your pods—without creating Kubernetes Secret objec...
- Lesson 2276 — Secrets Store CSI DriverLesson 2279 — Secrets Rotation in Containers
- SecretStore
- Namespace-scoped.
- Lesson 1276 — External Secrets Operator ArchitectureLesson 1278 — SecretStore ResourceLesson 1281 — AWS Secrets Manager Integration
- Secure by Default Configuration
- means cloud resources should start their life with the strongest possible security settings automatically enabled—not as an afterthought.
- Lesson 2844 — Secure by Default Configuration
- Secure file downloads
- Share a private document with a customer for 24 hours
- Lesson 165 — Pre-Signed URLs and Temporary Access
- Secure Score
- A numerical rating of your security posture with prioritized recommendations
- Lesson 2863 — Azure Security Center and Sentinel
- Security
- You control what traffic flows in and out
- Lesson 171 — Virtual Network ConceptsLesson 220 — VPC Endpoints for AWS ServicesLesson 221 — PrivateLink and Service EndpointsLesson 603 — Geographic RestrictionsLesson 619 — Request and Response ManipulationLesson 843 — Module Registry and VersioningLesson 982 — Image Digest and Content AddressingLesson 1023 — Using .dockerignore (+9 more)
- Security (formerly Citadel)
- Lesson 1577 — Istio Control Plane Components
- Security Analyst
- Investigates alerts, determines scope and impact
- Lesson 2870 — Incident Response Planning
- Security and compliance
- Your organization requires workflows to run within your security perimeter or meet specific regulatory requirements
- Lesson 1690 — Self-hosted Runners OverviewLesson 1811 — CodeCommit: Git Repository ServiceLesson 1815 — CodeArtifact: Artifact Repository ServiceLesson 1821 — When to Use AWS Native CI/CD
- Security and compliance gates
- Execute Open Policy Agent checks and security scanning before provisioning
- Lesson 2887 — CI/CD Integration for IaC Tests
- Security at scale
- Implementing authentication and encryption between dozens or hundreds of services becomes unmanageable
- Lesson 1576 — Istio Overview and Core Value Proposition
- Security Baseline and Hardening
- by embedding those standards into provisioning workflows rather than applying them manually afterward.
- Lesson 2844 — Secure by Default ConfigurationLesson 2863 — Azure Security Center and Sentinel
- Security baselines
- encryption standards, network segmentation rules
- Lesson 2762 — Multicloud Governance and Operating ModelLesson 2918 — Self-Service vs. Full Autonomy
- Security boundaries
- (isolated networks, compliance zones)
- Lesson 1798 — Distributed Builds and Agent ArchitectureLesson 1866 — GitOps Repository StructureLesson 1894 — Application ProjectsLesson 2846 — Zero Trust Security Model Fundamentals
- Security breaches
- If an account is compromised, attackers gain only limited access
- Lesson 334 — The Principle of Least Privilege
- Security by Default
- IAM operates on the principle of least privilege—users and services only get the minimum permissions they need.
- Lesson 331 — What is IAM and Why It Matters
- Security compliance
- Require encryption for storage, enforce network rules
- Lesson 837 — Policy Enforcement with Sentinel
- Security controls
- Raw data needs stricter access; consumption can be more open
- Lesson 2631 — Data Lake Zones and Organization
- Security defaults
- Authentication, secrets management, and policy compliance
- Lesson 2929 — Software Templates and Scaffolding
- Security exposure
- If compromised, an attacker gains total control
- Lesson 339 — Root Account and Administrative Access
- security filtering
- directly at the load balancer layer—before requests ever hit your servers.
- Lesson 250 — HTTP Header and Method-Based RoutingLesson 610 — Edge Computing Concepts and Use Cases
- Security gaps
- Open ports, weak encryption, overly permissive access rules
- Lesson 695 — IaC Security and Compliance Benefits
- security group
- is a virtual firewall that protects individual cloud instances (virtual machines) by controlling which network traffic is allowed to reach them and which traffic they can send out.
- Lesson 202 — Security Group FundamentalsLesson 406 — Security Groups for Database Access
- Security group restrictions
- limiting which sources can reach your load balancer
- Lesson 284 — Load Balancer Security Best Practices
- Security group rules
- If policy evaluation fails, block all traffic
- Lesson 2837 — Fail Secure Principles
- security groups
- , **SSH key pairs**, and **networking** details.
- Lesson 81 — VM Launch Process and InitializationLesson 86 — Instance Metadata ServiceLesson 196 — NAT Instance ConfigurationLesson 201 — Security Groups vs Network ACLs OverviewLesson 210 — Security Groups vs NACLs Use CasesLesson 490 — Function Network ConfigurationLesson 2236 — Troubleshooting Network Performance IssuesLesson 2391 — Micro-Segmentation vs Traditional Segmentation
- Security hardening
- Add `X-Frame-Options: DENY` to prevent clickjacking attacks, or `Content-Security-Policy` to restrict resource loading.
- Lesson 604 — Response Header CustomizationLesson 1315 — StorageClass Mount Options
- Security headers
- enforcement (HSTS, X-Frame-Options)
- Lesson 284 — Load Balancer Security Best Practices
- Security investigations
- Identify suspicious activity or attack patterns
- Lesson 257 — ALB Access Logs and Monitoring
- Security is mandatory
- , but you select additional criteria based on your service's commitments.
- Lesson 2324 — SOC 2 Trust Service Criteria
- Security misconfigurations
- Open ports, public S3 buckets, or disabled encryption
- Lesson 722 — IaC Security ScanningLesson 2877 — Static Analysis and Linting
- Security monitoring
- Detect intrusions, malware, or suspicious patterns using intrusion detection systems (IDS)
- Lesson 229 — VPC Traffic Mirroring
- Security or compliance rationale
- Why certain restrictions exist
- Lesson 717 — Documentation and Comments
- Security policies
- prohibit sharing physical resources with other organizations
- Lesson 108 — GCP Sole-Tenant NodesLesson 1505 — Managed Kubernetes OverviewLesson 1578 — Istio Data Plane and Envoy ProxiesLesson 2900 — Policy Libraries and Reusability
- security policy
- that defines which TLS versions and cipher suites are acceptable—think of this as setting the "strength requirement" for secure connections.
- Lesson 253 — SSL/TLS Termination at ALBLesson 2371 — Google Cloud Armor Fundamentals
- Security realm
- How users authenticate (local database, LDAP, SSO)
- Lesson 1772 — Installing and Configuring Jenkins
- Security requirements
- Keep source code and artifacts within your controlled infrastructure
- Lesson 1720 — Self-Hosted Runners
- Security rules
- Block privileged containers or host path mounts beyond what built-in controllers check
- Lesson 1409 — Validating Admission Webhooks
- Security Scan Results
- from tools that check for vulnerabilities, license violations, or policy breaches should be attached as metadata.
- Lesson 1677 — Artifact Metadata and Traceability
- Security scanning
- Are there exposed secrets or insecure configurations?
- Lesson 721 — Continuous Integration for IaC
- Security teams
- might require: Policy enforcement points and audit capabilities
- Lesson 2920 — Abstraction Levels and User Personas
- Security vulnerabilities
- (hardcoded credentials, injection risks)
- Lesson 1816 — CodeGuru: AI-Powered Code Review
- Security-sensitive environments
- where image content must stay confidential
- Lesson 1062 — Public vs Private Registries
- Select specific dimensions
- Filter by tags, services, regions, or accounts
- Lesson 2151 — Custom Cost Reports and Export
- Selective Logging
- Enable verbose access logs only for critical services or during troubleshooting.
- Lesson 1643 — Observability Performance Impact
- Selector
- The label query to find Pods this ReplicaSet manages
- Lesson 1155 — ReplicaSet Purpose and ArchitectureLesson 1162 — Deployment Spec StructureLesson 1205 — Service Selectors and Labels
- Selectors
- are queries that find objects based on their labels.
- Lesson 1123 — Labels and SelectorsLesson 1216 — Services Without SelectorsLesson 1291 — PV and PVC Binding Process
- Selectors in PersistentVolumeClaims
- specify which labels to match:
- Lesson 1300 — Volume Selectors and Labels
- Self-heal
- enables ArgoCD to automatically revert manual changes back to what's defined in Git.
- Lesson 1886 — Self-Heal and Prune Options
- self-healing
- .
- Lesson 1105 — Controller Manager: Maintaining Desired StateLesson 1434 — Node-Level Logging AgentsLesson 1858 — Continuous ReconciliationLesson 1869 — GitOps Reconciliation Loop
- Self-hosted control
- You own your data and infrastructure
- Lesson 1770 — Introduction to Jenkins and CI/CD Automation
- Self-hosted proxies
- Harbor, JFrog Artifactory, and similar tools
- Lesson 997 — Registry Mirroring and Caching
- Self-Managed Node Groups
- You control the upgrade strategy (rolling update, blue/green deployment)
- Lesson 1471 — EKS Cluster Upgrades
- Self-Managed Nodes
- are EC2 instances you provision and maintain yourself, then register with your EKS cluster.
- Lesson 1464 — EKS Node Groups: Managed vs Self-Managed
- Self-service actions
- Provision environments, deploy applications, request resources
- Lesson 2924 — Introduction to Developer Portals
- Self-service catalog
- Predefined templates for common infrastructure patterns (databases, compute, storage)
- Lesson 2914 — Internal Developer Platform (IDP) Fundamentals
- SELinux
- (Security-Enhanced Linux) and **AppArmor** are Linux kernel security modules that enforce **mandatory access control**.
- Lesson 1396 — SELinux and AppArmor Profiles
- SELinux or AppArmor profiles
- Lesson 1389 — Pod Security Context Overview
- Semantic conventions
- are OpenTelemetry's standardized naming rules for span attributes, metrics, and resource information.
- Lesson 2077 — Semantic Conventions and Standard Attributes
- Semantic undo
- May not restore identical state, but achieves equivalent business outcome
- Lesson 2735 — Compensating Transactions
- Semantic versioning
- via Git tags (e.
- Lesson 805 — Publishing Modules to Terraform RegistryLesson 843 — Module Registry and VersioningLesson 990 — Image Naming and Tagging ConventionsLesson 1087 — ECR Repository ConfigurationLesson 1532 — Helm Versioning and Chart VersionsLesson 1549 — Chart Packaging and VersioningLesson 2563 — API-First Design for MicroservicesLesson 2900 — Policy Libraries and Reusability
- Semantics
- All support at-least-once; Flink excels at exactly-once across diverse sources
- Lesson 2611 — Stream Processing Frameworks
- Send both
- the encrypted data and the encrypted DEK to the recipient
- Lesson 2307 — Hybrid Encryption for Large Data
- Send enriched alerts
- to incident response teams with context and recommended actions
- Lesson 2871 — Automated Incident Response
- Send the encrypted DEK
- to KMS to decrypt it with the master key
- Lesson 2296 — Envelope Encryption Pattern
- Sends those manifests
- to the Kubernetes API server via the standard API
- Lesson 1521 — Helm Architecture: Client and Library
- sensitive
- so their values are hidden from logs and console output, protecting secrets like passwords and API keys from accidental exposure.
- Lesson 763 — Sensitive VariablesLesson 791 — Partial Backend Configuration
- Sensitive data
- Passwords, API keys, temporary tokens
- Lesson 1039 — tmpfs MountsLesson 1260 — Kubernetes Secrets Overview
- Sentinel Imports
- Pre-built libraries give you access to Terraform plan data, state, and configuration—letting you inspect proposed resources, check naming conventions, verify tags, or ensure approved AMIs are used.
- Lesson 2341 — Terraform Sentinel Overview
- Separate by function
- Create individual template files for logical components (networking, compute, storage).
- Lesson 950 — Template Imports and Organization
- Separate environments completely
- Different S3 buckets (or storage accounts) per environment prevents accidental production overwrites during development.
- Lesson 797 — Remote State Best Practices
- Separate infrastructure
- Each AZ operates its own power grid connections, generators, and cooling
- Lesson 2454 — Availability Zones and Data Center Distribution
- Separate repositories
- for each application, team, or environment (e.
- Lesson 1916 — GitOps Repository Patterns
- Separate state files
- by environment or service to reduce blast radius
- Lesson 833 — Repository Structure for Large Projects
- Separation of concerns
- Business logic separate from dependencies
- Lesson 507 — AWS Lambda: Layers and DependenciesLesson 1021 — Multi-Stage Build PatternsLesson 1149 — Init ContainersLesson 1278 — SecretStore ResourceLesson 1868 — Environment Promotion PatternsLesson 2050 — Sidecar Pattern for LoggingLesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Separation of Duties
- influences how you design deployment pipelines and access boundaries.
- Lesson 2836 — Security by DesignLesson 2837 — Fail Secure Principles
- Separation of Duties (SoD)
- means dividing sensitive operations so that no single person can complete a critical action alone.
- Lesson 2835 — Separation of Duties
- Sequence number
- `01`, `02` (when you have multiples)
- Lesson 713 — Naming Conventions and StandardsLesson 2734 — Event Deduplication Strategies
- Sequential access
- means reading or writing data in a continuous, ordered fashion—like reading a book from start to finish.
- Lesson 119 — Storage Access Patterns and Workload Types
- Sequential execution
- – Stages run in order; if one fails, subsequent stages don't run
- Lesson 1786 — Stages and Steps OrganizationLesson 2512 — Orchestrator Pattern with Step FunctionsLesson 2516 — Step Functions and State Machines
- Sequential operations
- (spans that follow one after another from the same parent)
- Lesson 2063 — Spans and Span RelationshipsLesson 2068 — Trace Analysis Patterns
- Sequential reads
- (reading large files in order) maximize throughput
- Lesson 134 — Volume Performance Optimization
- sequentially
- and must each complete successfully before the next one starts.
- Lesson 1149 — Init ContainersLesson 1845 — Parallel and Sequential Stage Execution
- SerDe
- (Serializer/Deserializer) that tells Athena how to interpret the raw bytes.
- Lesson 2660 — Querying Data Formats in Athena
- Server provisioning and scaling
- no need to choose VM types or configure autoscaling
- Lesson 14 — Platform as a Service (PaaS) Overview
- Server validates
- Checks if current resource still has ETag `"v1"`.
- Lesson 2674 — ETag and Conditional Requests
- Serverless Architecture
- No clusters to manage, no capacity planning.
- Lesson 2636 — Google BigQuery Fundamentals
- Serverless Data Integration
- Lesson 2649 — Azure Data Factory Overview
- Serverless functions
- (like AWS Lambda, Azure Functions, Google Cloud Functions) follow a **pay-per-invocation** model.
- Lesson 2163 — Serverless vs Containers Cost Analysis
- Serverless is cheaper when
- Lesson 2163 — Serverless vs Containers Cost Analysis
- Serverless orchestration
- uses Step Functions or similar tools to coordinate complex workflows across multiple services, handling retries and error paths declaratively rather than in code.
- Lesson 2567 — Microservices on Serverless
- Serverless SQL pools
- – On-demand SQL queries directly against data lake files (Parquet, JSON, CSV) with zero infrastructure management
- Lesson 2635 — Azure Synapse Analytics
- Serverless VPC Connector
- as a bridge between your function and your VPC network.
- Lesson 516 — Google Cloud Functions: VPC Connectivity and Networking
- ServerSpec
- tests infrastructure from a server configuration perspective, verifying services, packages, and system settings.
- Lesson 2346 — Compliance Testing and Validation
- service
- represents a containerized component of your application.
- Lesson 1049 — Defining Services in ComposeLesson 1203 — Kubernetes Services OverviewLesson 2579 — Request-Reply over Message Queues
- Service account key files
- JSON keys for programmatic access (CI/CD pipelines)
- Lesson 1096 — GCP Registry Authentication and IAM
- Service account permissions
- Grant rotation functions only the minimum IAM permissions needed (`secretmanager.
- Lesson 2247 — GCP Secret Manager Rotation Strategies
- Service Account Token Projection
- solves this by allowing you to request tokens with explicit lifetimes and intended audiences.
- Lesson 1401 — Service Account Token Projection
- Service accounts
- Applications or automated processes
- Lesson 333 — IAM Core Concepts: Identities and ResourcesLesson 345 — Users vs Service AccountsLesson 393 — GCP Service AccountsLesson 519 — Provider-Specific Security and IAMLesson 992 — Registry Authentication and AuthorizationLesson 1096 — GCP Registry Authentication and IAMLesson 2834 — Principle of Least Privilege
- Service Adoption Rates
- measure *how fast* teams embrace platform capabilities:
- Lesson 2936 — Portal Metrics and Adoption
- Service Boundaries and Decomposition
- (lesson 2560) aimed to achieve.
- Lesson 2562 — Shared Database Anti-Pattern
- Service catalog
- Browse available services, APIs, and infrastructure components
- Lesson 2924 — Introduction to Developer PortalsLesson 2925 — Service Catalog FundamentalsLesson 2926 — Self-Service Infrastructure Patterns
- Service catalogues
- help clarify ownership boundaries—every service has a clear owner team, documented responsibilities, and communication channels.
- Lesson 2565 — Microservices Team Organization
- Service CIDR (secondary range)
- Virtual IP addresses for Kubernetes Services
- Lesson 1480 — GKE Networking Fundamentals
- Service Control Policies (SCPs)
- are the permission boundaries you attach to your AWS Organizations structure.
- Lesson 384 — AWS Organizations and SCPsLesson 2361 — Cloud Governance Tools Overview
- Service controller
- Creates, updates, and deletes cloud load balancers when you create LoadBalancer-type Services
- Lesson 1107 — Cloud Controller Manager
- Service count matters
- If you're running 5-10 microservices, you can likely manage traffic routing, security, and observability with simpler tools.
- Lesson 1574 — When to Use a Service Mesh
- Service Coverage
- Lesson 2351 — Enabling and Configuring Audit Logs
- Service dependencies
- Grouping tightly-coupled microservices together
- Lesson 1351 — Pod Affinity Fundamentals
- Service discovery
- built-in (containers find each other by name)
- Lesson 1045 — Overlay Networks for Multi-HostLesson 1203 — Kubernetes Services OverviewLesson 1593 — Consul Service Mesh FundamentalsLesson 1599 — Cilium Service Mesh with eBPFLesson 1953 — Scraping and Service DiscoveryLesson 2037 — Promtail Log Collection and PipelinesLesson 2086 — OpenTelemetry in Kubernetes Environments
- Service Discovery Integration
- Consul's native service catalog means services register themselves automatically.
- Lesson 1593 — Consul Service Mesh Fundamentals
- Service Health Check
- Trigger when `HighCPU AND HighMemory AND HighLatency` all fire — indicating a genuine service degradation, not just a temporary spike.
- Lesson 645 — Composite Alarms
- Service independence
- means each component can be updated, scaled, or even fail without bringing down the entire system.
- Lesson 41 — Loose Coupling and Service Independence
- Service Level Agreements (SLAs)
- , which are promises the provider makes about how reliable the service will be.
- Lesson 414 — RDS High Availability Overview
- service mesh
- is a dedicated infrastructure layer that handles service-to-service communication in distributed applications, particularly microservices architectures.
- Lesson 1564 — What is a Service Mesh?Lesson 1565 — Service Mesh vs API GatewayLesson 1593 — Consul Service Mesh FundamentalsLesson 2584 — Service Mesh for Communication ManagementLesson 2599 — Sidecar Pattern for Cross-Cutting ConcernsLesson 2769 — Service Mesh for Portability
- Service Mesh Interface (SMI)
- specification—a community-driven standard that ensures portability and consistency across different mesh implementations.
- Lesson 1596 — Open Service Mesh (OSM) BasicsLesson 1598 — Service Mesh Interface (SMI) Standard
- Service mesh proxies
- Handle authentication, encryption, and traffic routing (like Envoy in Istio)
- Lesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Service meshes
- Istio, Linkerd for cross-cluster service communication
- Lesson 1514 — Cluster Federation Basics
- Service outages
- affecting entire AWS/Azure/GCP regions
- Lesson 2426 — Cross-Region and Cross-Account Backup
- Service port
- (what clients connect to) and the **target port** (where your container is actually listening).
- Lesson 1213 — Service Ports and Target Ports
- Service Principals
- are application identities that allow automated systems (CI/CD pipelines, build servers) to authenticate without human interaction.
- Lesson 1092 — ACR Authentication and RBACLesson 1283 — Azure Key Vault Integration
- service provider
- or direct connection to Microsoft edge routers
- Lesson 2203 — Azure ExpressRoute FundamentalsLesson 2397 — Private Link and Endpoint Services
- Service role
- IAM permissions for CodeDeploy to access your resources
- Lesson 1832 — CodeDeploy Application and Deployment Groups
- service roles
- that define exactly what actions they can perform.
- Lesson 1819 — IAM Roles and Permissions for Code ServicesLesson 2241 — AWS Secrets Manager IAM Integration
- Service startup order
- Do databases come up before application servers that depend on them?
- Lesson 2908 — Application Recovery Testing
- Service verification
- Some cloud services process data globally—confirm each service's data flow
- Lesson 2332 — Geographic and Regional Compliance
- Service-Agnostic Foundation
- Lesson 340 — IAM Service Boundaries and Scope
- Service-Linked Roles
- and **Temporary Security Credentials** provide secure, time-limited access?
- Lesson 358 — Instance Profiles and Metadata
- Service-oriented structure
- Lesson 833 — Repository Structure for Large Projects
- Service-specific
- Each role is tied to one service and includes that service in its name
- Lesson 357 — Service-Linked Roles
- Service-specific parameters
- (cluster names, function names, stack names)
- Lesson 1843 — Deploy Stages and Deployment Actions
- Service-specific rates
- Custom pricing for high-consumption services like compute, storage, or data transfer
- Lesson 2166 — Discount Negotiation and EDP
- Service-to-Service
- A Lambda function's execution role grants access to specific secrets.
- Lesson 2249 — Cross-Service Secrets Integration
- ServiceAccounts
- .
- Lesson 1376 — Subjects in RBACLesson 1381 — RoleBinding FundamentalsLesson 1384 — ServiceAccount RBAC Integration
- ServiceNow
- for ticket creation and SLA tracking
- Lesson 2869 — Security Alerts and Notification Workflows
- Services
- work.
- Lesson 1111 — Kube-proxy: Network RoutingLesson 1889 — ArgoCD Notifications and WebhooksLesson 1900 — Health AssessmentLesson 2566 — Microservices on Kubernetes
- Services Over Servers
- Lesson 38 — Understanding Cloud Architecture Fundamentals
- Session
- Within a single user session, reads reflect that session's writes.
- Lesson 437 — Cosmos DB Consistency Levels
- Session affinity
- (also called **sticky sessions**) is a load balancer feature that "remembers" which backend server handled your first request, then routes all your subsequent requests to that **same server** for the duration of your session.
- Lesson 242 — Session Affinity (Sticky Sessions)Lesson 278 — Session Affinity and Sticky SessionsLesson 1215 — Session AffinityLesson 2467 — Sticky Sessions and Affinity
- Session management
- ensures users can seamlessly move between regions without losing state
- Lesson 2435 — Active-Active Multi-Region
- Session storage
- Temporary user state across distributed services
- Lesson 2682 — In-Memory Caching Fundamentals
- Set appropriate expiration
- Short-lived artifacts for temporary debug files, longer for releases
- Lesson 1746 — Job Artifacts
- Set Appropriate Timeouts
- Some resources take time to provision.
- Lesson 919 — ARM Template Best Practices and Validation
- Set file ownership
- with `--chown` in `COPY` instructions so your user can access files
- Lesson 1011 — USER: Running as Non-Root
- Set Limits with Headroom
- Lesson 1343 — Right-Sizing Resources
- Set meaningful thresholds
- Don't alarm on arbitrary numbers.
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Set your alert threshold
- (dollar amount or percentage deviation)
- Lesson 2171 — AWS Cost Anomaly Detection
- Set-based
- `app in (web, api)`, `tier notin (cache)`
- Lesson 1123 — Labels and SelectorsLesson 1139 — Filtering Resources with Labels and Selectors
- sets
- when uniqueness matters, **maps** for simple lookups, and **objects** when you need structured configuration with mixed types.
- Lesson 757 — Variable Types: Complex TypesLesson 2684 — Redis Architecture and Data Structures
- Sets context
- automatically switches kubectl to use this new cluster
- Lesson 1497 — Connecting to AKS with kubectl
- Setting Boundaries
- You define minimum and maximum node counts per node pool.
- Lesson 1510 — Cluster Autoscaler Configuration
- Setting resource count conditionally
- Lesson 737 — Conditional Expressions
- Severity levels
- provide a shared language for your team to quickly assess impact and mobilize the appropriate resources.
- Lesson 2129 — Incident Severity LevelsLesson 2869 — Security Alerts and Notification Workflows
- Severity rating
- Vulnerabilities are scored (Critical, High, Medium, Low) based on their exploitability and impact
- Lesson 1073 — Image Scanning Fundamentals
- Shadow traffic
- Route copies of requests to new services without affecting production
- Lesson 2569 — Microservices Migration Strategies
- Shallow vs. Deep Checks
- Shallow checks (like "is the web server responding?
- Lesson 2455 — Health Checks and Failure Detection
- Shape and Icons
- reinforce the message: checkmarks for healthy, warning triangles for caution, exclamation marks or X symbols for critical.
- Lesson 2106 — Threshold Indicators and Alerts
- Shard Strategy
- Lesson 2032 — ELK/EFK Performance Tuning
- Share code across functions
- One layer can serve multiple functions
- Lesson 507 — AWS Lambda: Layers and Dependencies
- Share dashboards as snapshots
- For reports or historical views, use snapshots instead of live dashboards.
- Lesson 2003 — Grafana Best Practices and Performance
- Shared
- Default choice for standard web apps, microservices
- Lesson 1728 — GitLab Runners: Shared vs Specific
- Shared compute clusters
- Multiple services running on the same Kubernetes cluster instead of dedicated clusters per team
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- Shared connections
- – Use Direct Connect Gateway or ExpressRoute Global Reach to share one connection across multiple VPCs/VNets
- Lesson 2224 — Private Connectivity Cost Management
- Shared infrastructure
- (VPCs, IAM roles, databases)
- Lesson 885 — Stack Termination ProtectionLesson 1985 — Cortex Multi-Tenancy
- Shared Ownership
- Shift from centralized control to distributed accountability.
- Lesson 2952 — Building a FinOps Culture
- Shared Responsibility Model
- is a framework that defines which security and operational tasks belong to the cloud provider and which belong to you (the customer).
- Lesson 7 — Shared Responsibility ModelLesson 13 — Infrastructure as a Service (IaaS) OverviewLesson 20 — Public Cloud Deployment ModelLesson 36 — Risk Reduction Through Cloud MigrationLesson 1461 — EKS Architecture OverviewLesson 2322 — Introduction to Compliance in CloudLesson 2842 — Shared Responsibility Model
- Shared storage
- Both controllers access the same `JENKINS_HOME` directory containing jobs, configurations, and build history
- Lesson 1802 — Jenkins High Availability Architecture
- Shared tenancy
- (default) means your VMs run on physical hardware shared with other AWS customers—but always isolated at the hypervisor level.
- Lesson 94 — AWS EC2 Launch Types and Tenancy
- Shared VPCs
- solve this by letting one central account own and manage network infrastructure, while other accounts can use those networks without owning them.
- Lesson 230 — Shared VPCs and Multi-Account Networking
- Sharing
- Multiple containers can safely use the same volume
- Lesson 1035 — Introduction to Docker Volumes
- Sharing files
- When you need precise control over *which* host directory to use
- Lesson 1038 — Bind Mounts
- Shell form
- `RUN apt-get update` (runs in `/bin/sh -c`)
- Lesson 1002 — RUN: Executing CommandsLesson 1008 — CMD: Default Container Command
- Shield
- Medium TTLs, shields dynamic content from repeated origin hits
- Lesson 2681 — Multi-Tier Caching with CDN
- Shield Advanced
- is a premium service offering enhanced capabilities for mission-critical applications.
- Lesson 2382 — AWS Shield Advanced
- Shielded GKE Nodes
- Verify boot integrity using Secure Boot and vTPM
- Lesson 1488 — GKE Security: Private Clusters and Hardening
- Shift time
- Move forward or backward without changing the range duration
- Lesson 2000 — Annotations and Time Range Controls
- Shift-Left Enforcement
- Policies run during development and CI/CD pipelines—catching violations before resources reach production.
- Lesson 2888 — Policy as Code Fundamentals
- Shipping
- subscription (filter: `Status = 'Approved'`)
- Lesson 561 — Azure Service Bus TopicsLesson 659 — Log Streaming vs Log Shipping
- Shopping cart contents
- Lesson 2469 — Distributed Caching for Stateful Data
- Short polling
- is like quickly peeking into your mailbox every few seconds.
- Lesson 564 — Long Polling vs Short Polling
- Short timeout, long task
- If your processing takes 60 seconds but visibility timeout is 30 seconds, the message becomes visible again mid-processing.
- Lesson 554 — Message Visibility and Timeouts
- Short TTL (60-300s)
- Good for frequent, disposable tasks where you don't need logs
- Lesson 1194 — Job TTL and Automatic Cleanup
- Short windows (5-15 minutes)
- Real-time troubleshooting, catching spikes
- Lesson 2104 — Time Series and Temporal Context
- Short-lived
- (ACI charges per-second, ideal for quick tasks)
- Lesson 1503 — AKS Virtual Nodes and Serverless Bursting
- Short-term projects
- Run a data analysis job for three days without long-term planning
- Lesson 73 — On-Demand Pricing Model
- Showback
- and **chargeback** are two approaches for distributing cloud cost visibility internally, but they serve different purposes.
- Lesson 2146 — Showback vs Chargeback ModelsLesson 2958 — Showback vs ChargebackLesson 2966 — Showback vs Chargeback Models
- Showback or Chargeback models
- (lesson 2146) to track which teams or business units drive costs.
- Lesson 2147 — Multi-Account Cost Consolidation
- Side output
- Route late data to a separate stream for manual inspection
- Lesson 2606 — Watermarks and Late Data
- sidecar
- ) alongside each service instance.
- Lesson 1564 — What is a Service Mesh?Lesson 1982 — Thanos Architecture OverviewLesson 2008 — Log Shipping Methods
- Sidecar collection
- A dedicated container in the pod ships logs to a central system
- Lesson 2046 — Cloud-Native Logging Overview
- sidecar container
- is an additional container running in the same pod as your application, sharing the same volumes and network namespace.
- Lesson 1435 — Logging with Sidecar ContainersLesson 2049 — Kubernetes Logging ArchitectureLesson 2275 — Vault Agent Injector for Kubernetes
- Sidecar containers
- are the most common use case: a helper container that enhances the main container.
- Lesson 1148 — Multi-Container PodsLesson 2275 — Vault Agent Injector for Kubernetes
- Sidecar Injection
- Service meshes like Istio automatically inject proxy containers into every Pod without you manually adding them.
- Lesson 1410 — Mutating Admission WebhooksLesson 1579 — Sidecar Injection Mechanisms
- sidecar pattern
- a lightweight proxy container (`linkerd-proxy`) automatically injected alongside each application container.
- Lesson 1591 — Linkerd Overview and ArchitectureLesson 2050 — Sidecar Pattern for Logging
- sidecar proxies
- in the **data plane**, the mesh sits in the perfect position to observe and record everything happening between services.
- Lesson 1570 — Service Mesh Observability BenefitsLesson 1599 — Cilium Service Mesh with eBPFLesson 1602 — Traffic Routing Fundamentals in Service MeshLesson 2091 — Zipkin FundamentalsLesson 2584 — Service Mesh for Communication Management
- sidecar proxy pattern
- (typically Envoy) to handle inter-service communication, providing mTLS encryption, traffic management, and observability.
- Lesson 1593 — Consul Service Mesh FundamentalsLesson 1595 — AWS App Mesh Overview
- SIEM
- (Security Information and Event Management) system, enriching your centralized security monitoring with AWS-specific threat intelligence.
- Lesson 2862 — AWS GuardDuty
- Signed Client-Side Tokens
- Lesson 2463 — Session Management in Stateless Systems
- Signing in
- to the Terraform Registry with your GitHub account and authorizing access to your repository
- Lesson 805 — Publishing Modules to Terraform Registry
- Simple compute
- AWS Lightsail vs Azure App Service vs GCP App Engine
- Lesson 109 — Cross-Provider Compute Feature Comparison
- Simple scalable mode
- Components grouped into read, write, and backend services.
- Lesson 2035 — Loki Components and Deployment Modes
- Simpler architecture
- No need for downstream filtering logic in every consumer
- Lesson 558 — SNS Message Filtering
- Simplicity
- Memcached has fewer moving parts, making it easier to reason about and debug
- Lesson 2689 — Memcached Fundamentals
- Simplified architecture
- No need for NAT gateways for private subnet resources accessing services
- Lesson 221 — PrivateLink and Service Endpoints
- Simplified configurations
- High-level building blocks instead of low-level details
- Lesson 954 — Introduction to Composite Types
- Simplified consistency
- No partial updates or file corruption during writes
- Lesson 145 — Object Immutability Concepts
- Simplified Cost Management
- Single AWS bill, predictable pricing tied to usage, and no separate vendor contracts to manage.
- Lesson 1821 — When to Use AWS Native CI/CD
- Simplified management
- Add or remove VPCs without touching others
- Lesson 218 — Transit Gateway ConceptsLesson 1224 — Host-Based RoutingLesson 2214 — Direct Connect Gateway
- Simplified operations
- (no manual PV creation)
- Lesson 1303 — StorageClass FundamentalsLesson 1469 — EKS Add-ons OverviewLesson 2474 — Designing for Stateless-First Architecture
- Simplified RBAC
- Control who can create cluster-wide resources separately from namespace-scoped ones.
- Lesson 1279 — ClusterSecretStore Resource
- Simplified Testing
- Test the complete image once, deploy it everywhere
- Lesson 46 — Immutable Infrastructure Principles
- Simplified topology
- Connect 10 VPCs and 5 data centers with 15 connections instead of 105 individual peering relationships
- Lesson 2208 — Transit Gateway for Hybrid Networks
- Simplify complexity
- Hide implementation details behind a clean interface of input variables and outputs
- Lesson 798 — What Are Terraform Modules
- Simplify compliance
- by mapping regulatory requirements to specific zones
- Lesson 2841 — Security Boundaries and Trust Zones
- Simplify deployment
- Pre-configure networking so launching new databases is consistent
- Lesson 405 — Subnet Groups and Network PlacementLesson 908 — Template Specs for Reusable Templates
- Simplifying syntax
- No more curly braces everywhere or complex string concatenations
- Lesson 920 — Introduction to Bicep
- Simulations
- test specific components in isolation—failing over a database, restoring from backup, or switching DNS records—without full production impact.
- Lesson 2902 — DR Testing Fundamentals and Objectives
- Single authentication service
- with no redundancy
- Lesson 2450 — Single Points of Failure Identification
- Single AZ approach
- All your servers in one subnet in `us-east-1a` — if that data center has problems, your entire application goes down.
- Lesson 178 — Availability Zones and Subnets
- Single Build
- Create your artifact once in the CI phase (JAR, container image, ZIP, etc.
- Lesson 1676 — Artifact Promotion Patterns
- Single database instance
- with no replica or failover
- Lesson 2450 — Single Points of Failure Identification
- single entry point
- for all client requests to your backend services.
- Lesson 520 — What is an API Gateway?Lesson 2576 — API Gateway Pattern
- single pane of glass
- to track migrations across multiple AWS services (like Database Migration Service, Server Migration Service, and Application Migration Service).
- Lesson 2804 — Cloud Provider Native Migration Services OverviewLesson 2815 — Hybrid Operations and CoexistenceLesson 2934 — Integrating CI/CD and Observability
- single point of failure
- is any component in your system whose failure would cause the entire service—or a critical part of it—to stop working.
- Lesson 2450 — Single Points of Failure IdentificationLesson 2467 — Sticky Sessions and AffinityLesson 2475 — Database Replication Fundamentals
- single request's journey
- across multiple services.
- Lesson 1631 — Service Mesh Observability OverviewLesson 2061 — The Need for Distributed Tracing
- Single Responsibility
- One microservice handles one business function (user authentication, payment processing, inventory management).
- Lesson 2555 — What Are Microservices?
- Single Sign-On (SSO)
- is the user experience this enables: log in once, access everywhere.
- Lesson 2852 — Identity Federation and SSO
- single source of truth
- for user identities in Azure.
- Lesson 385 — Azure Active Directory OverviewLesson 1797 — Shared Libraries for Reusable CodeLesson 1856 — Git as Single Source of TruthLesson 1919 — Introduction to Flux and GitOps Philosophy
- Single-AZ
- is cheaper because you're running one database instance in one location.
- Lesson 417 — Multi-AZ vs Single-AZ Trade-offs
- Single-User Rotation
- The same credentials are updated in place.
- Lesson 2240 — AWS Secrets Manager Rotation
- Size flexibility
- Mix instance sizes with equivalent capacity (`c5.
- Lesson 2978 — Spot Instance Fleet Management
- Size limits
- ARM templates have a 4 MB size limit; linking helps you stay under it
- Lesson 907 — Linked Templates and Template Nesting
- Size mismatch
- PVC requests 10Gi but only 5Gi PVs available
- Lesson 1302 — Troubleshooting PV and PVC Issues
- Skills are transferable
- Teams need portable knowledge across providers
- Lesson 2777 — Lock-In vs Portability Trade-offs
- Skipping test environments
- Deploying straight from dev to production without intermediate validation environments invites disaster.
- Lesson 1656 — CI/CD Best Practices and Anti-patterns
- SLA
- is a *contractual promise* to customers, often with financial consequences if violated.
- Lesson 2112 — Service Level Terminology: SLI, SLO, and SLA
- SLA commitments
- MTBF informs realistic availability guarantees
- Lesson 2413 — Mean Time Between Failures (MTBF)
- SLA-relevant measurements
- Time to first byte for premium customers, processing duration for priority jobs
- Lesson 638 — Custom Metrics and Instrumentation
- Slack/Microsoft Teams
- Real-time messaging channels where your team is already collaborating.
- Lesson 647 — Notification Channels
- Slack/Teams
- Integration with collaboration tools your team already uses
- Lesson 646 — Alarm Actions and NotificationsLesson 2869 — Security Alerts and Notification Workflows
- Sleep peacefully
- Automation watches your systems overnight
- Lesson 639 — Introduction to Alarms and Alerting
- SLI
- is a *quantitative measurement* of a service's behavior — the actual metric you observe.
- Lesson 2112 — Service Level Terminology: SLI, SLO, and SLA
- SLI measurements
- if they don't capture user experience accurately.
- Lesson 2125 — Iterating and Refining SLOs Over Time
- Sliding window
- More accurate, tracks requests across rolling time periods
- Lesson 2592 — Rate Limiting and Throttling
- Slight staleness is acceptable
- (user profiles, product catalogs)
- Lesson 2703 — Time-Based Cache Invalidation (TTL)
- SLO
- is your *internal target* for an SLI — the goal you set for your team.
- Lesson 2112 — Service Level Terminology: SLI, SLO, and SLALesson 2129 — Incident Severity Levels
- SLO targets
- based on data—tighten them when reliability improves sustainably, or relax them when they're blocking legitimate innovation without user impact.
- Lesson 2125 — Iterating and Refining SLOs Over TimeLesson 2155 — Auto Scaling for Cost Efficiency
- Slow burns
- A subtle regression might eat 2% per day, unnoticed until it's too late
- Lesson 2121 — Multi-Window and Multi-Burn-Rate Alerting
- Slow-starting apps
- Use `initialDelaySeconds: 30` or higher, or prefer startup probes
- Lesson 1426 — Probe Timing Parameters
- Slower API server responses
- (retrieving large objects takes time)
- Lesson 1273 — Secret Size and Performance Limits
- Slower deployments
- – uploading 50MB takes longer than 5MB
- Lesson 485 — Function Packaging and Deployment Size
- Slowloris
- Hold connections open by sending partial requests slowly
- Lesson 2378 — DDoS Attack Types and Vectors
- Small
- (3 GB RAM, 2 vCPUs): Lightweight builds, quick scripts
- Lesson 1823 — CodeBuild Build Environments and Images
- Small to Medium Teams
- Teams without dedicated DevOps engineers benefit from managed infrastructure—no Jenkins servers to maintain or GitHub Enterprise licenses to negotiate.
- Lesson 1821 — When to Use AWS Native CI/CD
- Small-scale deployments
- Single-server applications with modest requirements
- Lesson 1059 — Compose Best Practices and Limitations
- Smaller attack surface
- No shell means attackers can't easily execute commands
- Lesson 987 — Scratch and Distroless Images
- Smaller VNet footprint
- only nodes consume VNet IPs
- Lesson 1496 — AKS Networking Models: kubenet vs Azure CNI
- Smallest scope, fastest execution
- Unit tests verify individual functions or components in isolation.
- Lesson 1649 — Automated Testing in CI/CD
- Smart strategies
- Lesson 285 — Advanced Health Check Strategies
- SMI-native design
- Built around SMI APIs from the ground up, making configurations more portable
- Lesson 1596 — Open Service Mesh (OSM) Basics
- SMS code
- A text message sent to your phone (less secure, but better than nothing)
- Lesson 342 — Multi-Factor Authentication (MFA) Basics
- SMS messages
- Lesson 557 — AWS SNS Topics and Subscriptions
- SMS/Text
- Immediate mobile notifications for critical issues
- Lesson 646 — Alarm Actions and Notifications
- snapshot
- of your infrastructure.
- Lesson 778 — terraform refresh CommandLesson 852 — Stack Deletion and Retention PoliciesLesson 888 — DeletionPolicy and RetainLesson 2002 — Dashboard Sharing and PermissionsLesson 2739 — Event Store Implementation Patterns
- Snapshot and delete
- idle instances for later restoration if needed
- Lesson 2160 — Idle Resource Detection
- Snapshot copying
- lets you duplicate a snapshot to another AWS region, creating a geographically distant backup.
- Lesson 425 — Snapshot Copying and Sharing
- Snapshot evidence
- by capturing disk images or memory dumps for forensic analysis
- Lesson 2871 — Automated Incident Response
- Snapshot limitation
- If the underlying storage system fails or becomes corrupted, snapshots may be lost too.
- Lesson 2417 — Backup vs. Snapshot: Understanding the Difference
- Snapshot sharing
- allows you to grant other AWS accounts permission to access your snapshot.
- Lesson 425 — Snapshot Copying and Sharing
- Snapshots
- you created for backup
- Lesson 85 — VM Termination and DeletionLesson 2417 — Backup vs. Snapshot: Understanding the DifferenceLesson 2423 — VM and Volume Backup Strategies
- Snapshots before cutover
- Take point-in-time snapshots immediately before each migration wave.
- Lesson 2817 — Disaster Recovery During Migration
- SNS notifications
- Send emails, texts, or trigger other AWS services
- Lesson 670 — CloudWatch Alarms and Actions
- SNS topic
- is a communication channel.
- Lesson 557 — AWS SNS Topics and SubscriptionsLesson 559 — SQS-SNS Fan-Out PatternLesson 1844 — Manual Approval Actions
- SNS topics (AWS)
- A pub/sub service where multiple subscribers (email, SMS, Lambda functions) can receive the same alert.
- Lesson 647 — Notification Channels
- SOC 2
- mandate specific log retention periods, encryption standards, and data handling practices.
- Lesson 2014 — Log Security and ComplianceLesson 2329 — Cloud Provider Compliance CertificationsLesson 2330 — Compliance Inheritance ModelLesson 2353 — Audit Log Storage and Retention
- Soft-delete recovery
- (Azure Key Vault keeps deleted keys for 90 days by default)
- Lesson 2291 — Key Deletion and Recovery
- Soft-mandatory
- – blocks unless an authorized user overrides
- Lesson 2894 — Sentinel for Terraform IntroductionLesson 2895 — Sentinel Policy LanguageLesson 2896 — Terraform Sentinel Integration
- Software Catalog
- A centralized registry of all services, APIs, libraries, and resources in your organization
- Lesson 2927 — Backstage Platform OverviewLesson 2928 — Software Catalog in Backstage
- Software Templates
- Pre-built blueprints (scaffolders) that let developers spin up new projects following golden paths
- Lesson 2927 — Backstage Platform OverviewLesson 2943 — Platform Documentation and Onboarding
- Software-protected keys
- are encrypted and processed using Azure's software-based cryptographic operations.
- Lesson 2316 — Azure Key Vault Key Management
- Sole-tenant nodes
- give you an entire physical server dedicated exclusively to your workloads—no other GCP customers share that hardware.
- Lesson 108 — GCP Sole-Tenant Nodes
- Solution
- Set visibility timeout longer than your expected processing time, or extend it programmatically during processing.
- Lesson 554 — Message Visibility and TimeoutsLesson 1428 — Probe Anti-Patterns and Common Mistakes
- SOPS (Secrets OPerationS)
- or **git-crypt** encrypt secret values directly in your Git repository.
- Lesson 1870 — Handling Secrets in GitOps
- Sorted Sets
- Sets with scores for ranking and leaderboards
- Lesson 2684 — Redis Architecture and Data Structures
- Source
- The elastic network interface (ENI) you want to monitor
- Lesson 229 — VPC Traffic MirroringLesson 801 — Calling Modules with module BlocksLesson 1829 — Build Caching StrategiesLesson 1841 — Pipeline Actions and Action TypesLesson 1881 — ArgoCD Application ResourceLesson 1892 — Application Spec Structure
- Source and destination ports
- (which services are involved)
- Lesson 213 — Network Security Logging and MonitoringLesson 222 — VPC Flow LogsLesson 2183 — VPC Flow Logs
- Source Controller
- is one of Flux's core components that acts like a persistent librarian for your infrastructure code.
- Lesson 1922 — Source Controller and Git RepositoriesLesson 1932 — Flux Controller ArchitectureLesson 1935 — Helm Controller
- Source IP addresses
- – Requests from specific CIDR blocks
- Lesson 250 — HTTP Header and Method-Based Routing
- source of truth
- remains in your enterprise vault system.
- Lesson 1275 — External Secrets OverviewLesson 2274 — External Secrets Operator PatternLesson 2596 — Event Sourcing FundamentalsLesson 2728 — Combining Event Sourcing and CQRS
- Source repositories
- Which Git repos can this project pull from?
- Lesson 1887 — ArgoCD Projects for Multi-Tenancy
- Source Stage
- CodeCommit hosts your Git repository and serves as the pipeline's starting point
- Lesson 1818 — Integration Between AWS Code ServicesLesson 1839 — Creating a Basic Pipeline
- Source/Destination
- IP addresses or ranges allowed to connect
- Lesson 60 — Security Groups and VM FirewallsLesson 208 — NACL Allow and Deny RulesLesson 406 — Security Groups for Database Access
- Source/Destination Check
- Lesson 196 — NAT Instance Configuration
- Space efficiency
- If ten images all need Ubuntu as a base, that Ubuntu layer is stored *once* and shared among all ten images.
- Lesson 975 — Image Layers: The Foundation
- span
- represents a single unit of work in your distributed system—like a function call, database query, or HTTP request.
- Lesson 2063 — Spans and Span RelationshipsLesson 2064 — Span Attributes and TagsLesson 2076 — Spans, Traces, and Context Propagation
- Span attributes
- (also called **tags** in some systems) are key-value pairs you attach to spans that answer questions like *how*, *who*, *what parameters*, and *what outcome*.
- Lesson 2064 — Span Attributes and Tags
- Span Creation
- Each span allocates memory and requires serialization before export.
- Lesson 2071 — Instrumentation Overhead
- Spark SQL
- read directly from Parquet, ORC, or CSV files organized in your data lake zones, executing SQL queries without copying data into a separate database.
- Lesson 2640 — Query Engines for Data Lakes
- Spark Streaming
- (and Structured Streaming) extends Spark's batch processing model to micro-batches.
- Lesson 2611 — Stream Processing Frameworks
- spec
- (specification) describes your desired state.
- Lesson 1122 — Object Specifications and StatusLesson 1147 — Creating Pods with YAML ManifestsLesson 1162 — Deployment Spec Structure
- Spec.template
- Complete Pod specification for creating replicas
- Lesson 1155 — ReplicaSet Purpose and Architecture
- Specialized hardware
- GPU processing, specific CPU architectures, or unusual memory/storage configurations
- Lesson 1720 — Self-Hosted Runners
- Specialized tools
- (specific Java versions, Docker, databases)
- Lesson 1798 — Distributed Builds and Agent Architecture
- specific
- parameters → only meaningful ones (like `size` or `format`) affect caching
- Lesson 598 — Query String and Cookie ForwardingLesson 1728 — GitLab Runners: Shared vs Specific
- Specify parameters
- Details matter (which encryption algorithm, key type)
- Lesson 2337 — Compliance Requirements Translation
- Speed
- Multiple parts upload in parallel, utilizing your bandwidth better
- Lesson 151 — Object Size Limits and Multipart UploadsLesson 975 — Image Layers: The FoundationLesson 1873 — Rollback and RecoveryLesson 1968 — Rate and Counter FunctionsLesson 2130 — Runbooks and PlaybooksLesson 2572 — gRPC for High-Performance CommunicationLesson 2693 — Session Store and User State CachingLesson 2888 — Policy as Code Fundamentals
- Speed and simplicity
- Rehosting is the fastest migration strategy.
- Lesson 2792 — Rehost (Lift-and-Shift) Strategy
- Spend by team/project/application
- Lesson 2961 — Cost Visibility Fundamentals
- Spending Credits
- When you need more power (like during a traffic spike), the instance "spends" accumulated credits to burst above baseline—up to 100% CPU
- Lesson 77 — Burstable Instance Types and Credits
- SPIFFE
- (Secure Production Identity Framework For Everyone) is an open standard that defines how to establish and verify the identity of workloads.
- Lesson 1620 — Service Identity and SPIFFE
- Spiky and unpredictable
- (seasonal events, batch processing)
- Lesson 1503 — AKS Virtual Nodes and Serverless Bursting
- SPIRE
- (the SPIFFE Runtime Environment) or other implementations to issue **SVIDs** (SPIFFE Verifiable Identity Documents)—cryptographic certificates that prove identity.
- Lesson 1620 — Service Identity and SPIFFE
- Spot Instance Fleet Management
- means using multiple instance types across availability zones to create a diversified portfolio that reduces interruption risk while maximizing savings.
- Lesson 2978 — Spot Instance Fleet Management
- Spot Instances
- = maximum savings (willing to accept interruptions)
- Lesson 80 — Pricing Model Selection StrategyLesson 94 — AWS EC2 Launch Types and TenancyLesson 2155 — Auto Scaling for Cost EfficiencyLesson 2446 — Cost Optimization in DR Design
- Spot/Preemptible
- AWS Spot = Azure Spot = GCP Preemptible/Spot VMs
- Lesson 109 — Cross-Provider Compute Feature Comparison
- Spot/preemptible workloads
- (batch jobs) can use cheaper, interruptible VMs
- Lesson 1508 — Node Pool Management
- SQL (Core) API
- Query using familiar SQL-like syntax — the default and most feature-rich option
- Lesson 436 — Azure Cosmos DB: Architecture and APIs
- SQL Interface
- Query your data using standard SQL, making it accessible to anyone familiar with relational databases.
- Lesson 2636 — Google BigQuery Fundamentals
- SQL Server
- might include options for native backup to cloud storage
- Lesson 404 — Option Groups for Engine FeaturesLesson 2807 — Homogeneous Database Migration
- SQL-Based Querying
- You write standard SQL (with extensions) against structured and semi-structured data.
- Lesson 2664 — Google BigQuery as Serverless Query Engine
- SQS
- Polls queue for messages (event source mapping)
- Lesson 506 — AWS Lambda: Event Sources and Triggers
- SRE/Operations
- Ensure platform reliability, observability, and performance
- Lesson 2937 — Platform Team Structure and Responsibilities
- SSH
- TCP port 22
- Lesson 203 — Security Group Rules and SyntaxLesson 1779 — Jenkins Build Agents and Executors
- SSH/RDP
- Goes through your VM's network interface → affected by Security Groups, network config, and OS networking
- Lesson 64 — VM Consoles and Troubleshooting Access
- SSL offloading
- means removing the encryption burden from backend servers.
- Lesson 269 — TLS Termination on NLB
- SSL/TLS certificate
- (from AWS Certificate Manager or uploaded) to your ALB listener on port 443 (HTTPS).
- Lesson 253 — SSL/TLS Termination at ALBLesson 269 — TLS Termination on NLB
- SSL/TLS termination
- means the load balancer handles all the encryption/decryption work for HTTPS connections—it's like a security checkpoint at a building entrance.
- Lesson 253 — SSL/TLS Termination at ALB
- SSO integration
- Connect with LDAP, OIDC, or SAML to map organizational groups
- Lesson 1890 — ArgoCD RBAC and User Management
- Stability
- by preventing accidental upgrades that break things
- Lesson 727 — Terraform Block and Required Providers
- Stabilization windows
- tell the HPA to look at metrics over a time window (e.
- Lesson 1451 — HPA Scaling Behavior
- Stable environments
- Use `30m` or `1h` for production stability
- Lesson 1942 — Flux Reconciliation Control
- Stable network identity
- Each Pod gets a predictable DNS name like `podname-0.
- Lesson 1176 — StatefulSet FundamentalsLesson 1178 — Pod Identity in StatefulSetsLesson 2470 — Stateful Set Patterns in Kubernetes
- Stable recovery
- Failed pods restart in their exact position without disrupting the sequence
- Lesson 1179 — Ordered Deployment and Scaling
- stack
- a collection of AWS resources managed as a single unit.
- Lesson 845 — Introduction to AWS CloudFormationLesson 846 — CloudFormation Templates and StacksLesson 848 — Creating Your First StackLesson 877 — Stack Creation and Lifecycle
- Stack Details Overview
- Lesson 857 — CloudFormation Console and Stack Management
- Stack Info
- Shows basic metadata—stack name, creation time, status, and description
- Lesson 857 — CloudFormation Console and Stack Management
- Stack instances
- Individual stacks created in each account-region combination
- Lesson 883 — StackSets Fundamentals
- Stack List View
- Lesson 857 — CloudFormation Console and Stack Management
- StackSet
- is a container that manages stack instances—actual deployed stacks—across target accounts and regions.
- Lesson 883 — StackSets Fundamentals
- StackSets solve this
- by letting you define a template once and deploy it everywhere from a central administrator account.
- Lesson 883 — StackSets Fundamentals
- stage
- is a named reference to a specific deployment of your API.
- Lesson 532 — API Gateway Stages and DeploymentLesson 1742 — Jobs and Stages DefinitionLesson 1838 — CodePipeline Architecture and Components
- stage level
- (remember API Gateway stages from lesson 532) and configure a **time-to-live (TTL)** duration —typically measured in seconds.
- Lesson 533 — API Gateway CachingLesson 1785 — Agent Directive and Execution Environments
- Stage-based
- leverages cloud provider features but may mix versioning with environment concepts.
- Lesson 548 — API Versioning Strategies
- Stage-level
- different limits for dev vs production
- Lesson 2540 — Serverless API Rate Limiting and Throttling
- Stage-level notifications
- Monitor specific stages like deployment
- Lesson 1849 — Pipeline Notifications and EventBridge
- stages
- act like floors in a building—each floor must be completed before moving to the next, but multiple rooms (jobs) on the same floor can be worked on simultaneously.
- Lesson 1731 — Pipeline Stages and Job OrderingLesson 1739 — Pipeline Visualization and Job LogsLesson 1786 — Stages and Steps OrganizationLesson 1814 — CodePipeline: Orchestration Service Overview
- Staging environment
- Production-like setup with realistic data volumes and configurations.
- Lesson 1667 — Multi-Environment PromotionLesson 1672 — Artifact Lifecycle
- Staging promotion
- occurs after dev tests pass (may require approval)
- Lesson 1651 — Environment Promotion Strategies
- Stakeholder reports
- should be tailored by audience:
- Lesson 2818 — Migration Progress Tracking and Reporting
- Stale content policies
- let CDNs and caches continue delivering cached responses even after they've technically expired— either when your origin server fails or while the cache fetches a fresh copy in the background.
- Lesson 2679 — Stale Content Policies
- Standalone Binary
- Download and run the Grafana server directly on Linux, macOS, or Windows.
- Lesson 1993 — Installing and Configuring Grafana
- Standard
- when you need instant scaling, minimal cost for low-traffic apps, and your application fits supported runtimes.
- Lesson 105 — GCP App Engine Standard and FlexibleLesson 1090 — Azure Container Registry (ACR) OverviewLesson 2383 — Azure DDoS Protection StandardLesson 2691 — Azure Cache for Redis
- Standard billing data
- Every SKU, resource, cost, credits, and usage amounts
- Lesson 2178 — GCP Billing Exports to BigQuery
- Standard environment
- runs your application in a secure, sandboxed environment with predefined runtimes (Python, Java, Node.
- Lesson 105 — GCP App Engine Standard and Flexible
- Standard Kubernetes volume semantics
- your team already understands
- Lesson 2276 — Secrets Store CSI Driver
- Standard mode
- gives you full control over cluster infrastructure—you manage nodes, node pools, scaling configurations, and maintenance windows.
- Lesson 1476 — GKE Cluster Types: Standard vs AutopilotLesson 1489 — GKE Cost Optimization and Bin Packing
- Standard module structure
- with proper variable definitions, outputs, and a README
- Lesson 805 — Publishing Modules to Terraform Registry
- Standard protocols
- Works with existing applications expecting traditional file operations
- Lesson 114 — File Storage Overview
- Standard Queues
- Nearly unlimited throughput, at-least-once delivery, best-effort ordering
- Lesson 2725 — Provider-Specific Queue Services
- Standard resolution
- Data stored at 1-minute granularity (free for most AWS services)
- Lesson 669 — CloudWatch Metrics and Namespaces
- Standard SQL
- (SQL:2011 compliant), which means familiar SQL syntax works out-of-the-box.
- Lesson 2666 — BigQuery Standard SQL and Functions
- Standard Tier
- (`standard`): Balanced performance and cost for general-purpose workloads like web servers and APIs.
- Lesson 1314 — Multiple StorageClasses Strategy
- Standard Workflows
- are designed for long-running, auditable processes.
- Lesson 2517 — AWS Step Functions Overview
- Standard_LRS
- Standard HDD, locally redundant, best for dev/test
- Lesson 1311 — Azure Disk StorageClasses
- Standardization
- Everyone uses the same, approved modules
- Lesson 843 — Module Registry and VersioningLesson 955 — Creating Custom Composite Types
- Standardize patterns
- Ensure consistency in how resources are configured across your organization
- Lesson 798 — What Are Terraform Modules
- Standardized deployment interfaces
- where the pipeline calls generic scripts that internally handle cloud-specific details
- Lesson 2775 — CI/CD Pipeline Portability
- Standardized features
- instead of controller-specific annotations
- Lesson 1233 — Gateway API Introduction
- standby
- , ready to take over instantly if the active node fails.
- Lesson 2266 — Vault High Availability SetupLesson 2760 — Multicloud Architecture Patterns: Active- Passive
- start
- a VM, it boots up from a stopped state, restoring its previous configuration.
- Lesson 83 — Starting and Stopping VMsLesson 2079 — Creating and Managing Spans ProgrammaticallyLesson 2161 — Scheduled Shutdown for Non-Production
- Start broad, refine later
- Begin with major divisions, then split as needed
- Lesson 350 — Creating and Organizing Groups
- Start in plaintext
- All services communicate without encryption
- Lesson 1622 — mTLS Migration Strategies
- Start small
- in a non-production environment.
- Lesson 307 — Scaling Policy TestingLesson 1864 — GitOps Adoption StrategyLesson 2442 — DR Testing Scenarios
- Start with Key Metrics
- Place the most critical KPIs at the top—total spend this month, percent of budget consumed, largest cost drivers, recent anomalies.
- Lesson 2970 — Cost Dashboard Design
- Start with Monitoring Data
- Lesson 1343 — Right-Sizing Resources
- Start with observability
- Enable telemetry first to understand traffic patterns without changing behavior
- Lesson 1601 — Service Mesh Adoption Patterns
- Start with slim
- for most production workloads—good size reduction with minimal compatibility risk
- Lesson 1024 — Base Image Selection
- Starts containers
- It tells the container runtime (like Docker or containerd) to pull images and start containers according to the pod spec
- Lesson 1109 — Kubelet: The Node Agent
- Startup
- Protect slow-starting containers from early termination
- Lesson 1419 — The Three Types of Probes
- Startup probes
- are crucial for rolling updates of applications with long initialization times, ensuring Kubernetes doesn't prematurely kill Pods that are still starting up during the transition.
- Lesson 1429 — Health Checks and Rolling Updates
- state
- of other alarms (OK, ALARM, or INSUFFICIENT_DATA) rather than raw metrics:
- Lesson 645 — Composite AlarmsLesson 941 — Deployment Lifecycle Operations
- State externalization
- solves this by moving state *outside* the application servers entirely, into dedicated, reliable storage systems that all servers can access.
- Lesson 2468 — State Externalization Patterns
- state file
- is like a detailed inventory list that records every resource the IaC tool has created and their current configurations—databases, servers, networks, storage buckets, and more.
- Lesson 700 — Introduction to State FilesLesson 702 — State ReconciliationLesson 703 — Local vs Remote StateLesson 706 — Import Existing ResourcesLesson 718 — Change Management and PlanningLesson 719 — Handling Drift and Manual ChangesLesson 739 — Resource Blocks and the Resource LifecycleLesson 774 — What is Terraform State
- State file conflicts
- emerge when multiple teams work on the same infrastructure.
- Lesson 831 — Scaling Challenges and Patterns
- State file partitioning
- means dividing your infrastructure into multiple independent state files, each managed by a separate Terraform configuration.
- Lesson 834 — State File Partitioning
- State implications
- Could this change cause unintended resource destruction or data loss?
- Lesson 715 — Code Review and Peer Validation
- State input
- that triggered the failure (malformed data?
- Lesson 2526 — Workflow Monitoring and Debugging
- State locking prevents conflicts
- Only one person can modify infrastructure at a time
- Lesson 783 — Why Remote State Matters
- state machine
- is a model that defines a series of states and transitions between them based on conditions or events.
- Lesson 2516 — Step Functions and State MachinesLesson 2738 — Event-Driven State Machines
- state management
- and **orchestration** capabilities.
- Lesson 512 — Azure Functions: Durable FunctionsLesson 709 — Workflow Automation and CI/CD IntegrationLesson 836 — Terraform Cloud for Team CollaborationLesson 1116 — Kubernetes API Server OverviewLesson 2512 — Orchestrator Pattern with Step FunctionsLesson 2515 — Workflow Orchestration Fundamentals
- State Reconstruction
- If your current state (read model, database view) is corrupted or lost, replay all events from the beginning to rebuild it from scratch.
- Lesson 2731 — Event Replay and Reprocessing
- state refresh
- they query your actual cloud resources and compare them to what's recorded in the state file.
- Lesson 705 — State Refresh and Drift DetectionLesson 706 — Import Existing Resources
- State requirements
- Stateless applications work well with managed platforms (App Service, App Engine); stateful workloads may need traditional VMs with persistent storage
- Lesson 110 — Compute Service Selection Criteria
- State separation
- divides infrastructure into smaller, independent state files (by environment, application, or layer).
- Lesson 831 — Scaling Challenges and Patterns
- State serialization/deserialization
- at every boundary
- Lesson 2552 — Function Chaining and Orchestration Efficiency
- State Synchronization
- The replica must monitor the primary's health and coordinate takeover to prevent split-brain scenarios (both thinking they're primary).
- Lesson 1802 — Jenkins High Availability Architecture
- stateful
- behavior.
- Lesson 201 — Security Groups vs Network ACLs OverviewLesson 202 — Security Group FundamentalsLesson 203 — Security Group Rules and SyntaxLesson 204 — Security Group Rule EvaluationLesson 210 — Security Groups vs NACLs Use CasesLesson 228 — Network ACL vs Security Group ComparisonLesson 2395 — Segmentation with Security GroupsLesson 2461 — Stateless vs Stateful: Core Definitions
- Stateful applications
- Databases, session management, or WebSocket connections conflict with stateless function design
- Lesson 470 — FaaS Use Cases and Anti-PatternsLesson 1210 — Headless ServicesLesson 2445 — DR for Stateful vs Stateless Apps
- Stateful Monitoring
- Long-running status checks with timeouts
- Lesson 512 — Azure Functions: Durable Functions
- Stateful operations
- with local caching or connection pooling are critical
- Lesson 2568 — Hybrid Microservice Deployments
- StatefulSets
- Verifies ordered pod readiness
- Lesson 1900 — Health AssessmentLesson 2033 — ELK/EFK on KubernetesLesson 2470 — Stateful Set Patterns in Kubernetes
- StatefulSets for Elasticsearch
- Lesson 2033 — ELK/EFK on Kubernetes
- stateless
- behavior.
- Lesson 201 — Security Groups vs Network ACLs OverviewLesson 206 — Network ACL FundamentalsLesson 210 — Security Groups vs NACLs Use CasesLesson 228 — Network ACL vs Security Group ComparisonLesson 512 — Azure Functions: Durable FunctionsLesson 623 — Edge Computing Limitations and ConsiderationsLesson 2154 — Spot Instances and Preemptible VMsLesson 2396 — Network ACLs for Subnet Isolation (+2 more)
- stateless applications
- and **loosely coupled services** by:
- Lesson 49 — Observability and Monitoring ArchitectureLesson 1160 — Understanding Deployments in KubernetesLesson 2445 — DR for Stateful vs Stateless Apps
- Stateless rotation functions
- Keep rotation logic idempotent so retries don't cause issues.
- Lesson 2247 — GCP Secret Manager Rotation Strategies
- Stateless services
- Web servers, API endpoints, or worker processes that don't store local state
- Lesson 1057 — Scaling Services with ComposeLesson 2759 — Multicloud Architecture Patterns: Active- Active
- Static
- Administrators pre-create PVs manually, defining the storage backend (NFS, cloud disk, etc.
- Lesson 1289 — PersistentVolume (PV) Fundamentals
- Static analysis
- searches for patterns matching known malware signatures or secret formats (AWS keys, SSH private keys, tokens)
- Lesson 1083 — Malware and Secret ScanningLesson 2875 — Introduction to Infrastructure Testing
- Static assets
- like images or CSS might use:
- Lesson 595 — Cache Behavior ConfigurationLesson 1671 — What are Build Artifacts?
- static IP addresses
- one per availability zone.
- Lesson 266 — Static IP and Elastic IP SupportLesson 271 — NLB Use Cases and Patterns
- Static IP requirements
- NLBs can assign fixed Elastic IPs, critical for whitelisting
- Lesson 261 — What is a Network Load Balancer (NLB)?Lesson 271 — NLB Use Cases and Patterns
- Static lists
- Predefined options like environment names (`prod`, `staging`, `dev`)
- Lesson 2107 — Dashboard Variables and Filters
- Static Website Hosting
- Lesson 143 — Object Storage Use Cases
- Statistical thresholds
- It calculates expected cost ranges based on historical variance
- Lesson 2987 — Cost Anomaly Detection Systems
- Status
- – Current state (e.
- Lesson 850 — Stack Creation Process and EventsLesson 1122 — Object Specifications and StatusLesson 1531 — Release History and Status
- Status of those resources
- Lesson 1531 — Release History and Status
- Status pages
- (like Atlassian Statuspage, Instatus, or custom solutions) serve as your single source of truth for customers.
- Lesson 2131 — Incident Communication and Status Pages
- Stdout/stderr to orchestrator
- Applications write to standard streams; Kubernetes captures and routes them
- Lesson 2046 — Cloud-Native Logging Overview
- Steady State Hypothesis
- is your definition of how a healthy system behaves under typical conditions.
- Lesson 2492 — Steady State HypothesisLesson 2494 — Chaos Experiments in Non-ProductionLesson 2499 — GameDays and Chaos Testing PracticesLesson 2500 — Measuring and Improving Resilience
- Steady-state rate
- The sustained number of requests allowed per second
- Lesson 531 — Throttling and Rate LimitingLesson 539 — API Gateway Throttling and Rate Limits
- step
- , or **simple scaling policies** that trigger based on your thresholds.
- Lesson 306 — Custom Metric ScalingLesson 1687 — Steps and Running Commands
- Step 4: Configure Peerings
- Lesson 2216 — ExpressRoute Circuit Configuration
- Step 7
- Your Pod can now mount the PVC and use the storage.
- Lesson 1308 — Dynamic Provisioning Workflow
- Step Functions state machine
- acts as the conductor of an orchestra—it knows which function to call, when, and what to do if something fails.
- Lesson 2512 — Orchestrator Pattern with Step Functions
- Step Scaling
- gives you more control by defining **multiple scaling steps** based on how far your metric deviates from normal.
- Lesson 316 — ASG Scaling Policies in AWS
- Step-level variables
- apply only to that single command:
- Lesson 1693 — Environment Variables in Workflows
- steps
- (ranges) tied to CloudWatch alarms:
- Lesson 299 — Step Scaling PoliciesLesson 1683 — GitHub Actions Architecture ComponentsLesson 1714 — Composite ActionsLesson 1786 — Stages and Steps OrganizationLesson 2145 — Cost Centers and Business Units
- Stickiness type
- (load balancer-generated or application-based)
- Lesson 278 — Session Affinity and Sticky Sessions
- Sticky identity
- If Pod `db-1` fails, the replacement Pod is still called `db-1` with the same storage
- Lesson 1176 — StatefulSet Fundamentals
- sticky sessions
- ) is a load balancer feature that "remembers" which backend server handled your first request, then routes all your subsequent requests to that **same server** for the duration of your session.
- Lesson 242 — Session Affinity (Sticky Sessions)Lesson 278 — Session Affinity and Sticky SessionsLesson 2467 — Sticky Sessions and Affinity
- Sticky Sessions (Limited Statelessness)
- Lesson 2463 — Session Management in Stateless Systems
- STONITH
- ("Shoot The Other Node In The Head"): Physically power off or reboot the suspect node
- Lesson 2485 — Split-Brain Prevention
- stop
- a VM, your data on root and additional storage volumes remains intact (like we learned about VM storage).
- Lesson 62 — VM States: Running, Stopped, TerminatedLesson 83 — Starting and Stopping VMsLesson 88 — VM HibernationLesson 2161 — Scheduled Shutdown for Non-Production
- Stopped
- – Your VM is powered off but still exists.
- Lesson 62 — VM States: Running, Stopped, TerminatedLesson 82 — VM States and State Transitions
- Stopping
- The VM is shutting down gracefully.
- Lesson 82 — VM States and State TransitionsLesson 83 — Starting and Stopping VMs
- stops sending new requests
- to that target
- Lesson 241 — Connection Draining and DeregistrationLesson 279 — Connection Draining and Graceful Shutdown
- Storage
- is where your data lives.
- Lesson 8 — Cloud Infrastructure ComponentsLesson 30 — Pay-as-You-Go Pricing Model FundamentalsLesson 1650 — Artifact Management in PipelinesLesson 1820 — Pricing Model for AWS Code ServicesLesson 2005 — Log Aggregation ArchitectureLesson 2138 — Cloud Billing Structure BasicsLesson 2658 — Athena Data Catalogs and DatabasesLesson 2664 — Google BigQuery as Serverless Query Engine (+1 more)
- Storage Abstraction
- PVs hide the complexity of the underlying storage system.
- Lesson 1289 — PersistentVolume (PV) FundamentalsLesson 2764 — Application Portability FundamentalsLesson 2766 — Infrastructure Abstraction Patterns
- Storage autoscaling
- monitors your database's storage usage automatically.
- Lesson 401 — Storage Autoscaling
- storage backend
- , and choosing the right one affects performance, cost, and scalability.
- Lesson 1069 — Registry Storage Backend OptionsLesson 2089 — Jaeger OverviewLesson 2253 — Vault Architecture and Components
- Storage class
- (optional, for dynamic provisioning)
- Lesson 1290 — PersistentVolumeClaim (PVC) FundamentalsLesson 1291 — PV and PVC Binding Process
- Storage Class (Optional)
- – The `storageClassName` field lets you request a specific storage type.
- Lesson 1297 — Creating PersistentVolumeClaims
- Storage class mismatch
- PVC specifies a class that doesn't exist or has no PVs
- Lesson 1302 — Troubleshooting PV and PVC Issues
- Storage Class Transitions
- let you define rules that automatically migrate objects from expensive, high-performance storage to cheaper, slower-access tiers as they age.
- Lesson 159 — Storage Class Transitions
- Storage classes
- are different tiers of object storage, each optimized for specific access patterns and cost structures.
- Lesson 148 — Storage Classes IntroductionLesson 2631 — Data Lake Zones and Organization
- Storage Configuration
- Select storage type (General Purpose SSD, Provisioned IOPS) and initial size, potentially enabling autoscaling
- Lesson 402 — Creating and Launching RDS Instances
- Storage consolidation
- Shared object storage buckets with prefix-based isolation
- Lesson 2164 — Multi-Tenancy and Resource Sharing
- Storage efficiency
- Container images share common layers across multiple containers.
- Lesson 966 — Density and Resource EfficiencyLesson 979 — Copy-on-Write Strategy
- Storage events
- When a user uploads an image to S3, trigger a function to generate thumbnails.
- Lesson 2501 — Event-Driven Invocation Pattern
- Storage failure
- – Disk or volume issues preventing database operations
- Lesson 416 — Multi-AZ Failover Process
- Storage Gateway Replication
- Lesson 2785 — Cross-Cloud Data Replication Strategies
- storage layer
- is where your actual data lives.
- Lesson 397 — RDS Architecture and ComponentsLesson 2058 — Multi-Tenancy and Log IsolationLesson 2088 — Tracing Backend Architecture
- Storage optimization
- Moving file storage to object storage (S3, Blob Storage) where appropriate
- Lesson 2793 — Replatform Strategy
- Storage Optimized
- instances offer high IOPS and throughput.
- Lesson 78 — Choosing Instance Types for Your WorkloadLesson 109 — Cross-Provider Compute Feature Comparison
- Storage size
- (e.
- Lesson 1290 — PersistentVolumeClaim (PVC) FundamentalsLesson 1291 — PV and PVC Binding Process
- Storage tiers
- let you match log age and access patterns to the right storage technology and cost:
- Lesson 2009 — Log Retention and Storage
- Storage types
- SSD-based storage (like Provisioned IOPS) delivers blazing speed but costs more than standard magnetic storage.
- Lesson 458 — Cost vs Performance Trade-offs
- Storage-heavy systems
- (data warehousing, log processing, NoSQL databases) → **Storage Optimized** instances offer high IOPS and throughput.
- Lesson 78 — Choosing Instance Types for Your Workload
- StorageClass
- must have `allowVolumeExpansion: true` set.
- Lesson 1301 — Expanding PersistentVolumeClaimsLesson 1303 — StorageClass FundamentalsLesson 2771 — Storage Abstraction with CSI
- StorageClasses
- (optional, for dynamic provisioning)
- Lesson 1319 — Installing and Deploying CSI DriversLesson 1485 — GKE Persistent Storage with GCE PDs
- Store both
- the encrypted data and the encrypted DEK together
- Lesson 2296 — Envelope Encryption Pattern
- Store Gateway
- Reads historical metric data directly from object storage, making old metrics queryable without loading them into Prometheus.
- Lesson 1982 — Thanos Architecture Overview
- Stored Procedure Activity
- Runs SQL logic in databases
- Lesson 2650 — ADF Pipeline Activities and Control Flow
- Stored procedures
- written in proprietary languages (PL/SQL → PL/pgSQL)
- Lesson 2808 — Heterogeneous Database MigrationLesson 2823 — Heterogeneous Database Migration
- Stores release metadata
- as Secrets (or ConfigMaps) in your cluster
- Lesson 1521 — Helm Architecture: Client and Library
- strangler fig pattern
- is the gold standard for microservices migration.
- Lesson 2569 — Microservices Migration StrategiesLesson 2598 — Strangler Fig Pattern for Migration
- Strategic alignment
- Does it support broader platform maturity goals?
- Lesson 2946 — Feedback Loops and User Research
- Strategy
- Use power tuning tools to test memory configurations from 128MB to 10GB, measuring both duration and cost.
- Lesson 2983 — Serverless Cost Optimization Patterns
- Stream
- logs to multiple destinations simultaneously
- Lesson 1435 — Logging with Sidecar ContainersLesson 2511 — Stream Processing Pattern
- Stream partitioning
- divides your event stream into multiple independent sub-streams (partitions), allowing multiple consumers to process events concurrently.
- Lesson 2607 — Stream Partitioning and Parallelism
- Stream to Event Hub
- For real-time processing or SIEM integration
- Lesson 2359 — Azure Monitor and Activity Logs
- Stream-based
- Processing logs, analytics pipelines, change data capture from databases where you handle continuous data flows
- Lesson 487 — Function Invocation Types
- Stream-based invocation
- processes records from a data stream in batches.
- Lesson 487 — Function Invocation Types
- streaming
- and **shipping**.
- Lesson 659 — Log Streaming vs Log ShippingLesson 2090 — Jaeger Deployment ModelsLesson 2614 — Batch Processing Fundamentals
- Streaming those changes
- continuously to the target database
- Lesson 2809 — Continuous Data Replication and CDC
- Streaming vs Batch
- Choose between real-time log streaming (using services like Amazon EventBridge or Cloud Pub/Sub) for immediate alerting, or scheduled batch transfers for cost-efficient bulk processing.
- Lesson 2354 — Centralized Audit Log Aggregation
- Strength
- Deep AWS service integration and automatic schema discovery through crawlers.
- Lesson 2653 — Data Catalog Services Across Providers
- Strict mode
- requires all service-to-service communication to use mTLS.
- Lesson 1621 — Enabling mTLS in Istio
- Strict settings
- (5 out of 5) reduce false positives but may miss brief incidents
- Lesson 642 — Alarm Evaluation Periods and Datapoints
- string
- , **number**, and **bool**—let you define simple, single-value variables for your infrastructure configurations.
- Lesson 756 — Variable Types: PrimitivesLesson 866 — Fn::Join and Fn::Split
- String functions
- help you uppercase text, split strings, or trim whitespace
- Lesson 736 — Built-in Functions OverviewLesson 824 — Terraform Functions for Data TransformationLesson 2666 — BigQuery Standard SQL and Functions
- String Interpolation
- is where the magic happens.
- Lesson 732 — String Literals and String InterpolationLesson 926 — Variables and Expressions
- String Manipulation
- Lesson 1539 — Template Functions
- String parameters
- collect free-form text like version numbers or commit messages:
- Lesson 1788 — Parameters and User Input
- strings
- , so wrap numbers and booleans in quotes.
- Lesson 1226 — Ingress AnnotationsLesson 1697 — Workflow File Structure and YAML SyntaxLesson 2684 — Redis Architecture and Data Structures
- strong consistency
- replicas are always up-to-date—but adds latency and reduces availability if replicas are unreachable.
- Lesson 2475 — Database Replication FundamentalsLesson 2479 — Synchronous Replication Trade-offsLesson 2709 — Cache Consistency and Trade-offs
- Structure
- Requires a `pipeline` block at the top level, with nested `stages` containing individual `stage` blocks.
- Lesson 1783 — Declarative vs Scripted Pipeline SyntaxLesson 2907 — Data Integrity Validation
- Structure reshaping
- Flatten nested objects or create new nesting
- Lesson 537 — Request and Response Transformation
- Structured logs
- use standardized formats (typically JSON) with key-value pairs, making them easy for automated systems to search, filter, and analyze:
- Lesson 654 — Structured vs Unstructured LogsLesson 2006 — Structured vs Unstructured Logs
- Structured surveys
- after major releases or onboarding experiences
- Lesson 2946 — Feedback Loops and User Research
- Struggle with complex expressions
- nested deeply in ARM functions
- Lesson 933 — Decompiling ARM to Bicep
- Stubbing
- provides predefined data or state that your tests can use.
- Lesson 2881 — Mocking and Stubbing Infrastructure
- Style violations
- inconsistent naming, improper resource organization
- Lesson 2877 — Static Analysis and Linting
- subjects
- Lists who receives those permissions (the "who")
- Lesson 1381 — RoleBinding FundamentalsLesson 1383 — ClusterRoleBinding UsageLesson 1384 — ServiceAccount RBAC Integration
- subnet boundary
- .
- Lesson 206 — Network ACL FundamentalsLesson 228 — Network ACL vs Security Group Comparison
- Suboptimal peering
- (traffic exiting and re-entering your cloud provider's network unnecessarily)
- Lesson 2227 — Network Path Analysis and Traceroute
- SubPath mount issues
- occur when the referenced key doesn't exist.
- Lesson 1259 — ConfigMap Troubleshooting and Validation
- SubPath mounts
- solve this by letting you mount a single key from a ConfigMap to a specific file path, preserving everything else in the directory.
- Lesson 1258 — Using ConfigMaps with SubPath Mounts
- Subscribers
- listening to that topic receive the event asynchronously
- Lesson 2578 — Event-Driven Communication
- Subscriptions
- – Your billing and resource container.
- Lesson 386 — Azure RBAC FundamentalsLesson 557 — AWS SNS Topics and SubscriptionsLesson 561 — Azure Service Bus TopicsLesson 562 — Google Cloud Pub/SubLesson 571 — Publish-Subscribe PatternLesson 1915 — Notification and Alerting Integration
- Subsequent Requests (Cache Hit)
- User requests same content → Edge serves from local cache → Origin server isn't contacted at all
- Lesson 584 — Origin Servers and Edge Caching
- Success
- All jobs completed without errors (green checkmark )
- Lesson 1694 — Workflow Status and LogsLesson 2713 — Message Visibility and Acknowledgment
- Success codes
- Which HTTP status codes indicate health (e.
- Lesson 251 — Health Check Configuration for ALBs
- Success Criteria
- What response codes indicate success (default: 200-399)
- Lesson 1423 — HTTP Probe Configuration
- Success thresholds
- How many consecutive passes before marking healthy
- Lesson 329 — MIG Health Checks and Autohealing
- Support for complex formats
- You can mount entire configuration files, certificates, or JSON structures—not just simple key- value pairs.
- Lesson 2271 — Volume-Mounted Secrets
- Support ticket patterns
- revealing recurring friction points
- Lesson 2946 — Feedback Loops and User Research
- Supported Resource Types
- Lesson 945 — Deployment Manager Limitations and Scope
- Supporting multi-region deployments
- Perfect for global applications and compliance requirements
- Lesson 1093 — ACR Geo-Replication
- Supports updates and deletions
- while maintaining resource relationships
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Surprises
- Undocumented dependencies, unexpected recovery times, tool limitations
- Lesson 2911 — Post-Test Analysis and Improvement
- Suspend
- versioning on a bucket (new uploads overwrite, but existing versions remain)
- Lesson 157 — Versioning Lifecycle and MFA Delete
- Suspend and Resume
- Lesson 1931 — Flux CLI and Troubleshooting Commands
- Suspended
- Application intentionally paused or scaled to zero
- Lesson 1885 — Application Health and Sync StatusLesson 1900 — Health Assessment
- SVIDs
- (SPIFFE Verifiable Identity Documents)—cryptographic certificates that prove identity.
- Lesson 1620 — Service Identity and SPIFFE
- Switch
- Multi-way branching like a case statement
- Lesson 2650 — ADF Pipeline Activities and Control Flow
- Switch connection strings
- or DNS entries to point applications to the target
- Lesson 2826 — Database Cutover Planning
- Switch to strict mode
- Once everything supports mTLS, enforce encryption-only
- Lesson 1622 — mTLS Migration Strategies
- Switch traffic
- from Blue to Green at the load balancer/DNS level
- Lesson 1664 — Blue-Green Deployment Pattern
- Switching pricing models
- – Combine with Reserved Instances or Savings Plans (concepts you've learned) for additional savings
- Lesson 79 — Cost Optimization with Right-Sizing
- Symbolic resource references
- instead of verbose `resourceId()` functions
- Lesson 921 — Bicep vs ARM Templates
- Symmetric encryption
- uses the *same key* for both encryption and decryption.
- Lesson 2281 — Symmetric vs Asymmetric EncryptionLesson 2295 — Symmetric vs. Asymmetric EncryptionLesson 2307 — Hybrid Encryption for Large Data
- Symmetric keys
- encrypt your actual data (fast, efficient for gigabytes)
- Lesson 2295 — Symmetric vs. Asymmetric Encryption
- Symptom
- Pods stuck in `Pending` because new PVCs can't be created due to quota limits, while old PVCs sit unused.
- Lesson 1190 — StatefulSet and DaemonSet Troubleshooting
- SYN floods
- Send TCP SYN requests without completing the handshake, filling connection tables
- Lesson 2378 — DDoS Attack Types and Vectors
- Sync policies
- determine whether ArgoCD automatically deploys changes the moment it detects drift (auto sync), or waits for a human to click "Sync" (manual sync).
- Lesson 1884 — Sync Policies and Manual vs Auto Sync
- Sync Waves
- (covered in Resource Hooks): Annotate Kubernetes resources with `argocd.
- Lesson 1902 — Application DependenciesLesson 1911 — Sync Waves and Resource Hooks
- Sync Windows
- let you define time-based access controls for when ArgoCD can sync applications to your cluster.
- Lesson 1898 — Sync Windows
- Synced
- Kubernetes resources match the Git manifests exactly
- Lesson 1885 — Application Health and Sync Status
- synchronous
- your application doesn't receive a "write successful" confirmation until the data exists on *both* the primary and standby databases.
- Lesson 415 — Multi-AZ Deployments FundamentalsLesson 487 — Function Invocation TypesLesson 488 — Function Error Handling and RetriesLesson 2570 — Service Communication OverviewLesson 2574 — Synchronous vs Asynchronous Communication
- Synchronous export
- Always export asynchronously to avoid blocking application threads
- Lesson 2087 — Best Practices and Performance Considerations
- synchronous invocation
- , the caller waits for the function to complete and return a response before continuing.
- Lesson 465 — Function Invocation TypesLesson 487 — Function Invocation TypesLesson 506 — AWS Lambda: Event Sources and Triggers
- Synchronous replication
- (near-zero RPO) ensures consistency but adds latency and cost
- Lesson 2436 — Cross-Region Replication SetupLesson 2473 — State Replication and Consistency ModelsLesson 2475 — Database Replication Fundamentals
- Synchronously replicates
- all data writes from the primary database to the standby—every transaction is copied in real-time
- Lesson 415 — Multi-AZ Deployments Fundamentals
- SyncPolicy
- Lesson 1892 — Application Spec Structure
- Syntax (YAML)
- Lesson 871 — Fn::FindInMap Function
- Syntax validation
- checks if your policy is correctly formatted—proper JSON structure, valid action names, correct resource patterns.
- Lesson 371 — Policy Validation and TestingLesson 721 — Continuous Integration for IaCLesson 1783 — Declarative vs Scripted Pipeline Syntax
- Synthetic Monitoring
- sends artificial requests through your network paths to measure availability and latency.
- Lesson 2193 — Network Monitoring Automation
- System Event Logs
- record GCP-initiated actions rather than user actions.
- Lesson 2360 — Google Cloud Audit Logs Types
- System Events
- track infrastructure and operational activities:
- Lesson 569 — Event Types and Naming Conventions
- system logs
- .
- Lesson 655 — Application Logs vs System LogsLesson 656 — Log Retention and Storage Requirements
- System metadata
- is created automatically by the cloud provider.
- Lesson 142 — Object Metadata and Custom Attributes
- system node pools
- and **user node pools** to ensure that critical cluster services remain stable and isolated from your applications.
- Lesson 1495 — System vs User Node PoolsLesson 1504 — AKS Cost Management and Cluster Sizing
- System scope
- Only available to Jenkins itself (for connecting to agents, not jobs)
- Lesson 1777 — Jenkins Credentials Management
- System Status Checks
- monitor the physical hardware and network infrastructure hosting your VM.
- Lesson 90 — VM Monitoring and Health Checks
- System-assigned managed identities
- are tied directly to a single Azure resource.
- Lesson 389 — Azure Managed Identities
- System-wide impact
- Tests how components interact under stress
- Lesson 2491 — Chaos Engineering vs Traditional Testing
- Systems Manager Parameter Store
- come in—they're secure vaults that encrypt and manage secrets, which your Lambda function can fetch at runtime.
- Lesson 508 — AWS Lambda: Environment Variables and Secrets
T
- table
- is a collection of data.
- Lesson 2531 — Amazon DynamoDB FundamentalsLesson 2658 — Athena Data Catalogs and Databases
- Table API
- Key-value pairs — similar to Azure Table Storage but globally distributed
- Lesson 436 — Azure Cosmos DB: Architecture and APIsLesson 2534 — Azure Cosmos DB Serverless
- table name
- (like your data source), then applies operators:
- Lesson 677 — Kusto Query Language (KQL) BasicsLesson 787 — DynamoDB for State Locking
- Tables
- are the top-level containers (like spreadsheet files).
- Lesson 430 — DynamoDB: Fundamentals and Data ModelLesson 2028 — Kibana Dashboard CreationLesson 2103 — Visualization Types and Best PracticesLesson 2645 — Glue Data Catalog FundamentalsLesson 2658 — Athena Data Catalogs and Databases
- tabletop exercises
- with your team:
- Lesson 2389 — DDoS Testing and SimulationLesson 2415 — DR Testing and Validation FrequencyLesson 2902 — DR Testing Fundamentals and Objectives
- tag
- or by **digest**.
- Lesson 983 — Image Tags vs DigestsLesson 990 — Image Naming and Tagging ConventionsLesson 1064 — Image Naming and Tagging Conventions
- Tag Inheritance
- Implement tag propagation from parent resources (like AWS resource groups) to child resources, reducing manual tagging burden.
- Lesson 2964 — Cost Allocation Tags
- Tag pattern
- Keep only `production-*` tags, remove `dev-*` after 7 days
- Lesson 1082 — Image Retention and Lifecycle Policies
- Tag Policies
- Define mandatory tags (like `CostCenter`, `Environment`, `Owner`) and permissible values.
- Lesson 2964 — Cost Allocation Tags
- Tag prefix matching
- Apply different rules to `dev-*` vs `prod-*` tags
- Lesson 1087 — ECR Repository Configuration
- Tag status
- Delete untagged images (dangling layers from overwrites)
- Lesson 998 — Image Retention and Cleanup PoliciesLesson 1087 — ECR Repository Configuration
- Tag synchronization
- Ensuring the same image tags exist across all registries for consistent deployments
- Lesson 1099 — Cross-Provider Registry Integration
- Tag-based exemptions
- to protect intentionally idle resources (DR standbys, development environments)
- Lesson 2986 — Idle Resource Detection and Cleanup
- Tag-based filtering
- Locate resources with specific tag key-value pairs
- Lesson 750 — Data Source Arguments and Filters
- Tag-based lifecycle rules
- aligned with your cost allocation strategy
- Lesson 2980 — Storage Lifecycle Optimization
- Tag-based suppression
- Suppress all alarms for resources tagged with `maintenance=true`
- Lesson 648 — Alarm Suppression and Maintenance Windows
- Tagging and lifecycle tracking
- Use tags like `LastUsed` or `Environment:Dev` combined with automated scripts to flag stale resources.
- Lesson 2160 — Idle Resource Detection
- tagging strategy
- and **cost allocation** practices you've already learned, lifecycle policies become a powerful cost optimization tool that requires minimal ongoing management.
- Lesson 2156 — Storage Lifecycle and TieringLesson 2968 — Multi-Account Cost Aggregation
- tags
- are key-value pairs (like `Environment:Production` or `Project:Website`) that you attach to objects or buckets.
- Lesson 169 — Object Tagging and MetadataLesson 995 — Image Manifest and DigestLesson 2024 — Fluentd Architecture and DesignLesson 2026 — Fluentd Configuration and ParsingLesson 2064 — Span Attributes and Tags
- Tail sampling
- Sample based on trace outcomes (keep all logs for slow/failed requests)
- Lesson 2056 — Log Sampling and Filtering
- Tail-based sampling
- examines the complete trace before deciding whether to keep it.
- Lesson 1636 — Trace Sampling StrategiesLesson 2066 — Sampling StrategiesLesson 2083 — Sampling Strategies in OpenTelemetryLesson 2098 — Tail-Based Sampling
- Taints
- work like "No Entry" signs on nodes, preventing most pods from scheduling there.
- Lesson 1360 — Introduction to Taints and Tolerations
- Tamper Detection Mechanisms
- include write-once storage (like S3 Object Lock with compliance mode), append-only log streams, and blockchain-inspired chaining where each log entry references the hash of the previous entry— breaking the chain reveals tampering.
- Lesson 2357 — Audit Log Integrity and Validation
- Target
- Where to send that traffic (another subnet, an internet gateway, etc.
- Lesson 180 — Route Tables BasicsLesson 229 — VPC Traffic MirroringLesson 1055 — Build Configuration and Context
- Target attachment
- Which connected network should receive that traffic
- Lesson 219 — Transit Gateway Route Tables
- target group
- is a logical container that holds one or more backend targets (like EC2 instances, containers, or IP addresses) that receive traffic from your Application Load Balancer.
- Lesson 247 — Target Groups FundamentalsLesson 275 — Content-Based Routing and Path Rules
- target group level
- , not per listener or rule.
- Lesson 255 — Sticky Sessions (Session Affinity)Lesson 278 — Session Affinity and Sticky Sessions
- target groups
- , where you can have multiple containers from the same service running on different ports on the same host, and ALB routes to all of them intelligently.
- Lesson 258 — ALB and Container IntegrationLesson 262 — NLB Architecture and ComponentsLesson 320 — ASG Integration with Elastic Load Balancing
- Target Groups/Load Balancers
- – Where instances register to receive traffic
- Lesson 313 — AWS Auto Scaling Groups (ASG) Overview
- Target metrics
- CPU utilization, request count, queue depth—choose metrics that reflect actual demand
- Lesson 2155 — Auto Scaling for Cost Efficiency
- Target selection
- Tags that identify which EC2 instances, or ARNs for Lambda/ECS
- Lesson 1832 — CodeDeploy Application and Deployment Groups
- target tracking
- , **step**, or **simple scaling policies** that trigger based on your thresholds.
- Lesson 306 — Custom Metric ScalingLesson 316 — ASG Scaling Policies in AWS
- Target Tracking policy
- (maintaining CPU at 60%) and a **Scheduled Scaling action** (adding capacity at 9 AM) on the same Auto Scaling group.
- Lesson 305 — Multiple Scaling Policy Coordination
- Target tracking scaling
- is like cruise control for your cloud infrastructure.
- Lesson 298 — Target Tracking Scaling OverviewLesson 316 — ASG Scaling Policies in AWS
- Targeted
- Test specific user segments (new vs returning, mobile vs desktop)
- Lesson 1608 — A/B Testing and Experimentation
- Targeted operations
- let you focus on specific resources—like updating just one server, modifying a single database, or destroying only a particular storage bucket—without touching the rest of your infrastructure.
- Lesson 708 — Targeted OperationsLesson 831 — Scaling Challenges and Patterns
- Targeted rollback
- Use revision numbers to skip bad intermediate versions
- Lesson 1556 — Helm Rollback Strategies
- Targets a specific audience
- (like your API server or external service)
- Lesson 1401 — Service Account Token Projection
- Task
- states perform work (invoke Lambda, call APIs, run containers)
- Lesson 2517 — AWS Step Functions Overview
- Task state
- represents a single unit of work performed by your state machine.
- Lesson 2519 — Step Functions Task States
- Tax benefits
- OpEx is often fully deductible in the year incurred
- Lesson 29 — CapEx vs OpEx: Financial Models in Cloud Computing
- TCP
- for simple connection verification, **HTTP/HTTPS** when you need to verify application logic (checking a `/health` endpoint).
- Lesson 268 — NLB Health Checks
- TCP Fast Open
- reduces handshake overhead by allowing data in SYN packets.
- Lesson 2228 — TCP Performance Optimization
- TCP keepalive
- prevents idle connections from timing out prematurely.
- Lesson 2228 — TCP Performance Optimization
- TCP traffic
- Database connections, custom protocols, non-HTTP services
- Lesson 261 — What is a Network Load Balancer (NLB)?
- TCP window
- sizes limiting throughput on high-latency links
- Lesson 2236 — Troubleshooting Network Performance Issues
- Team A
- can only deploy to `prod-cluster/team-a-*` namespaces from `github.
- Lesson 1918 — RBAC and Project-Based Access Control
- Team Already in AWS
- When your team operates primarily in the AWS console and uses AWS tooling daily, the learning curve flattens.
- Lesson 1821 — When to Use AWS Native CI/CD
- Team and ownership information
- Who owns what, how to reach them
- Lesson 2924 — Introduction to Developer Portals
- Team boundaries
- Frontend team accesses `frontend-repo`, backend team accesses `backend-repo`
- Lesson 1680 — Artifact Repository Access Control
- Team collaboration
- Different teams can own different partitions without conflicts.
- Lesson 834 — State File PartitioningLesson 907 — Linked Templates and Template NestingLesson 954 — Introduction to Composite Types
- Team notification
- Ensure on-call engineers know experiments are running
- Lesson 2493 — Blast Radius and Safety Controls
- Team readiness
- Can your people execute procedures without confusion?
- Lesson 2902 — DR Testing Fundamentals and Objectives
- Teardown Phase
- Automatically destroys all resources, preventing resource leaks and reducing costs.
- Lesson 2880 — Kitchen-Terraform for Module Testing
- TechDocs
- Documentation-as-code that lives alongside your services
- Lesson 2927 — Backstage Platform Overview
- Technical debt
- in monolithic architecture prevents innovation
- Lesson 2794 — Refactor/Re-architect Strategy
- Technical debt reduction
- Modernizing legacy applications and retiring aging infrastructure that's expensive to maintain.
- Lesson 2790 — Introduction to Cloud Migration
- Technical metadata
- (repo links, deployment status, documentation)
- Lesson 2928 — Software Catalog in Backstage
- Technical Responders
- focus on remediation without distraction
- Lesson 2131 — Incident Communication and Status Pages
- Technical Risks
- Application compatibility issues, data migration failures, network latency, security vulnerabilities in new environments.
- Lesson 2803 — Risk Assessment and Mitigation
- Technical teams
- Application-specific metrics, performance data, issues requiring resolution
- Lesson 2818 — Migration Progress Tracking and Reporting
- Technology choice
- Service A can use PostgreSQL while Service B uses MongoDB
- Lesson 2561 — Database per Service Pattern
- Technology Diversity
- Services can use different languages, frameworks, and data stores suited to their specific needs.
- Lesson 2555 — What Are Microservices?
- template
- is your architectural blueprint (written in JSON or YAML), while a **stack** is the actual building constructed from those plans.
- Lesson 846 — CloudFormation Templates and StacksLesson 857 — CloudFormation Console and Stack ManagementLesson 883 — StackSets FundamentalsLesson 1162 — Deployment Spec StructureLesson 1163 — Pod Template SpecificationLesson 1757 — Pipeline Templates and Includes
- Template formats
- Uses YAML (like CloudFormation) or Python/Jinja2 for advanced templating
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Template Specs
- are Azure resources that store your ARM templates directly in Azure.
- Lesson 908 — Template Specs for Reusable Templates
- Template-based deployments
- for repeatability
- Lesson 893 — Introduction to Azure Resource Manager (ARM)
- Template-Based Provisioning
- Developers select from pre-configured infrastructure templates (database clusters, microservice scaffolds) that meet organizational standards.
- Lesson 2926 — Self-Service Infrastructure Patterns
- Templates
- are reusable building blocks within configurations.
- Lesson 936 — Deployment Manager Architecture and ComponentsLesson 947 — Template Structure and YAML SyntaxLesson 1534 — Chart Structure and Directory LayoutLesson 1889 — ArgoCD Notifications and WebhooksLesson 1915 — Notification and Alerting Integration
- Templates and golden paths
- Pre-configured project scaffolding aligned with best practices
- Lesson 2924 — Introduction to Developer Portals
- Temporal
- and **Cadence** are open-source alternatives that let you define workflows in general-purpose code (Go, Java, Python, TypeScript) that can run anywhere—on-premises, multi-cloud, or hybrid environments.
- Lesson 2529 — Temporal and Alternative Orchestrators
- Temporal Queries
- Need to know what your inventory looked like last Tuesday?
- Lesson 2726 — Event Sourcing Fundamentals
- Temporary
- Human users, applications running in cloud environments, cross-account access, anything security-conscious
- Lesson 341 — Temporary vs Permanent Credentials
- Temporary computation results
- Lesson 2469 — Distributed Caching for Stateful Data
- Temporary credentials
- are like day passes that automatically expire.
- Lesson 341 — Temporary vs Permanent Credentials
- temporary security credentials
- instead.
- Lesson 356 — Temporary Security CredentialsLesson 358 — Instance Profiles and Metadata
- Temporary state
- Session data, cache, build artifacts you don't need to keep
- Lesson 1039 — tmpfs Mounts
- Temporary uploads
- Let users upload photos directly to your bucket without giving them permanent write access
- Lesson 165 — Pre-Signed URLs and Temporary Access
- terminate
- a VM, there's no going back—it's permanent deletion.
- Lesson 62 — VM States: Running, Stopped, TerminatedLesson 85 — VM Termination and DeletionLesson 2160 — Idle Resource Detection
- Terminate blue
- After stabilization, optionally removes old instances
- Lesson 1835 — Blue/Green Deployments with CodeDeploy
- Terminate hook
- – Pause before final termination (save logs, drain connections gracefully)
- Lesson 295 — Instance Lifecycle in Auto Scaling
- Terminated
- – Your VM is permanently deleted.
- Lesson 62 — VM States: Running, Stopped, TerminatedLesson 82 — VM States and State TransitionsLesson 295 — Instance Lifecycle in Auto Scaling
- terminates
- after 15 minutes of inactivity.
- Lesson 466 — Function Lifecycle and ContextLesson 1812 — CodeBuild: Managed Build Service Overview
- Terminating
- a VM is permanent deletion—like throwing away your computer.
- Lesson 83 — Starting and Stopping VMsLesson 295 — Instance Lifecycle in Auto Scaling
- termination policies
- to decide which instances go first:
- Lesson 308 — Scale-In Protection and TerminationLesson 319 — ASG Termination Policies
- Terraform
- is an open-source infrastructure as code (IaC) tool created by HashiCorp.
- Lesson 723 — What is Terraform and Why Use ItLesson 946 — Deployment Manager vs Terraform on GCP
- Terraform Cloud or Enterprise
- , you publish modules by connecting a VCS repository (GitHub, GitLab, etc.
- Lesson 812 — Private Module Registries
- Terraform Cloud's cost estimation
- integrate directly into CI/CD workflows.
- Lesson 838 — Cost Estimation in CI/CD
- Terraform Cloud's drift detection
- feature for automatic monitoring
- Lesson 842 — Drift Detection and Remediation
- Terraform module
- is a container for multiple resources that are used together.
- Lesson 798 — What Are Terraform Modules
- Terraform provider abstraction
- means creating modules that act as translation layers—you define *what* you want (a compute instance with certain specs) once, and the module handles the *how* for each cloud provider.
- Lesson 2767 — Terraform Provider Abstraction
- Terraform Sentinel
- can all trigger automatically on code commits or pull requests.
- Lesson 2345 — Continuous Compliance Scanning
- Terrascan
- detects compliance violations and security risks across IaC tools, offering 500+ policies for standards like CIS benchmarks, PCI-DSS, and GDPR.
- Lesson 2884 — Security Scanning in IaC Tests
- test
- , then **deploy**—with each stage acting as a quality gate.
- Lesson 1657 — Linear Pipeline PatternLesson 1740 — Basic Pipeline Patterns: Build, Test, DeployLesson 1841 — Pipeline Actions and Action Types
- Test carefully
- Try changes on one instance before rolling out to others
- Lesson 708 — Targeted Operations
- Test dependencies
- Validate connectivity and performance after each wave before proceeding
- Lesson 2829 — Dependency Mapping and Migration Order
- Test edge cases
- sudden traffic spikes, gradual ramps, sustained high load, and rapid drops.
- Lesson 307 — Scaling Policy Testing
- Test in Non-Production First
- Deploy to dev/test resource groups before touching production.
- Lesson 919 — ARM Template Best Practices and Validation
- Test in production
- Validate with real traffic before full activation
- Lesson 1666 — Feature Flag Integration
- Test network connectivity
- `kubectl exec my-pod -- ping google.
- Lesson 1140 — kubectl exec: Executing Commands in Containers
- Test reachability
- Use ping/traceroute from both directions
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Test realistic scenarios
- Don't just verify a VPC deploys—deploy a VPC *with* subnets, route tables, and a test EC2 instance, then verify connectivity.
- Lesson 2882 — Integration Testing Strategies
- Test Results
- If tests ran, pass/fail breakdown
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Test safely
- Changes happen in complete isolation from production
- Lesson 2883 — Ephemeral Test Environments
- Test stage
- Run unit tests, integration tests, security scans
- Lesson 1786 — Stages and Steps Organization
- Test thoroughly
- Ensure workloads still deploy correctly
- Lesson 1400 — Migrating from PodSecurityPolicy
- Test under load
- to understand your application's peak memory usage
- Lesson 1335 — Setting Memory Limits
- Test your rollback mechanisms
- when experiments reveal problems
- Lesson 2494 — Chaos Experiments in Non-Production
- Tested rollback procedures
- Document and rehearse rollback steps for each wave.
- Lesson 2817 — Disaster Recovery During Migration
- Testing
- Want to see how a new version of your code handles last month's traffic?
- Lesson 579 — Event Replay and Time TravelLesson 1672 — Artifact Lifecycle
- Testing and CI/CD
- Reproducible, isolated environments
- Lesson 1059 — Compose Best Practices and Limitations
- Testing and development
- Spin up instances for a few hours, then tear them down
- Lesson 73 — On-Demand Pricing Model
- Testing and Simulation
- Replay production events in a test environment to validate new logic against real-world scenarios.
- Lesson 2731 — Event Replay and Reprocessing
- Testing becomes reliable
- what works in staging will work in production
- Lesson 691 — Immutable Infrastructure Principle
- Testing before commit
- Always validate new credentials work before storing them—a broken rotation can cause outages.
- Lesson 2247 — GCP Secret Manager Rotation Strategies
- Testing changes
- Create a copy to test migrations or schema changes safely
- Lesson 427 — Restoring from Backups
- Testing environment
- QA tests the exact same container image that developers built, eliminating "different environment" bugs.
- Lesson 965 — Container Portability BenefitsLesson 1672 — Artifact Lifecycle
- Testing Error Scenarios
- Simulate 400, 500, or timeout responses without breaking real systems
- Lesson 545 — Mock Integrations and Testing
- Testing infrastructure code
- by feeding it through OPA before deployment
- Lesson 2886 — Compliance Testing with Open Policy Agent
- Testing window
- – validate your full configuration before deploying
- Lesson 1171 — Pausing and Resuming Rollouts
- Text and Markdown
- Add context, instructions, or explanations between your data visualizations.
- Lesson 678 — Azure Monitor Workbooks
- Text fields
- for full-text search (log messages)
- Lesson 2019 — Elasticsearch Index Templates and Mappings
- Text formats (CSV, JSON)
- Human-readable, easy to generate, but slow to query.
- Lesson 2660 — Querying Data Formats in Athena
- They start fast
- New instances spin up quickly during replacements
- Lesson 968 — Immutable Infrastructure Pattern
- They're lightweight
- Replacing a container takes seconds, not minutes
- Lesson 968 — Immutable Infrastructure Pattern
- They're portable
- The same container image works everywhere
- Lesson 968 — Immutable Infrastructure Pattern
- They're versioned
- Each build creates a distinct artifact you can tag and track
- Lesson 968 — Immutable Infrastructure Pattern
- Think of it as
- Building a tower of blocks where each level must be solid before adding the next.
- Lesson 1184 — StatefulSet Pod Management Policies
- Think of it like
- A library where 90% of book requests are already on the shelf versus needing to order from another location.
- Lesson 589 — CDN Performance MetricsLesson 1295 — Volume Modes: Filesystem vs BlockLesson 1865 — Pull-Based vs Push-Based GitOpsLesson 2472 — Active-Passive vs Active-Active for StatefulLesson 2671 — CDN Caching Fundamentals ReviewLesson 2692 — Google Cloud Memorystore
- Third-party CRDs
- translating vendor-specific health signals
- Lesson 1914 — Resource Health Customization
- Third-party integrations
- External services get limited scope boundaries regardless of assigned roles
- Lesson 369 — Policy Boundaries and Guardrails
- Third-Party Resource Types
- Vendors publish resource types you can activate in your AWS account.
- Lesson 892 — CloudFormation Registry and Extensions
- Thread pools
- Critical API calls use one thread pool, background tasks use another
- Lesson 2583 — Bulkhead Pattern for IsolationLesson 2589 — Bulkhead Pattern for Isolation
- Threat Detection
- SCC integrates with Google's threat intelligence to detect anomalous behavior patterns, potential malware, cryptocurrency mining attempts, and suspicious network activity.
- Lesson 2864 — Google Security Command Center
- Threat intelligence integration
- Correlates events with known indicators of compromise
- Lesson 2863 — Azure Security Center and Sentinel
- Threats
- are active attempts to compromise your systems—like credential stuffing attacks, API abuse, or malware deployment.
- Lesson 2860 — Threat Detection Fundamentals
- Threshold
- The trigger value (> 70%)
- Lesson 322 — VMSS Scaling Policies and RulesLesson 401 — Storage AutoscalingLesson 639 — Introduction to Alarms and AlertingLesson 2016 — Log Alerting BasicsLesson 2465 — Stateless Service Health Checks
- Threshold configuration
- Define what constitutes "abnormal" (e.
- Lesson 2150 — Cost Anomaly DetectionLesson 2969 — Cost Anomaly Detection
- threshold-based alarms
- like "alert me if CPU exceeds 80%.
- Lesson 644 — Anomaly Detection AlarmsLesson 667 — Log-Based Metrics and Alerting
- Threshold-based refresh
- Trigger refresh when TTL drops below a threshold (e.
- Lesson 2701 — Refresh-Ahead Caching Pattern
- Thresholds
- showing acceptable ranges
- Lesson 2102 — Metric Selection and RelevanceLesson 2120 — Error Budget Policies and Decision MakingLesson 2437 — DNS-Based Failover
- Thresholds and Flapping
- Require multiple consecutive failures before marking unhealthy (typically 2-3), and multiple successes before returning to healthy.
- Lesson 2455 — Health Checks and Failure Detection
- Thresholds on Key Metrics
- Set alert triggers on metrics you've been monitoring (CPU utilization, connection count, read/write latency, storage space).
- Lesson 457 — Monitoring and Alerting for Performance
- Throttle rate
- steady-state requests per second allowed
- Lesson 2540 — Serverless API Rate Limiting and Throttling
- Throttle rules
- Define request thresholds per IP or session
- Lesson 2750 — Cloud Provider Rate Limiting Services
- throttled
- (rejected with an error) or **queued** (delayed until capacity frees up), depending on the invocation type and configuration.
- Lesson 478 — Function Concurrency LimitsLesson 1334 — Setting CPU Limits
- throttles
- new invocations.
- Lesson 509 — AWS Lambda: Concurrency and Scaling ControlsLesson 520 — What is an API Gateway?
- Throttling
- includes two key components:
- Lesson 531 — Throttling and Rate LimitingLesson 539 — API Gateway Throttling and Rate LimitsLesson 1340 — CPU Throttling BehaviorLesson 2385 — Rate Limiting and ThrottlingLesson 2540 — Serverless API Rate Limiting and ThrottlingLesson 2592 — Rate Limiting and ThrottlingLesson 2748 — Throttling and Circuit Breaker Patterns
- throughput
- (the total amount of data moved per second) rather than super-fast response times for individual requests.
- Lesson 119 — Storage Access Patterns and Workload TypesLesson 126 — Block Storage Performance MetricsLesson 155 — Object Storage Performance CharacteristicsLesson 265 — NLB Performance CharacteristicsLesson 419 — Read Replica Lag and ConsistencyLesson 446 — Database Performance Metrics and MonitoringLesson 2114 — Common SLI Categories: Availability, Latency, and ThroughputLesson 2185 — Latency and Performance Metrics (+4 more)
- Ticket creation
- Open Jira/ServiceNow tickets for manual review
- Lesson 2901 — Policy Reporting and Remediation
- Ticket for investigation
- 10% consumed in 3 days (2x burn) + confirmed over 6 hours
- Lesson 2121 — Multi-Window and Multi-Burn-Rate Alerting
- Tier 3
- Engage cloud provider's DDoS response team (Shield Advanced, Azure DDoS Protection specialists)
- Lesson 2387 — DDoS Response Procedures
- Tier 3 (Hot Standby/Active-Passive)
- Full duplicate environment running but not serving traffic.
- Lesson 2411 — DR Tiers and Service Levels
- Tier 4 (Active-Active/Multi-Site Active)
- Multiple sites simultaneously processing traffic with real-time replication.
- Lesson 2411 — DR Tiers and Service Levels
- Tiered Architecture
- Web, application, and database layers separated
- Lesson 2390 — Network Segmentation Fundamentals
- Tiered escalation
- Primary responder handles initial triage; secondary and tertiary levels escalate if needed.
- Lesson 2127 — On-Call Rotation Structures
- Time alignment
- Control data point intervals (align with `1m`, `5m`, etc.
- Lesson 682 — GCP Monitoring Query Language
- time picker
- to navigate quickly
- Lesson 2000 — Annotations and Time Range ControlsLesson 2029 — Kibana Index Patterns and Discover
- Time sync
- Link multiple panels to explore the same period together
- Lesson 2000 — Annotations and Time Range Controls
- Time to scale
- How quickly do new instances launch after a trigger?
- Lesson 312 — Scaling Policy Monitoring
- Time travel
- Replay events to see what your system looked like at any past moment.
- Lesson 573 — Event Sourcing FundamentalsLesson 2508 — Event Sourcing with FunctionsLesson 2596 — Event Sourcing Fundamentals
- Time windows
- (per second, minute, or hour)
- Lesson 2385 — Rate Limiting and ThrottlingLesson 2493 — Blast Radius and Safety Controls
- Time-based access
- Different permissions during business hours vs after-hours
- Lesson 367 — Policy Variables and Dynamic Policies
- Time-based analysis
- Track how costs evolve across different periods to identify seasonal patterns or sudden spikes.
- Lesson 2139 — Cost Explorer and Billing Dashboards
- Time-based code
- A 6-digit number from an authenticator app that changes every 30 seconds
- Lesson 342 — Multi-Factor Authentication (MFA) Basics
- Time-based partitioning
- Logs split by time windows, dramatically speeding queries within a time range
- Lesson 2011 — Log Indexing FundamentalsLesson 2661 — Athena Partitioning Strategies
- Time-based retention
- keeps artifacts for a fixed period (e.
- Lesson 1678 — Artifact Retention and CleanupLesson 2610 — Kafka Retention and Storage
- Time-based triggers
- go beyond simple cron, offering features like timezone-aware scheduling, holiday calendars, and retry windows.
- Lesson 2616 — Job Scheduling and Orchestration
- Time-bound access
- Implement Just-in-Time (JIT) access that expires automatically
- Lesson 2834 — Principle of Least Privilege
- Time-range partitioning
- is essential since traces are time-series data.
- Lesson 2097 — Query Performance and Indexing
- Time-range preservation
- Links carry `from` and `to` parameters
- Lesson 2109 — Contextual Links and Drill-Down
- Time-sensitive
- Events have timestamps and often must be processed within strict time windows.
- Lesson 2600 — What is Streaming Data?
- time-series
- a stream of timestamped measurements identified by a unique combination of a metric name and labels.
- Lesson 1948 — Time-Series Data ModelLesson 1955 — Labels and DimensionalityLesson 1962 — PromQL Basics and Data Model
- Time-series data
- (IoT sensor logs, metrics)
- Lesson 443 — Keyspaces and Cassandra-Compatible ServicesLesson 1958 — Alerting Rules
- Time-to-First-Deploy
- measures how quickly a new engineer can go from zero to deploying their first application.
- Lesson 2916 — Developer Experience Goals
- Time-to-Live (TTL)
- automatically deletes items after a specified timestamp.
- Lesson 444 — NoSQL Backup, Point-in-Time Recovery, and TTLLesson 533 — API Gateway CachingLesson 584 — Origin Servers and Edge CachingLesson 596 — TTL and Cache Control Headers
- Time-to-market
- improvements for new products
- Lesson 37 — Measuring Cloud Business Value: KPIs and Metrics
- Time-to-market is critical
- Building a portable abstraction takes time you don't have
- Lesson 2777 — Lock-In vs Portability Trade-offs
- Timeline of events
- When detection occurred, when containment began, resolution time
- Lesson 2874 — Post-Incident Review and Improvement
- Timeline reconstruction
- Document events chronologically with timestamps—when the incident started, what actions responders took, when services recovered.
- Lesson 2134 — Post-Incident Reviews and Blameless Postmortems
- Timeout
- How long to wait for a response
- Lesson 239 — Health Checks and Target MonitoringLesson 251 — Health Check Configuration for ALBsLesson 268 — NLB Health ChecksLesson 1430 — Debugging Failed ProbesLesson 1441 — Multi-Line Log HandlingLesson 1611 — Timeouts and Retry PoliciesLesson 1751 — Job Retry and TimeoutLesson 1844 — Manual Approval Actions (+2 more)
- Timeout Configuration
- Set timeouts shorter than your check interval to avoid delayed detection.
- Lesson 2455 — Health Checks and Failure Detection
- Timeout expires
- No ACK received, message becomes visible again for retry
- Lesson 2713 — Message Visibility and Acknowledgment
- Timeout Strategies
- Set explicit timeouts at the task and workflow level.
- Lesson 2525 — Long-Running Workflows
- timeouts
- (time limits), **concurrency** (limiting simultaneous runs), and **cancellation policies** (when to stop).
- Lesson 1712 — Timeouts, Concurrency, and Workflow ControlsLesson 2512 — Orchestrator Pattern with Step FunctionsLesson 2582 — Retry and Timeout Strategies
- Timestamp
- Exactly when it occurred (down to the second)
- Lesson 344 — IAM Audit and Compliance LoggingLesson 563 — Message Attributes and MetadataLesson 570 — Event Schema DesignLesson 850 — Stack Creation Process and EventsLesson 1948 — Time-Series Data ModelLesson 2037 — Promtail Log Collection and PipelinesLesson 2183 — VPC Flow LogsLesson 2865 — CloudTrail and Audit Logging for Security
- Timestamp information
- Lesson 222 — VPC Flow Logs
- Timestamps
- (when the connection occurred)
- Lesson 213 — Network Security Logging and MonitoringLesson 2348 — Compliance Reporting and Evidence
- TLS certificates
- (formerly called SSL) are digital credentials that encrypt traffic between clients and your API.
- Lesson 541 — Custom Domain Names and TLS
- TLS listener
- on the NLB and attach an **SSL/TLS certificate** (typically from AWS Certificate Manager).
- Lesson 269 — TLS Termination on NLB
- TLS termination
- is the process of decrypting HTTPS traffic at the Ingress Controller, then forwarding unencrypted HTTP traffic to backend services.
- Lesson 1225 — TLS Termination with Ingress
- Token bucket
- Tokens refill at a steady rate; each request consumes a token
- Lesson 2592 — Rate Limiting and Throttling
- Token cost
- How many tokens each request consumes (usually 1, but can vary by request type).
- Lesson 2745 — Token Bucket Algorithm
- Token location
- Typically the `Authorization: Bearer <token>` header
- Lesson 1627 — JWT Authentication and Validation
- Token-based
- Validates a bearer token (like an OAuth token)
- Lesson 544 — API Gateway Authorization Strategies
- Token-Based Authentication
- offers more security and flexibility.
- Lesson 1079 — Private Registry Authentication
- Tolerant of cold starts
- (no persistent local storage needed)
- Lesson 1503 — AKS Virtual Nodes and Serverless Bursting
- Tolerations
- work differently—they let your DaemonSet pods *tolerate* node taints.
- Lesson 1187 — DaemonSet Scheduling and Node SelectionLesson 1360 — Introduction to Taints and Tolerations
- Too deep
- You allocate excessive memory/storage, waste money, and hide performance problems.
- Lesson 2742 — Queue Depth and Capacity Planning
- Too shallow
- Your queue fills up quickly, rejecting new messages (overflow) even when consumers could handle more work eventually.
- Lesson 2742 — Queue Depth and Capacity Planning
- Too-sensitive thresholds
- that trigger on normal variance
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Tool compatibility
- Monitoring tools work across meshes
- Lesson 1598 — Service Mesh Interface (SMI) Standard
- Tool Integration
- Tools like `docker-compose` and orchestrators can read `EXPOSE` to configure networking automatically
- Lesson 1007 — EXPOSE: Port DocumentationLesson 1124 — Annotations for Metadata
- Tooling and visibility
- (dashboards, tagging standards, cost anomaly detection)
- Lesson 2954 — Shared Responsibility Model
- Top floor
- (highest abstraction): Simple CLI commands or UI forms — "deploy app, choose region"
- Lesson 2920 — Abstraction Levels and User Personas
- Top SQL identification
- See which specific queries consume the most CPU or I/O
- Lesson 456 — Performance Insights and Diagnostics Tools
- Top tier
- Global Prometheus federates key metrics from all lower tiers
- Lesson 1979 — Prometheus Federation Basics
- top-level keywords
- to define your pipeline structure:
- Lesson 1729 — The .gitlab-ci.yml File StructureLesson 1741 — GitLab CI/CD Pipeline File Structure
- Topic
- The message destination where publishers send
- Lesson 561 — Azure Service Bus TopicsLesson 571 — Publish-Subscribe PatternLesson 2608 — Introduction to Apache Kafka
- Topic-Based Routing
- organizes events into channels or topics (e.
- Lesson 2736 — Event Filtering and Routing
- Topics
- implement a **publish-subscribe** model.
- Lesson 551 — Queue vs Topic PatternLesson 562 — Google Cloud Pub/Sub
- Topology
- view visualizes your entire network architecture with real-time status.
- Lesson 2194 — Provider-Specific Network InsightsLesson 2602 — Streaming Architecture Patterns
- Topology constraints solve this
- by letting you define exactly where volumes can be created.
- Lesson 1313 — StorageClass Topology Constraints
- Topology Distribution
- Lesson 1114 — High Availability Control Plane
- topology key
- (like `kubernetes.
- Lesson 1351 — Pod Affinity FundamentalsLesson 1352 — Pod Anti-Affinity BasicsLesson 1353 — Topology Keys in Affinity
- Trace effective routes
- Cloud providers show which route will actually be used for a given destination IP.
- Lesson 2190 — Route Table Verification
- Trace IDs
- and **span IDs** are the identifiers that make this possible.
- Lesson 2062 — Trace Context and Propagation
- Trace list view
- lets you filter by service, latency threshold, or time range
- Lesson 2094 — Google Cloud Trace
- Traceability
- Every change is recorded with who made it, when, and why (commit messages).
- Lesson 1647 — Version Control as the Source of Truth
- TraceQL
- Use Tempo's query language to search traces by service, duration, or status
- Lesson 2092 — Tempo by Grafana
- Traceroute
- is your diagnostic flashlight that illuminates this journey, revealing each hop along the way.
- Lesson 2227 — Network Path Analysis and Traceroute
- Traces
- The journey of a single request through your distributed system.
- Lesson 49 — Observability and Monitoring ArchitectureLesson 489 — Function Logging and Execution InsightsLesson 2060 — What is Distributed Tracing
- Track against usage
- Ensure consuming resources are tagged with the amortized cost, not just the discounted on- demand rate
- Lesson 2148 — Amortizing Reserved Instance Costs
- Track escape hatch usage
- Monitor which teams use overrides and why.
- Lesson 2945 — Platform Abstractions and Escape Hatches
- Track execution state
- Store a unique identifier (like an event ID or request token) in a database before performing critical operations.
- Lesson 503 — Idempotency in Functions
- Track state
- and ensure your declared configuration matches reality
- Lesson 753 — When to Use Resources vs Data Sources
- Tracking Event Flow
- Instrument each event with correlation IDs that follow it from producer through every consumer.
- Lesson 581 — Event-Driven Monitoring and Observability
- Tracks dependencies
- (won't run Job C until A and B succeed)
- Lesson 2626 — Workflow Orchestration Tools
- Tracks Kubernetes events
- Pod creation, scheduling decisions, errors, and state changes
- Lesson 1487 — GKE Monitoring with Cloud Monitoring
- Tracks progress
- and handles dependencies (creating networks before servers, for example)
- Lesson 699 — Apply and Provisioning
- Tracks resource state
- through "deployments" (similar to CloudFormation stacks)
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Trade-off
- Passwords can be leaked, stolen, or hardcoded in application code, creating security risks.
- Lesson 407 — Database Authentication MethodsLesson 465 — Function Invocation TypesLesson 578 — Event Ordering and PartitioningLesson 628 — Metric Types: Histograms and SummariesLesson 834 — State File PartitioningLesson 1482 — GKE Release ChannelsLesson 1728 — GitLab Runners: Shared vs SpecificLesson 2473 — State Replication and Consistency Models (+3 more)
- Trade-offs
- Lesson 523 — API Gateway Deployment ModelsLesson 991 — Public vs Private RegistriesLesson 1800 — Static vs Dynamic Agent ProvisioningLesson 1861 — GitOps Repository StructuresLesson 2293 — Key Import and External Key StoresLesson 2365 — WAF Deployment ModelsLesson 2438 — Database Failover MechanismsLesson 2603 — At-Least-Once vs Exactly-Once Semantics (+1 more)
- Tradeoff
- More complex to manage state and synchronization
- Lesson 2451 — Redundancy Principles and Types
- Traditional (Mutable) Infrastructure
- Lesson 46 — Immutable Infrastructure Principles
- Traditional Push Model
- Lesson 1857 — Pull-Based Deployment Model
- Traefik
- shines with its automatic service discovery and modern dashboard.
- Lesson 1230 — Ingress Controller Options
- Traffic access control
- Service-to-service authorization policies
- Lesson 1598 — Service Mesh Interface (SMI) Standard
- Traffic analysis
- involves inspecting actual packets.
- Lesson 1630 — mTLS Troubleshooting and Verification
- Traffic anomalies
- Unexpected drops or surges in request volume that might indicate upstream failures or attacks.
- Lesson 1642 — Alerting on Service Mesh Metrics
- Traffic Baselines
- establish your normal traffic patterns: requests per second, bandwidth usage, connection counts, and geographic distribution.
- Lesson 2386 — DDoS Monitoring and Metrics
- Traffic control
- without code changes (canary deployments, A/B testing)
- Lesson 1576 — Istio Overview and Core Value Proposition
- Traffic Distribution
- A global load balancer (DNS-based like Route 53 or a service mesh) directs users to the best- performing or geographically closest cloud provider.
- Lesson 2759 — Multicloud Architecture Patterns: Active-Active
- Traffic engineering
- – Route high-volume workloads through private links, keep low-volume through VPN
- Lesson 2224 — Private Connectivity Cost Management
- Traffic Flow Control
- Segmentation lets you define explicit allow/deny rules between zones.
- Lesson 2390 — Network Segmentation Fundamentals
- Traffic flows
- → Once healthy, the instance receives user requests
- Lesson 320 — ASG Integration with Elastic Load Balancing
- Traffic interception
- All network requests to and from your application are automatically routed through the sidecar proxy first
- Lesson 1566 — The Sidecar Proxy Pattern
- traffic management
- through SMI TrafficSplit resources, **observability** via metrics and tracing, and **access control** policies.
- Lesson 1596 — Open Service Mesh (OSM) BasicsLesson 1599 — Cilium Service Mesh with eBPFLesson 2584 — Service Mesh for Communication Management
- Traffic Management (formerly Pilot)
- Lesson 1577 — Istio Control Plane Components
- Traffic management complexity
- How do services discover each other?
- Lesson 1576 — Istio Overview and Core Value Proposition
- Traffic management needs
- like canary deployments that would be harder to implement otherwise
- Lesson 1573 — Service Mesh Performance Overhead
- Traffic metrics
- collection and reporting
- Lesson 1566 — The Sidecar Proxy PatternLesson 1598 — Service Mesh Interface (SMI) Standard
- Traffic mirroring
- Shadow production traffic through policy checks without impacting users
- Lesson 1629 — Security Policies Best Practices
- Traffic patterns
- Predictable workloads suit reserved instances; variable loads benefit from auto-scaling services
- Lesson 110 — Compute Service Selection Criteria
- Traffic routing
- (canary deployments, A/B testing)
- Lesson 1578 — Istio Data Plane and Envoy ProxiesLesson 2453 — Geographic Distribution and Multi- Region Design
- traffic shifting
- splitting traffic between two versions (e.
- Lesson 486 — Function Versions and AliasesLesson 1835 — Blue/Green Deployments with CodeDeploy
- Traffic spikes
- – Unexpected load increases shouldn't trigger cascading failures
- Lesson 2460 — Capacity Planning for High AvailabilityLesson 2740 — Understanding Backpressure in Distributed Systems
- Traffic split
- Weighted routing for canary deployments
- Lesson 1598 — Service Mesh Interface (SMI) Standard
- Traffic Splitting
- and **Blue-Green Deployments**, but offers more granular control and risk reduction through incremental rollout.
- Lesson 1665 — Canary Deployment Pattern
- Traffic visibility
- Security teams can observe patterns without decrypting at the application
- Lesson 1617 — Service Mesh Security Overview
- Training Period
- The system analyzes weeks of historical data to build a model of normal behavior
- Lesson 644 — Anomaly Detection Alarms
- Transaction Log Analysis
- Verify that transaction sequence numbers match between primary and replica databases.
- Lesson 2444 — Data Consistency Validation
- Transactional Applications
- Any workload needing frequent random read/write operations
- Lesson 113 — Block Storage Overview
- Transactional workloads
- Applications requiring frequent, random read/write operations
- Lesson 124 — Block Storage Overview
- Transfer
- Use managed services or insurance to shift risk burden
- Lesson 2803 — Risk Assessment and Mitigation
- Transform
- logs from one format to another (e.
- Lesson 1435 — Logging with Sidecar ContainersLesson 2647 — Glue ETL Script Development
- Transformation
- Lesson 527 — API Gateway Request Flow
- Transformations
- are Grafana's post-query processing tools that let you manipulate data *after* it's retrieved but *before* it's displayed.
- Lesson 1999 — Transformations and Data Processing
- Transient failures
- Set `failureThreshold: 5` to avoid false positives during brief hiccups
- Lesson 1426 — Probe Timing Parameters
- transit gateway
- acts like a central airport hub that connects multiple destinations.
- Lesson 218 — Transit Gateway ConceptsLesson 2208 — Transit Gateway for Hybrid Networks
- Transit patterns
- define the network architecture that interconnects your clouds—either through a centralized hub (hub-and-spoke) or direct connections between every pair (mesh).
- Lesson 2781 — Multicloud Transit Patterns
- Transition
- older versions to cheaper storage classes (move 30-day-old versions to cold storage)
- Lesson 157 — Versioning Lifecycle and MFA Delete
- Transitions
- Connections between stages that can be enabled/disabled to control flow.
- Lesson 1814 — CodePipeline: Orchestration Service OverviewLesson 1838 — CodePipeline Architecture and Components
- Translates
- your declarative configuration into API calls
- Lesson 724 — Installing Terraform and Provider BasicsLesson 1221 — Ingress Controller Architecture
- Translates to
- Lesson 2337 — Compliance Requirements Translation
- Translating rules into Rego
- policy files that parse infrastructure JSON/HCL
- Lesson 2886 — Compliance Testing with Open Policy Agent
- Transparency First
- Make cost data visible and accessible to all teams.
- Lesson 2952 — Building a FinOps Culture
- Transparent operation
- Your application code remains unchanged—it thinks it's talking directly to other services
- Lesson 1566 — The Sidecar Proxy Pattern
- Transparent Roadmap
- Share what the platform team is building so developers can align contributions or propose alternatives.
- Lesson 2944 — Inner Source and Contribution Models
- transparently
- no static passwords stored anywhere.
- Lesson 2262 — Dynamic Secrets FundamentalsLesson 2302 — Storage Volume Encryption
- Tree-Shaking
- Modern bundlers like Webpack or esbuild can analyze your code and eliminate unused exports from libraries.
- Lesson 2546 — Package Size Optimization
- Trend detection
- Build time-series models to forecast spending or spot anomalies
- Lesson 2172 — AWS Cost and Usage Reports
- Trend-Based Alerts
- Instead of just absolute values, monitor *rate of change*.
- Lesson 457 — Monitoring and Alerting for Performance
- trigger
- to wake them up.
- Lesson 506 — AWS Lambda: Event Sources and TriggersLesson 511 — Azure Functions: Bindings and TriggersLesson 1652 — Pipeline Triggers and Events
- Trigger `workflow_dispatch` events
- programmatically from scripts or external tools
- Lesson 1724 — GitHub Actions APIs and Webhooks
- Triggering condition
- When to use this procedure (alert name, symptoms)
- Lesson 2130 — Runbooks and Playbooks
- Triggering Controlled Failures
- Deliberately shutting down primary databases, killing application instances, or simulating regional outages to force failover activation.
- Lesson 2488 — Failover Testing and Validation
- Triggering Pipelines
- You can start a pipeline via API POST request to `/projects/:id/trigger/pipeline` using a pipeline trigger token.
- Lesson 1769 — GitLab CI API and Automation
- triggers
- define *how* a function starts, while **bindings** define *what data flows in and out*.
- Lesson 511 — Azure Functions: Bindings and TriggersLesson 1889 — ArgoCD Notifications and WebhooksLesson 1915 — Notification and Alerting IntegrationLesson 2648 — Glue Job Triggers and Workflows
- Troubleshoot connectivity
- Discover why connections fail (rejected packets, wrong routes)
- Lesson 213 — Network Security Logging and Monitoring
- Troubleshoot precisely
- Destroy and recreate a problematic resource without disrupting everything else
- Lesson 708 — Targeted Operations
- Troubleshooting
- Diagnose network issues by analyzing actual packet contents
- Lesson 229 — VPC Traffic MirroringLesson 652 — What Are Logs and Why They MatterLesson 2186 — DNS Query Logging and Analysis
- Troubleshooting challenges
- that observability features solve faster than the latency hurts
- Lesson 1573 — Service Mesh Performance Overhead
- Troubleshooting specific failed requests
- beyond what metrics show
- Lesson 1637 — Access Logging in Service Mesh
- Troubleshooting workflow
- When a pipeline fails, start at the stage level, identify the red (failed) job, click into its log, and scroll to the bottom.
- Lesson 1739 — Pipeline Visualization and Job Logs
- True portability
- Same gateway config works on AWS, Azure, GCP, or bare metal
- Lesson 2772 — API Gateway Abstraction
- Trunk-based
- suits teams with strong automation and testing, prioritizing velocity.
- Lesson 1867 — Branching Strategies for GitOps
- Trunk-Based Development
- means developers commit small, frequent changes directly to a single main branch (the "trunk").
- Lesson 1668 — Trunk-Based vs GitFlow Patterns
- trust policy
- that says "Account A can assume this role"
- Lesson 354 — Cross-Account RolesLesson 355 — Role Trust PoliciesLesson 379 — AWS IAM Roles and Trust PoliciesLesson 1819 — IAM Roles and Permissions for Code Services
- Trust zones
- are areas within these boundaries where resources share similar security requirements, risk profiles, and access policies.
- Lesson 2841 — Security Boundaries and Trust Zones
- Trusted Committers
- Designate experienced contributors who can review and merge changes, scaling beyond just the core platform team.
- Lesson 2944 — Inner Source and Contribution Models
- TTL
- defines how long cached content remains valid before the CDN checks for updates.
- Lesson 2671 — CDN Caching Fundamentals Review
- TTL (Time-to-Live)
- and **cache-control headers** come in—they're instructions that tell the CDN (and browsers) how long to store content before fetching a fresh copy.
- Lesson 587 — TTL and Cache Control HeadersLesson 2265 — Vault Leases and Revocation
- TTL matters
- Store deduplication keys only as long as duplicates might realistically arrive (minutes to hours)
- Lesson 2734 — Event Deduplication Strategies
- TTL support
- Sessions auto-expire using built-in time-to-live
- Lesson 2693 — Session Store and User State Caching
- Tuples
- are like lists but with a fixed sequence of specific types:
- Lesson 818 — Working with Complex Variable Types
- two parts
- Lesson 348 — Access Keys and Programmatic AccessLesson 1221 — Ingress Controller Architecture
- Two Provisioning Methods
- Lesson 1289 — PersistentVolume (PV) Fundamentals
- two ways
- Lesson 199 — Internet Connectivity CostsLesson 2243 — Azure Key Vault Access Policies and RBACLesson 2315 — Azure Key Vault Access Policies and RBAC
- Tyk
- use standard configuration formats (YAML, CRDs) and can run on any Kubernetes cluster, regardless of cloud provider.
- Lesson 2772 — API Gateway Abstraction
- Type Conversion
- Lesson 1539 — Template Functions
- Type conversion functions
- transform data from one type to another
- Lesson 736 — Built-in Functions Overview
- Type Providers
- are Deployment Manager's mechanism for connecting to *any* REST API that supports CRUD operations (Create, Read, Update, Delete).
- Lesson 958 — Type Providers and External APIs
- Type Safety
- Compile-time errors catch mismatches between services before deployment.
- Lesson 2572 — gRPC for High-Performance Communication
U
- UDP floods
- Send large volumes of UDP packets to random ports
- Lesson 2378 — DDoS Attack Types and Vectors
- UDP traffic
- DNS queries, gaming protocols, streaming media
- Lesson 261 — What is a Network Load Balancer (NLB)?
- Ultimate disaster recovery
- A complete outage or data corruption at your primary cloud provider won't affect backups stored elsewhere.
- Lesson 2788 — Multicloud Backup and Archive
- Ultra-Low Latency
- Because NLBs don't parse application data, they add microseconds (not milliseconds) to connection time.
- Lesson 235 — Network Load Balancers (Layer 4)Lesson 271 — NLB Use Cases and Patterns
- UltraSSD_LRS
- Ultra-high performance SSD for mission-critical workloads
- Lesson 1311 — Azure Disk StorageClasses
- Unattached EBS volumes
- or disks lingering after instance termination
- Lesson 2160 — Idle Resource Detection
- Unattached resources
- Persistent disks not connected to any VM
- Lesson 2180 — GCP Recommender and Cost Insights
- Unauthorized access
- Attackers gain entry to databases, APIs, or cloud accounts
- Lesson 2237 — Introduction to Secrets Management in Cloud
- Under-provisioning
- causes performance issues.
- Lesson 33 — Cloud Cost Optimization: Right-Sizing ResourcesLesson 286 — What is Auto ScalingLesson 2155 — Auto Scaling for Cost Efficiency
- Understand blast radius
- See which services would be affected if one fails
- Lesson 1639 — Service Dependency Mapping
- Underutilized virtual machines
- that could be downsized or shut down
- Lesson 2175 — Azure Budgets and Advisor
- Uneven memory
- Rebalance Redis Cluster or adjust partitioning
- Lesson 2695 — Cache Monitoring and Performance Metrics
- Unfair resource allocation
- – aggressive clients starving others
- Lesson 2744 — Rate Limiting Fundamentals
- unhealthy
- and removed from the rotation.
- Lesson 239 — Health Checks and Target MonitoringLesson 2465 — Stateless Service Health Checks
- Unhealthy threshold
- Consecutive failures needed to mark target unhealthy
- Lesson 239 — Health Checks and Target MonitoringLesson 251 — Health Check Configuration for ALBsLesson 268 — NLB Health Checks
- Unified configuration
- ConfigMaps, Secrets, and Namespaces synchronized across clusters
- Lesson 1514 — Cluster Federation Basics
- Unified Interface
- Query traces alongside logs (Loki) and metrics (Prometheus) in a single pane
- Lesson 2092 — Tempo by Grafana
- Unified Model
- One configuration language and runtime for logs, metrics, and traces.
- Lesson 2041 — Vector Log Processing Pipeline
- Unified security policies
- mTLS encryption and authorization rules defined once, enforced everywhere
- Lesson 2769 — Service Mesh for Portability
- Unified storage
- for all data types: structured tables, semi-structured JSON, unstructured images
- Lesson 2629 — Data Lakehouse Architecture
- Unified tagging strategies
- that work across accounts, enabling better cost allocation to cost centers (as you learned previously)
- Lesson 2147 — Multi-Account Cost Consolidation
- Unified Tooling
- Use the same monitoring, logging, deployment, and configuration management tools across both environments.
- Lesson 2815 — Hybrid Operations and Coexistence
- Unified view
- Connect multiple data sources (Prometheus, Loki, Tempo, databases) in a single interface
- Lesson 1991 — Introduction to Grafana and Its Role in Observability
- Unified visibility
- Search across all systems from one interface
- Lesson 657 — Centralized Logging Concepts
- Uniform mode
- All VMs are identical, created from the same configuration.
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) FundamentalsLesson 325 — VMSS Instance Protection and Orchestration Modes
- Unintended public access
- Resources accidentally exposed to the internet
- Lesson 372 — Access Analyzer for Policy Review
- Unique Features
- Native delay queues, message timers up to 15 minutes, visibility timeout up to 12 hours
- Lesson 2725 — Provider-Specific Queue Services
- Unit testing
- verifying individual resource configurations
- Lesson 2875 — Introduction to Infrastructure Testing
- Unit Tests (Base)
- Lesson 2876 — Testing Pyramid for Infrastructure
- Universal mode
- on VMs, where it manages service connectivity without requiring containers or orchestrators.
- Lesson 1597 — Kuma Service Mesh Introduction
- Unix user/group database
- – leverages system accounts
- Lesson 1781 — Jenkins User Management and Security
- Unknown
- ArgoCD cannot determine status (connection issues, missing permissions)
- Lesson 1885 — Application Health and Sync StatusLesson 1900 — Health Assessment
- Unlike Terraform
- Cloud-specific rather than multi-cloud; no separate state file management needed
- Lesson 935 — Introduction to Google Cloud Deployment Manager
- Unlock Jenkins
- On first launch, Jenkins generates a random administrator password stored in a file on the server.
- Lesson 1772 — Installing and Configuring Jenkins
- Unnecessary artifacts
- temporary files accidentally committed to layers
- Lesson 986 — Inspecting Image Layers
- Unnecessary computations
- – work done on every invocation that could be cached
- Lesson 2547 — Execution Duration Optimization
- Unnecessary dependencies
- Installing full package suites when you only need one tool.
- Lesson 985 — Layer Size and Bloat
- Unpacking each layer
- The scanner extracts files from every layer in the image manifest
- Lesson 1073 — Image Scanning Fundamentals
- Unpredictable workloads
- You don't know how long you'll need the resources
- Lesson 73 — On-Demand Pricing Model
- Unsealed
- Vault can decrypt its master key and operate normally
- Lesson 2253 — Vault Architecture and Components
- Unsealing
- Requires providing key shares (using Shamir's Secret Sharing) or using auto-unseal with cloud KMS
- Lesson 2253 — Vault Architecture and Components
- Unstructured logs
- are plain text messages that humans write naturally but machines struggle to parse consistently.
- Lesson 654 — Structured vs Unstructured LogsLesson 2006 — Structured vs Unstructured Logs
- Until Loop
- Repeat activities until a condition is met
- Lesson 2650 — ADF Pipeline Activities and Control Flow
- Unusual access patterns
- – Login from new geographic locations, API calls outside normal hours, or suddenly accessing resources a user never touches before.
- Lesson 2356 — Real-Time Audit Log Monitoring
- Unusual access times
- API calls from your admin account at 3 AM
- Lesson 2865 — CloudTrail and Audit Logging for Security
- Unzip
- the archive to extract the `terraform` binary
- Lesson 724 — Installing Terraform and Provider Basics
- update
- a resource in-place.
- Lesson 772 — Reading Plan OutputLesson 878 — Stack Updates and Change SetsLesson 941 — Deployment Lifecycle Operations
- Update code
- If the drift was intentional, import the changes into your Terraform configuration
- Lesson 842 — Drift Detection and Remediation
- Update credentials
- regularly and enforce rotation policies
- Lesson 346 — Creating and Managing User Identities
- Update frequency
- Rapidly changing data makes strong consistency expensive
- Lesson 2709 — Cache Consistency and Trade-offs
- Update results
- Emit corrected aggregations (allowed triggers in systems like Apache Flink/Beam)
- Lesson 2606 — Watermarks and Late Data
- Update route tables
- in public subnets to direct internet-bound traffic (`0.
- Lesson 187 — Internet Gateway FundamentalsLesson 217 — VPC Peering Routing and Limitations
- Update routing rules
- to direct that feature's traffic to the new implementation
- Lesson 2514 — Strangler Fig Pattern for Migration
- Update values
- Replace old endpoints with new cloud resource identifiers
- Lesson 2828 — Connection String and Configuration Updates
- Update your applications
- to use the new key ID for encryption
- Lesson 2311 — AWS KMS Key Rotation and Aliasing
- Updated timestamp
- Lesson 1531 — Release History and Status
- Updater
- Decides which pods need updates based on recommendations
- Lesson 1455 — Vertical Pod Autoscaler (VPA) Basics
- Updates
- Modify individual components without touching everything
- Lesson 881 — Nested StacksLesson 901 — Template Deployment ModesLesson 1221 — Ingress Controller ArchitectureLesson 1775 — Jenkins Plugins and Extensibility
- Updates (In-Place or Replacement)
- Lesson 739 — Resource Blocks and the Resource Lifecycle
- Updates kubeconfig
- merges this configuration into your `~/.
- Lesson 1497 — Connecting to AKS with kubectl
- Upgradability
- Update monitoring tools or networking policies without rebuilding application containers.
- Lesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Upgrade policy
- How updates roll out (automatic, rolling, or manual)
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- Upgrading a release
- applies changes without redeploying from scratch:
- Lesson 1526 — Helm Releases: Managing Deployments
- Upload mode
- – Monitors Prometheus's TSDB directory and uploads completed blocks
- Lesson 1983 — Thanos Sidecar and Object Storage
- Upload parts
- You break your file into chunks (minimum 5MB each, except the last part) and upload them independently—even in parallel
- Lesson 166 — Multipart Upload
- Upside
- You never have two versions running simultaneously, which simplifies state management and resource conflicts.
- Lesson 1168 — Recreate Strategy
- Upstream Jobs
- trigger when another Jenkins job completes successfully:
- Lesson 1789 — Triggers and Automated Execution
- Uptime Checks
- act as external monitors that ping your services from multiple locations worldwide.
- Lesson 680 — Cloud Monitoring in GCP
- URI Path
- Block requests to `/admin` from unauthorized IPs, or patterns like `/.
- Lesson 2375 — Custom Rules and Request Inspection
- URL path
- of an incoming request and route it to different target groups based on patterns you define.
- Lesson 249 — Path-Based Routing
- URL paths
- Route `/api/*` requests to API servers, `/images/*` to media servers
- Lesson 236 — Application Load Balancers (Layer 7)Lesson 275 — Content-Based Routing and Path Rules
- URL versioning
- `/v1/orders`, `/v2/orders` (explicit, easy to route)
- Lesson 2571 — RESTful API Design for Microservices
- Usage
- Delete images never pulled in the last 30 days
- Lesson 1082 — Image Retention and Lifecycle PoliciesLesson 1779 — Jenkins Build Agents and Executors
- Usage analytics
- tracking which self-service capabilities get adopted versus ignored
- Lesson 2946 — Feedback Loops and User Research
- Usage-based
- Allocate by measurable consumption (e.
- Lesson 2149 — Shared Services Cost AllocationLesson 2967 — Shared Cost Allocation
- Use `.env` files
- Store environment-specific variables separately, never hardcode secrets in compose files.
- Lesson 1059 — Compose Best Practices and Limitations
- Use `depends_on` sparingly
- only when implicit dependencies don't capture the true relationship.
- Lesson 822 — Implicit and Explicit Dependencies
- Use `when:`
- to control artifact capture (`on_success`, `on_failure`, `always`)
- Lesson 1746 — Job Artifacts
- Use aggressive scale-in policies
- While you want to scale out quickly to handle spikes, you can often scale in more aggressively during quiet periods.
- Lesson 311 — Scaling for Cost Optimization
- Use appropriate runtimes
- Compiled languages (Go, Rust) typically execute faster than interpreted ones
- Lesson 2983 — Serverless Cost Optimization Patterns
- Use appropriate sampling strategies
- from your earlier lessons.
- Lesson 2087 — Best Practices and Performance Considerations
- Use appropriate storage tiers
- Archive rarely-accessed data to cheaper storage classes
- Lesson 2165 — Cost-Aware Architecture Patterns
- Use approximate functions
- like `approx_distinct()` when precision isn't critical
- Lesson 2662 — Athena Performance Optimization
- Use artifacts when
- Lesson 1738 — Cache vs Artifacts: Performance Optimization
- Use Autopilot
- for standard containerized applications where simplicity and cost efficiency matter more than infrastructure control.
- Lesson 1476 — GKE Cluster Types: Standard vs Autopilot
- Use Azure Hybrid Benefit
- if you have existing Windows Server licenses to reduce costs.
- Lesson 1504 — AKS Cost Management and Cluster Sizing
- Use Block Storage when
- Lesson 123 — Comparing Storage Types: When to Use What
- Use case
- URL rewriting, authentication checks, A/B testing redirects, bot detection.
- Lesson 618 — Edge Function Triggers and EventsLesson 2176 — Azure Cost Exports and APIsLesson 2202 — Direct Connect Virtual InterfacesLesson 2254 — Vault Deployment ModelsLesson 2429 — Continuous Data Protection (CDP)Lesson 2711 — Queue Types and SemanticsLesson 2744 — Rate Limiting Fundamentals
- Use cases
- Edge functions excel at request manipulation, authentication checks, and A/B testing; regional functions handle complex business logic
- Lesson 612 — Introduction to Edge FunctionsLesson 2521 — Parallel and Map States
- Use Chargeback when
- Lesson 2146 — Showback vs Chargeback ModelsLesson 2966 — Showback vs Chargeback Models
- Use cluster autoscaler
- Automatically adds/removes nodes based on pending Pods
- Lesson 1489 — GKE Cost Optimization and Bin Packing
- Use complete when
- You want the resource group to contain *only* what's in your template—nothing more, nothing less.
- Lesson 901 — Template Deployment Modes
- Use composite alarms
- Instead of five separate alerts for related problems (high CPU, memory pressure, disk I/O, network saturation, error rate), create one composite alarm that triggers when multiple conditions indicate a real issue.
- Lesson 651 — Alarm Best Practices and Anti-Patterns
- Use conditional operations
- Many databases support conditional writes (e.
- Lesson 503 — Idempotency in Functions
- Use connection pooling
- to reduce reconnection overhead
- Lesson 2251 — Secrets Management Cost Optimization
- Use consistent formats
- Standardize date formats like `year=YYYY/month=MM/day=DD` for predictable paths.
- Lesson 2661 — Athena Partitioning Strategies
- Use consistent verb forms
- Lesson 633 — Metric Namespaces and Naming Conventions
- Use CSI provisioners
- for all new deployments—they're the future
- Lesson 1316 — Provisioner Selection and Configuration
- Use digests
- for production deployments, security audits, and guaranteed reproducibility (`docker pull myapp@sha256:a1b2c3d4.
- Lesson 983 — Image Tags vs Digests
- Use efficient data structures
- Arrays and objects work fine, but avoid nested loops or recursive operations.
- Lesson 622 — Edge Function Performance Optimization
- Use ephemeral storage for
- Lesson 111 — Storage Fundamentals: Persistence and Volatility
- Use external provisioners
- only for non-cloud or specialized storage needs
- Lesson 1316 — Provisioner Selection and Configuration
- Use field names
- whenever possible instead of free-text search—this leverages indexing
- Lesson 2030 — Kibana Query Language (KQL)
- Use File Storage when
- Lesson 123 — Comparing Storage Types: When to Use What
- Use Fluent Bit when
- Lesson 2038 — Fluentd and Fluent Bit Overview
- Use Fluentd when
- Lesson 2038 — Fluentd and Fluent Bit Overview
- Use folders and tags
- Organize dashboards into logical folders by team, service, or environment.
- Lesson 2003 — Grafana Best Practices and Performance
- Use full
- images for development or when troubleshooting requires system utilities
- Lesson 1024 — Base Image Selection
- Use incremental when
- You're adding new resources or updating specific ones without disturbing the rest of your infrastructure.
- Lesson 901 — Template Deployment Modes
- Use Ingress
- when serving HTTP/HTTPS traffic for multiple services, need path/host routing, SSL termination, or want cost efficiency at scale.
- Lesson 1220 — Ingress vs Service Load Balancing
- Use Kubernetes/Containers when
- Lesson 2568 — Hybrid Microservice Deployments
- Use layers
- (covered in lesson 484) – Extract common dependencies into reusable layers instead of bundling them in every function.
- Lesson 485 — Function Packaging and Deployment Size
- Use LoadBalancer
- when you need simple TCP/UDP routing, non-HTTP protocols, or have just one service to expose.
- Lesson 1220 — Ingress vs Service Load Balancing
- Use numeric UIDs
- (like `USER 1000`) for better compatibility across systems
- Lesson 1011 — USER: Running as Non-Root
- Use Object Storage when
- Lesson 123 — Comparing Storage Types: When to Use What
- Use On-Demand for flexibility
- cover unexpected traffic spikes, testing environments, or workloads with unpredictable patterns.
- Lesson 80 — Pricing Model Selection Strategy
- Use OrderedReady when
- Your application requires one instance to be fully operational before starting the next—like a database cluster where the primary must initialize before replicas can join.
- Lesson 1184 — StatefulSet Pod Management Policies
- Use Parallel when
- Your stateful pods are independent and can initialize concurrently—like multiple cache instances that don't need coordination.
- Lesson 1184 — StatefulSet Pod Management Policies
- Use parentheses
- for complex logic: `(status: 404 or status: 500) and environment: "production"`
- Lesson 2030 — Kibana Query Language (KQL)
- Use pay-as-you-go
- for unpredictable, variable, or short-term workloads
- Lesson 31 — Reserved Capacity and Savings Plans
- Use persistent storage for
- Lesson 111 — Storage Fundamentals: Persistence and Volatility
- Use production-only dependencies
- Development tools, testing frameworks, and debug utilities shouldn't ship with your function.
- Lesson 496 — Dependency Management
- Use recording rules
- For complex or frequently-used PromQL queries, create Prometheus recording rules to pre- compute results.
- Lesson 2003 — Grafana Best Practices and Performance
- Use reserved capacity
- when you know exactly what resources you'll need long-term
- Lesson 31 — Reserved Capacity and Savings Plans
- Use savings plans
- when you're confident about total spending but want flexibility in *how* you spend it
- Lesson 31 — Reserved Capacity and Savings Plans
- Use Serverless when
- Lesson 2568 — Hybrid Microservice Deployments
- Use Showback when
- Lesson 2146 — Showback vs Chargeback ModelsLesson 2966 — Showback vs Chargeback Models
- Use sparingly in production
- they create massive volume and noise.
- Lesson 2007 — Log Levels and Severity
- Use staging accounts
- Run integration tests in dedicated test AWS accounts or GCP projects, never in production.
- Lesson 2882 — Integration Testing Strategies
- Use Standard
- when you need node-level customization, specific machine types, GPUs, or have workloads requiring privileged containers or host access.
- Lesson 1476 — GKE Cluster Types: Standard vs Autopilot
- Use tags
- for development, human communication, and convenient references (`docker pull myapp:latest`)
- Lesson 983 — Image Tags vs Digests
- Use temporary credentials
- when possible (covered in earlier lessons on temporary vs permanent credentials)
- Lesson 348 — Access Keys and Programmatic Access
- Use time bounds aggressively
- always specify the smallest reasonable time window.
- Lesson 2097 — Query Performance and Indexing
- Use Vary when
- Lesson 2673 — Vary Header and Cache Keys
- Use VPC endpoints
- instead of NAT Gateways when accessing cloud services (covered later)
- Lesson 199 — Internet Connectivity Costs
- Use What-If Operations
- As you've learned, What-If previews changes before applying them—make this standard practice to avoid surprises in production.
- Lesson 919 — ARM Template Best Practices and Validation
- Use when
- Compliance, latency, or data locality requirements are absolute.
- Lesson 1354 — Required vs Preferred Pod AffinityLesson 1897 — Manual Sync and Sync StrategiesLesson 2281 — Symmetric vs Asymmetric EncryptionLesson 2644 — AWS Glue Job Types and Execution
- User access management
- Lesson 2329 — Cloud Provider Compliance Certifications
- User accesses resources
- using those short-lived credentials
- Lesson 395 — Cross-Provider IAM Federation
- User Agent
- Send mobile users to a mobile-optimized version
- Lesson 1608 — A/B Testing and Experimentation
- User Data
- is custom information *you provide* at launch time.
- Lesson 56 — VM Metadata and User DataLesson 81 — VM Launch Process and InitializationLesson 86 — Instance Metadata ServiceLesson 95 — AWS EC2 User Data and Metadata ServiceLesson 100 — Azure VM Extensions and Custom Script
- User ID
- All events for user `123` stay ordered, but different users process in parallel
- Lesson 578 — Event Ordering and Partitioning
- user identity
- is a digital representation of a real person within your cloud IAM system.
- Lesson 346 — Creating and Managing User IdentitiesLesson 2848 — Continuous Verification and Contextual Access
- User namespace
- Maps container user IDs to different host user IDs for security.
- Lesson 963 — Process Isolation with Namespaces
- user node pools
- for your application workloads, each tailored for specific needs (CPU-intensive, GPU-enabled, memory-optimized, etc.
- Lesson 1494 — AKS Node Pools and VM Scale SetsLesson 1495 — System vs User Node PoolsLesson 1504 — AKS Cost Management and Cluster Sizing
- User uploads
- Standard tier with volume expansion enabled
- Lesson 1314 — Multiple StorageClasses Strategy
- User-assigned managed identities
- are standalone resources you create once and can assign to *multiple* Azure resources.
- Lesson 389 — Azure Managed Identities
- User-defined metadata
- (custom attributes) is information *you* attach to objects.
- Lesson 142 — Object Metadata and Custom Attributes
- UserData
- to be Base64-encoded before it's passed to the instance.
- Lesson 875 — Fn::Base64 and UserData
- Username and password
- Basic credentials, often for human users
- Lesson 992 — Registry Authentication and Authorization
- Username or email
- – The unique identifier for this person
- Lesson 346 — Creating and Managing User Identities
- Userpass
- Username and password authentication for human users.
- Lesson 2256 — Vault Authentication Methods Overview
- Users
- Individual people (developers, admins)
- Lesson 333 — IAM Core Concepts: Identities and ResourcesLesson 345 — Users vs Service AccountsLesson 1132 — Kubeconfig Files and ContextsLesson 1376 — Subjects in RBACLesson 1381 — RoleBinding FundamentalsLesson 2834 — Principle of Least Privilege
- Using cross-region replication sparingly
- Copying snapshots to other regions doubles storage costs (one copy per region).
- Lesson 426 — Backup Storage and Costs
- Utilization rates
- Are existing RIs fully consumed?
- Lesson 2976 — Reserved Instance Portfolio ManagementLesson 2988 — Optimization Metrics and KPIs
- UTS namespace
- Containers can have their own hostname and domain name.
- Lesson 963 — Process Isolation with Namespaces
V
- Valid configurations
- should pass evaluation without violations.
- Lesson 2899 — Policy Testing and Validation
- Validate
- that your multi-AZ deployments and replication actually work
- Lesson 2490 — Introduction to Chaos EngineeringLesson 2879 — Unit Testing IaC with Terratest
- Validate and expand
- Once stable, repeat for the next boundary
- Lesson 2598 — Strangler Fig Pattern for Migration
- Validate architecture
- Confirm services communicate as designed
- Lesson 1639 — Service Dependency Mapping
- Validate Before Deploy
- Always use `az deployment group validate` or the Portal's validation feature before actual deployment.
- Lesson 919 — ARM Template Best Practices and Validation
- Validate connectivity
- Test connections before cutover using feature flags or parallel runs
- Lesson 2828 — Connection String and Configuration Updates
- Validate DNS
- Ensure hybrid DNS resolution works correctly
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Validate propagation
- If using dynamic routing (BGP) or route propagation from VPN/transit gateways, ensure routes are appearing as expected.
- Lesson 2190 — Route Table Verification
- Validate the entire chain
- Lesson 650 — Alarm Testing and Validation
- Validate your hypothesis
- against a realistic system without customer impact
- Lesson 2494 — Chaos Experiments in Non-Production
- Validating
- admission controllers execute (in undefined order among themselves)
- Lesson 1406 — Admission Controller Types
- Validating admission controllers
- inspect requests and approve or reject them based on policy rules.
- Lesson 1406 — Admission Controller Types
- validating admission webhook
- in your cluster.
- Lesson 1413 — OPA Gatekeeper ArchitectureLesson 2893 — OPA Integration Patterns
- Validating controllers
- Approve or reject requests based on rules (example: "No privileged pods allowed")
- Lesson 1405 — Admission Control Overview
- Validating RPO
- Verify how much data (if any) was lost during the failover.
- Lesson 2488 — Failover Testing and Validation
- Validation
- Check syntax and formatting automatically on every commit
- Lesson 709 — Workflow Automation and CI/CD IntegrationLesson 903 — Template Validation and What- If OperationsLesson 1102 — API Server: The Cluster GatewayLesson 1264 — Secret Types and Use CasesLesson 1923 — Kustomize Controller FundamentalsLesson 2351 — Enabling and Configuring Audit LogsLesson 2443 — Failback Procedures
- Validation checks
- How to confirm the fix worked
- Lesson 2130 — Runbooks and PlaybooksLesson 2906 — Automated DR Test Frameworks
- Validation tools
- Comparing source and target data integrity
- Lesson 2806 — Database Migration Service Fundamentals
- Validation windows
- you can test the target database with live data before cutover
- Lesson 2825 — Continuous Data Replication for Databases
- value
- expression—usually referencing a deployed resource's properties.
- Lesson 899 — Outputs for Template ResultsLesson 943 — Deployment OutputsLesson 1363 — Defining Tolerations in Pod SpecsLesson 1369 — PriorityClass ResourcesLesson 1948 — Time-Series Data Model
- Variable budgets
- Percentage-based targets ("10% growth month-over-month")
- Lesson 2972 — Budget Management and Alerts
- Variable substitution
- Reference your host machine's environment or `.
- Lesson 1051 — Environment Variables and ConfigurationLesson 2109 — Contextual Links and Drill-Down
- Variable traffic
- Handle sudden traffic spikes without committing to permanent capacity
- Lesson 73 — On-Demand Pricing Model
- Variables
- `environment_name`, `instance_count`, `vpc_cidr_block`
- Lesson 713 — Naming Conventions and StandardsLesson 894 — ARM Template Structure and JSON SyntaxLesson 898 — Variables for Template SimplificationLesson 926 — Variables and Expressions
- Varied Networking Models
- Setting up VPC peering in AWS differs fundamentally from VNet peering in Azure.
- Lesson 2756 — Multicloud Challenges: Complexity and Management Overhead
- Vault Agent Injector
- is a Kubernetes mutating admission webhook controller that intercepts pod creation requests and automatically injects **sidecar containers** and **init containers** into your pods based on annotations.
- Lesson 2275 — Vault Agent Injector for KubernetesLesson 2279 — Secrets Rotation in Containers
- Vault returns a token
- with appropriate permissions
- Lesson 2258 — AppRole Authentication for Applications
- VCS Integration
- connects your Git repository directly to a workspace.
- Lesson 836 — Terraform Cloud for Team Collaboration
- Vendor flexibility
- Avoid lock-in by maintaining presence across multiple platforms
- Lesson 1099 — Cross-Provider Registry Integration
- Vendor lock-in
- means the cost and complexity of switching providers becomes prohibitively high because your architecture is tightly coupled to one ecosystem.
- Lesson 2753 — Multicloud Benefits: Risk Mitigation and Vendor Lock-In
- Vendor lock-in avoidance
- No single provider controls your entire infrastructure, preserving negotiating power and preventing dependency on proprietary services.
- Lesson 2751 — What is Multicloud and Why Organizations Adopt It
- Vendor Solutions
- (NetApp Trident, Pure Service Orchestrator, Dell CSI)
- Lesson 1327 — CSI Driver Selection and Comparison
- Vendor-Neutral
- You're not locked into one cloud provider's tooling, making migrations and multi-cloud strategies feasible.
- Lesson 723 — What is Terraform and Why Use It
- Verification
- You can confirm no one tampered with the image during transport
- Lesson 982 — Image Digest and Content AddressingLesson 2443 — Failback Procedures
- Verification Phase
- After provisioning, Kitchen runs validation tests (often using InSpec) against the deployed infrastructure to verify it meets your requirements.
- Lesson 2880 — Kitchen-Terraform for Module Testing
- Verify continuously
- Authentication and authorization happen per-session, not just at connection time
- Lesson 2393 — Zero Trust Network Access (ZTNA)
- Verify recovery
- Watch the controller sync your cluster back to the stable state
- Lesson 1873 — Rollback and Recovery
- Verify route propagation
- Check route tables on both sides
- Lesson 2210 — Hybrid Network Monitoring and Troubleshooting
- Verify service identity
- Ensure Service A is really talking to Service B, not an imposter
- Lesson 1618 — Mutual TLS (mTLS) Fundamentals
- Version
- Identifies which policy language version to use.
- Lesson 361 — Policy Structure and SyntaxLesson 486 — Function Versions and AliasesLesson 570 — Event Schema DesignLesson 1399 — Pod Security Admission ControllerLesson 1552 — Chart Dependencies and RequirementsLesson 1824 — Buildspec File Structure and SyntaxLesson 2242 — Azure Key Vault FundamentalsLesson 2734 — Event Deduplication Strategies
- Version compatibility
- Add-ons are tested with specific EKS versions, preventing incompatibility issues
- Lesson 1469 — EKS Add-ons Overview
- Version Control
- Since infrastructure is code, you can store it in version control systems (like Git).
- Lesson 47 — Infrastructure as Code PhilosophyLesson 403 — Database Parameter GroupsLesson 955 — Creating Custom Composite TypesLesson 1060 — What is a Container RegistryLesson 1793 — Docker Integration in PipelinesLesson 1809 — Jenkins Configuration as Code (JCasC)Lesson 2772 — API Gateway AbstractionLesson 2888 — Policy as Code Fundamentals
- Version Control for Workflows
- Your pipeline definitions are versioned alongside your code.
- Lesson 1682 — What is GitHub Actions and Why Use It
- Version history
- Many object storage services can keep multiple versions automatically
- Lesson 145 — Object Immutability ConceptsLesson 2288 — Key Versioning and Backward Compatibility
- Version management
- Remove old versions of objects after newer ones exist
- Lesson 158 — Object Lifecycle Policies
- Version metadata
- Tracks which Terraform version created the state
- Lesson 775 — State File Contents and Structure
- Version rollback friendly
- Can revert to previous versions if needed
- Lesson 2706 — Version-Based Cache Invalidation
- Version semantically
- Apply version numbers so teams can pin to stable releases while you safely evolve the library.
- Lesson 2347 — Policy Libraries and Reusability
- Version your layers
- Treat layers like immutable releases—create new versions rather than overwriting
- Lesson 507 — AWS Lambda: Layers and Dependencies
- Version your secrets
- so you can coordinate rotation across services
- Lesson 2279 — Secrets Rotation in Containers
- Version-controlled policies
- tracked in Git alongside your infrastructure code
- Lesson 2335 — Introduction to Compliance as Code
- Version-controlled rollback
- is the simplest: since your infrastructure code is in version control (remember lesson 710?
- Lesson 720 — Rollback Strategies
- Versionable
- Track changes in Git, just like application code
- Lesson 684 — What is Infrastructure as Code?
- Versioned URLs
- No invalidation needed, infinite caching possible, but requires build-time tooling and HTML updates
- Lesson 2675 — Cache Invalidation Strategies
- Versioned URLs (Cache Busting)
- Lesson 2675 — Cache Invalidation Strategies
- Versioning
- acts like a safety net—if something goes wrong, you can recover previous state versions.
- Lesson 789 — GCS Backend ConfigurationLesson 843 — Module Registry and VersioningLesson 1650 — Artifact Management in PipelinesLesson 1716 — Workflow Templates and Reusable WorkflowsLesson 2172 — AWS Cost and Usage ReportsLesson 2238 — Cloud-Native Secrets Services OverviewLesson 2239 — AWS Secrets Manager FundamentalsLesson 2244 — Azure Key Vault Rotation and Versioning (+2 more)
- Versioning and Rollback
- Helm tracks every deployment as a "release" with a version number.
- Lesson 1520 — What is Helm and Why Use It?
- Vertical Pod Autoscaler (VPA)
- adjusts the CPU and memory requests/limits of *existing* pods.
- Lesson 1455 — Vertical Pod Autoscaler (VPA) Basics
- Vertical scaling
- Train your chef to cook faster, give them better equipment, expand the kitchen—make the single kitchen more capable
- Lesson 39 — Scalability: Vertical vs Horizontal ScalingLesson 2692 — Google Cloud Memorystore
- Vertical Scaling (Scaling Up)
- means increasing the power of your existing resource.
- Lesson 39 — Scalability: Vertical vs Horizontal Scaling
- VictorOps
- (now Splunk On-Call) emphasizes collaborative incident timelines and real-time chat integration, helping distributed teams coordinate during active incidents.
- Lesson 2132 — Incident Management Tools
- Video streaming
- where initial buffering requires bursts, then steady playback
- Lesson 2745 — Token Bucket Algorithm
- view
- Read-only access to most resources in a namespace.
- Lesson 1385 — Default ClusterRolesLesson 2002 — Dashboard Sharing and Permissions
- Viewer Request
- Lesson 618 — Edge Function Triggers and Events
- viewer response
- back (after retrieving content).
- Lesson 613 — CloudFront Functions BasicsLesson 618 — Edge Function Triggers and Events
- Viewers
- can browse the catalog but cannot create resources
- Lesson 2933 — RBAC and Portal Access Control
- Violates least privilege
- You're giving yourself more permissions than you need for routine work
- Lesson 339 — Root Account and Administrative Access
- Virtual appliances
- deployed in cloud VPCs that terminate SD-WAN tunnels
- Lesson 2209 — SD-WAN Integration with Cloud
- virtual interfaces (VIFs)
- on top of this physical connection to access different AWS resources
- Lesson 2201 — AWS Direct Connect FundamentalsLesson 2202 — Direct Connect Virtual InterfacesLesson 2213 — Direct Connect Virtual Interfaces
- Virtual Machine (VM)
- is a software-based emulation of a physical computer.
- Lesson 51 — What is a Virtual Machine?
- virtual machines (VMs)
- , **containers**, and **FaaS**.
- Lesson 461 — FaaS vs. Traditional Compute ModelsLesson 961 — Containers vs Virtual Machines
- Virtual network level
- Capture everything in your VPC
- Lesson 213 — Network Security Logging and Monitoring
- Virtual Networks
- Private connectivity from your Azure VMs and services
- Lesson 2691 — Azure Cache for Redis
- Virtual Private Gateway
- – The cloud provider's VPN endpoint attached to your VPC
- Lesson 2198 — Site-to-Site VPN Fundamentals
- Virtualization
- allowed one physical server to run multiple "virtual machines" (VMs)—isolated computer environments sharing the same hardware.
- Lesson 2 — The Evolution of Computing Models
- Virtually unlimited capacity
- – no pre-provisioning
- Lesson 2630 — Object Storage as Data Lake Foundation
- VirtualService
- is Istio's primary configuration resource for controlling how requests are routed to services.
- Lesson 1581 — VirtualService FundamentalsLesson 1583 — Gateway Resource for Ingress
- VirtualServices
- and **DestinationRules**—you specify traffic weights in the VirtualService routing rules.
- Lesson 1605 — Traffic Splitting and Weighted Routing
- Visibility
- into what's failing
- Lesson 488 — Function Error Handling and RetriesLesson 2137 — Cost Management FundamentalsLesson 2512 — Orchestrator Pattern with Step Functions
- Visibility gaps
- Traditional network security tools can't see inside encrypted traffic
- Lesson 1617 — Service Mesh Security Overview
- visibility timeout
- .
- Lesson 554 — Message Visibility and TimeoutsLesson 555 — AWS SQS Standard QueuesLesson 2713 — Message Visibility and AcknowledgmentLesson 2714 — Dead Letter Queues
- Visibility timeout too short
- Message becomes visible again while still processing, causing duplicates.
- Lesson 2713 — Message Visibility and Acknowledgment
- Visual clarity
- – Jenkins displays each stage in the UI, making progress immediately visible
- Lesson 1786 — Stages and Steps Organization
- Visual Pipeline Design
- Lesson 2649 — Azure Data Factory Overview
- Visual storytelling
- Transform complex PromQL queries into intuitive graphs, heatmaps, and gauges
- Lesson 1991 — Introduction to Grafana and Its Role in Observability
- Visual Weight
- Place the most critical metrics (error rates, system health, SLO burn rate) at the top or center where eyes naturally land first.
- Lesson 2101 — Information Hierarchy and Layout
- Visualization
- Lesson 2005 — Log Aggregation Architecture
- Visualizations
- Display your KQL query results as charts, grids, graphs, or heatmaps.
- Lesson 678 — Azure Monitor WorkbooksLesson 2028 — Kibana Dashboard Creation
- VLAN Attachment
- A logical connection that associates a VLAN ID with a specific VPC network.
- Lesson 2206 — Interconnect VLAN Attachments
- VLAN attachments
- (also called **VLAN connections**) to establish Layer 3 connectivity.
- Lesson 2219 — Cloud Interconnect VLAN Attachments
- VLAN connections
- ) to establish Layer 3 connectivity.
- Lesson 2219 — Cloud Interconnect VLAN Attachments
- VLANs
- (Virtual Local Area Networks) to divide networks into zones—think of it like drawing borders between neighborhoods.
- Lesson 2391 — Micro-Segmentation vs Traditional Segmentation
- VM instances
- Identical VMs created from the same base image
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- VM Scale Set
- is a group of identical, load-balanced virtual machines that Azure can automatically increase or decrease based on rules you define.
- Lesson 107 — Azure VM Scale Sets Introduction
- VM size and image
- The template for all instances
- Lesson 321 — Azure Virtual Machine Scale Sets (VMSS) Fundamentals
- VMs
- require the most hands-on work.
- Lesson 461 — FaaS vs. Traditional Compute ModelsLesson 961 — Containers vs Virtual Machines
- volume
- in Kubernetes is a directory accessible to all containers in a Pod.
- Lesson 1151 — Pod Storage and Volumes BasicsLesson 1266 — Mounting Secrets as VolumesLesson 2786 — Data Transfer Costs and Optimization
- Volume and velocity
- High throughput (thousands to millions of events per second) demands different infrastructure than batch systems.
- Lesson 2600 — What is Streaming Data?
- Volume availability
- Are required storage volumes accessible from this node?
- Lesson 1104 — Scheduler: Pod Placement Logic
- Volume binding mode
- controls this timing through the StorageClass configuration.
- Lesson 1305 — Volume Binding Modes
- Volume Cloning
- Create new volumes from snapshots to duplicate environments — perfect for testing, development, or scaling infrastructure.
- Lesson 131 — Volume Snapshots
- Volume discounts
- that apply across aggregated usage (e.
- Lesson 2147 — Multi-Account Cost Consolidation
- Volume Mounts
- When you mount a ConfigMap as a volume, Kubernetes *eventually* syncs the updated content to the Pod's filesystem (typically within a minute or two).
- Lesson 1253 — ConfigMap Update Behavior and Pod RestartLesson 1266 — Mounting Secrets as VolumesLesson 2272 — Kubernetes Secrets Overview
- Volume selectors and labels
- let you create rules that ensure a PVC binds only to PVs with specific characteristics.
- Lesson 1300 — Volume Selectors and Labels
- Volume type changes
- Switch between performance tiers without detaching.
- Lesson 133 — Volume Resizing and Modification
- Volume Utilization
- How much of your volume's capacity is actually being used.
- Lesson 136 — Volume Monitoring and Metrics
- Volume-based discounts
- Higher commitments = steeper discounts (often 5-30% off list prices)
- Lesson 2166 — Discount Negotiation and EDP
- volumes
- for production data persistence; use **bind mounts** for development convenience and specific host-path requirements.
- Lesson 1038 — Bind MountsLesson 1039 — tmpfs MountsLesson 1287 — Storage Challenges in ContainersLesson 1288 — Kubernetes Storage Abstractions
- VolumeSnapshotClass
- defines *how* snapshots are created—similar to how StorageClass defines how volumes are provisioned.
- Lesson 1320 — Volume Snapshots with CSI
- VolumeSnapshotContent
- represents the actual snapshot stored in your underlying storage system.
- Lesson 1320 — Volume Snapshots with CSI
- VPA evicts pods
- to apply new resource requests, which HPA interprets as pods disappearing
- Lesson 1457 — VPA and HPA Interaction
- VPC configuration
- – Functions in VPCs experience additional networking setup time
- Lesson 2543 — Cold Start Fundamentals
- VPC connection
- lets your function communicate with resources inside your private network—like RDS databases in private subnets, internal APIs, or on-premises systems via VPN.
- Lesson 490 — Function Network Configuration
- VPC endpoints
- create a private "doorway" directly from your VPC to specific AWS services, keeping traffic entirely within the AWS network backbone.
- Lesson 220 — VPC Endpoints for AWS ServicesLesson 1081 — Network Security for RegistriesLesson 2722 — Queue Security and Access Control
- VPC Flow Logs
- for REJECT entries identifying which security control blocked traffic
- Lesson 2189 — Security Group and ACL TroubleshootingLesson 2223 — Private Connectivity SecurityLesson 2862 — AWS GuardDuty
- VPC peering
- , you enable two boolean settings on the peering connection itself:
- Lesson 225 — DNS Resolution Between VPCsLesson 516 — Google Cloud Functions: VPC Connectivity and Networking
- VPC Traffic Mirroring
- is like installing a hidden camera on your network highway.
- Lesson 229 — VPC Traffic Mirroring
- VPC-native networking
- with automatically created subnets
- Lesson 1477 — Creating a GKE Standard Cluster
- VPN Connections
- use encrypted tunnels over the public internet.
- Lesson 2197 — VPN vs Dedicated Connections
- VPN Tunnel Configuration
- The tunnel itself needs specific parameters:
- Lesson 2199 — VPN Gateway Configuration
- VS Code extension
- provides real-time feedback, autocomplete, and error checking as you write.
- Lesson 922 — Bicep Tooling and CLI
- Vulnerabilities
- are weaknesses in your configuration or code that *could* be exploited—unpatched systems, overly permissive IAM policies, or exposed storage buckets.
- Lesson 2860 — Threat Detection Fundamentals
- Vulnerability Detection
- Built-in scanners identify common security issues like publicly exposed storage buckets, overly permissive IAM roles, weak SSL certificates, and outdated software versions on VM instances.
- Lesson 2864 — Google Security Command Center
- Vulnerability status
- Remove images with critical CVEs
- Lesson 1082 — Image Retention and Lifecycle Policies
W
- W3C Trace Context
- standard defines HTTP headers that carry trace information:
- Lesson 2070 — Context Propagation StandardsLesson 2095 — Azure Monitor Application Insights
- WAF logs
- (covered in lesson 2374) to identify blocked requests that shouldn't have been.
- Lesson 2376 — WAF Tuning and False Positive Management
- WAFs
- ask: "Does this HTTP request contain SQL injection attempts?
- Lesson 2364 — What is a Web Application Firewall (WAF)
- Wait
- (pause execution for a duration or until a timestamp)
- Lesson 2516 — Step Functions and State MachinesLesson 2517 — AWS Step Functions OverviewLesson 2650 — ADF Pipeline Activities and Control Flow
- Wait event analysis
- Understand if slowness comes from locks, disk I/O, or network latency
- Lesson 456 — Performance Insights and Diagnostics Tools
- Wait Events
- Understand *why* queries are slow—are they waiting for disk reads?
- Lesson 412 — Performance Insights
- Wait for callback
- Frees resources but adds coordination overhead
- Lesson 2552 — Function Chaining and Orchestration Efficiency
- Wait for slow-starting applications
- before sending them traffic
- Lesson 1418 — Understanding Kubernetes Health Checks
- WaitForFirstConsumer
- mode, Kubernetes waits until a Pod that needs the PVC is being scheduled.
- Lesson 1305 — Volume Binding Modes
- Waiting Period
- – AWS enforces 7–30 days, Azure 90 days (soft-delete), GCP 24 hours minimum.
- Lesson 2291 — Key Deletion and Recovery
- waits
- for the VPC data source to complete first, creating an implicit dependency chain.
- Lesson 817 — Data Source Patterns and DependenciesLesson 2570 — Service Communication Overview
- WAN federation
- capabilities let you create a unified service mesh across geographically distributed infrastructure without complex overlay networks.
- Lesson 1593 — Consul Service Mesh Fundamentals
- Warm Standby
- or **Hot Standby** patterns.
- Lesson 2432 — Pilot Light PatternLesson 2760 — Multicloud Architecture Patterns: Active-Passive
- Warm Standby Pattern
- is a disaster recovery strategy where you run a **continuously operational but scaled-down version** of your production environment in a DR region.
- Lesson 2433 — Warm Standby Pattern
- warm starts
- the environment is already ready, so only your handler code runs.
- Lesson 463 — Cold Starts and Warm StartsLesson 480 — Function Execution Context and ReuseLesson 2543 — Cold Start Fundamentals
- Warm Storage
- (sometimes called Infrequent Access) suits data you need occasionally—maybe monthly:
- Lesson 118 — Hot, Warm, and Cold Storage Tiers
- Warm-up time
- is the grace period you configure to tell Auto Scaling: "This new instance needs X seconds to fully initialize before it can handle its full workload.
- Lesson 296 — Warm-up and Warm Pool Concepts
- Warm/Infrequent Access
- For data accessed monthly rather than daily.
- Lesson 148 — Storage Classes Introduction
- Warmup time
- tells Auto Scaling: "Don't count this new instance's metrics for X seconds after launch.
- Lesson 303 — Cooldown Periods and Warmup
- Warning (P2/P3)
- Degraded performance or conditions that *might* become critical if left unattended.
- Lesson 649 — Alert Severity and Prioritization
- Waste identification
- Find untagged or orphaned resources
- Lesson 2141 — Tagging Strategy for Cost Allocation
- Waste percentage
- reveals idle resources, orphaned volumes, or oversized instances.
- Lesson 2988 — Optimization Metrics and KPIs
- Watch the size limits
- Total unzipped size (function + all layers) must stay under 250 MB
- Lesson 507 — AWS Lambda: Layers and Dependencies
- Watches
- the Kubernetes API for Ingress resources and Services
- Lesson 1221 — Ingress Controller Architecture
- Waterfall timeline
- displays span relationships and bottlenecks visually
- Lesson 2094 — Google Cloud Trace
- Watermarks
- are the mechanism streaming systems use to track progress through event time and decide when it's safe to consider a time window "complete.
- Lesson 2606 — Watermarks and Late DataLesson 2625 — Batch Processing Optimization
- Wave 1
- typically includes pilot applications: low-complexity, non-critical workloads with minimal dependencies.
- Lesson 2812 — Migration Wave Planning and Execution
- Wave 2-N
- progressively increase in complexity, incorporating lessons learned.
- Lesson 2812 — Migration Wave Planning and Execution
- Wave 3 - Complex/Dependent
- Applications with tight coupling to legacy systems, requiring refactoring or extensive testing.
- Lesson 2801 — Prioritizing Applications for Migration
- Web ACLs
- (Access Control Lists): The top-level container that defines your entire filtering logic
- Lesson 2368 — AWS WAF Fundamentals
- Web Application Firewall (WAF)
- is a specialized security layer that sits between users and your web application, inspecting HTTP/HTTPS traffic to block malicious requests before they reach your application code.
- Lesson 2364 — What is a Web Application Firewall (WAF)
- Web dashboards
- might need rich, nested data structures
- Lesson 2577 — Backend for Frontend (BFF) Pattern
- Webhooks
- Call external APIs to integrate with other tools
- Lesson 646 — Alarm Actions and NotificationsLesson 647 — Notification ChannelsLesson 1773 — Jenkins Jobs and Build TriggersLesson 1789 — Triggers and Automated Execution
- WebSocket
- is a protocol that keeps a connection open between client and server, allowing both sides to push messages whenever needed—no repeated polling required.
- Lesson 254 — WebSocket and HTTP/2 Support
- Week-over-week overlays
- Compare current Monday to last Monday
- Lesson 2104 — Time Series and Temporal Context
- Weekly
- Scan for anomalies and quick wins (idle resources, oversized instances)
- Lesson 2167 — Continuous Optimization Process
- Weekly rotations
- Engineers rotate weekly (or bi-weekly) shifts.
- Lesson 2127 — On-Call Rotation Structures
- Weighted
- Assigns more traffic to higher-capacity instances
- Lesson 2464 — Stateless HA Patterns: Load Balancing
- Weighted Distribution
- Allows you to assign different traffic percentages to instances, useful during canary deployments or when instances have different capacities.
- Lesson 1569 — Load Balancing in Service Mesh
- what
- you have, **where** it is, and **how it's being used**.
- Lesson 170 — Inventory and AnalyticsLesson 331 — What is IAM and Why It MattersLesson 344 — IAM Audit and Compliance LoggingLesson 535 — API Gateway Monitoring and LogsLesson 547 — API Gateway Logging and MetricsLesson 689 — IaC Benefits: Documentation and AuditingLesson 1088 — ECR Authentication and IAM IntegrationLesson 1156 — ReplicaSet Manifest Structure (+15 more)
- What action
- (transition to a different storage class, expire/delete, delete non-current versions)
- Lesson 158 — Object Lifecycle Policies
- what actions
- on those Projects.
- Lesson 1918 — RBAC and Project-Based Access ControlLesson 2342 — Cloud Custodian for AWS Compliance
- What capacity
- to set (minimum, maximum, and/or desired capacity)
- Lesson 301 — Scheduled Scaling Actions
- What changed
- (added, modified, or deleted resources)
- Lesson 710 — Version Control for Infrastructure Code
- What depends on what
- (ensure database deploys before application)
- Lesson 1923 — Kustomize Controller Fundamentals
- What didn't
- Timeouts, missing credentials, unclear runbook steps, coordination gaps
- Lesson 2911 — Post-Test Analysis and Improvement
- What filters
- to apply (tags missing, encryption disabled, public access enabled)
- Lesson 2342 — Cloud Custodian for AWS Compliance
- What it is
- The database engine encrypts the entire database storage layer automatically.
- Lesson 2301 — Database Encryption Patterns
- What needs improvement
- Gaps in visibility, slow response procedures
- Lesson 2874 — Post-Incident Review and Improvement
- What permissions
- Granular operations like `Get`, `List`, `Set`, `Delete` for secrets; `Encrypt`, `Decrypt`, `Sign` for keys
- Lesson 2315 — Azure Key Vault Access Policies and RBAC
- What type
- of data source it is (Prometheus, InfluxDB, CloudWatch, etc.
- Lesson 1994 — Data Sources in Grafana
- What worked well
- Successful containment steps, effective team coordination
- Lesson 2874 — Post-Incident Review and ImprovementLesson 2911 — Post-Test Analysis and Improvement
- What-If
- goes one step further—it shows you *exactly* what will change when you deploy.
- Lesson 903 — Template Validation and What-If Operations
- What's the blast radius
- Understand impact if a service fails
- Lesson 2067 — Service Maps and Dependency Graphs
- What's the distribution policy
- (Weighted routing for A/B tests)
- Lesson 273 — Global Load Balancing and DNS-Based Routing
- When
- (age in days, creation date, version status)
- Lesson 158 — Object Lifecycle PoliciesLesson 301 — Scheduled Scaling ActionsLesson 344 — IAM Audit and Compliance LoggingLesson 689 — IaC Benefits: Documentation and AuditingLesson 795 — Handling State Lock FailuresLesson 1717 — Environment Protection RulesLesson 1773 — Jenkins Jobs and Build TriggersLesson 2128 — Alerting Best Practices for Incidents (+4 more)
- When budget depletes
- Freeze risky releases, prioritize stability work, and investigate reliability issues
- Lesson 2118 — The Concept of Error Budgets
- When budget remains
- Teams can deploy new features, experiment, and take calculated risks
- Lesson 2118 — The Concept of Error Budgets
- When it's dangerous
- SSH (port 22), RDP (port 3389), databases (port 3306, 5432), or internal APIs should **never** allow `0.
- Lesson 215 — Common Network Security Mistakes
- When it's okay
- Public-facing web servers (ports 80/443) legitimately need this.
- Lesson 215 — Common Network Security Mistakes
- When to Choose IaaS
- Lesson 19 — Choosing the Right Service Model
- When to Choose PaaS
- Lesson 19 — Choosing the Right Service Model
- When to Choose SaaS
- Lesson 19 — Choosing the Right Service Model
- When to retain
- Lesson 2796 — Retire and Retain Strategies
- When to retire
- Lesson 2796 — Retire and Retain Strategies
- When to use
- Lesson 465 — Function Invocation TypesLesson 1715 — JavaScript and Docker Container ActionsLesson 1968 — Rate and Counter FunctionsLesson 1996 — Panel Types and VisualizationsLesson 2301 — Database Encryption Patterns
- When to use backups
- Lesson 2417 — Backup vs. Snapshot: Understanding the Difference
- When to use DependsOn
- Lesson 889 — DependsOn and Creation Order
- When to use it
- Quick setups, development environments, or legacy applications that don't support modern methods.
- Lesson 407 — Database Authentication Methods
- When to use pull
- Lesson 636 — Metric Collection Methods
- When to use push
- Lesson 636 — Metric Collection Methods
- When to use snapshots
- Lesson 2417 — Backup vs. Snapshot: Understanding the Difference
- When to wait
- Lesson 1574 — When to Use a Service Mesh
- where
- it is, and **how it's being used**.
- Lesson 170 — Inventory and AnalyticsLesson 1276 — External Secrets Operator ArchitectureLesson 1358 — Node Affinity and Taints TogetherLesson 1565 — Service Mesh vs API GatewayLesson 1623 — Authorization Policies BasicsLesson 1785 — Agent Directive and Execution EnvironmentsLesson 1883 — Creating Your First ApplicationLesson 1895 — Project Restrictions and Whitelists (+8 more)
- Where are the bottlenecks
- Edges show latency and error rates
- Lesson 2067 — Service Maps and Dependency Graphs
- which
- Pods to manage, and **what** those Pods should look like.
- Lesson 1156 — ReplicaSet Manifest StructureLesson 1269 — RBAC for SecretsLesson 1358 — Node Affinity and Taints TogetherLesson 2001 — Alerting in Grafana
- Which notification channel
- receives the alert (PagerDuty for critical, email for warnings)
- Lesson 649 — Alert Severity and Prioritization
- Which objects to monitor
- (all objects, or just certain prefixes/suffixes)
- Lesson 168 — Event Notifications
- Which pods to evict
- It selects the lowest-priority pods first, evicting only what's necessary.
- Lesson 1371 — Pod Preemption Behavior
- Which resources
- to check (EC2 instances, S3 buckets, RDS databases, etc.
- Lesson 2342 — Cloud Custodian for AWS Compliance
- Which SecretStore to use
- (the connection to your external provider)
- Lesson 1280 — ExternalSecret Resource
- Which servers are healthy
- (Health check integration)
- Lesson 273 — Global Load Balancing and DNS-Based Routing
- Whitelist specific parameters
- – Only `version` and `locale` affect the cache key; ignore tracking params like `utm_source`
- Lesson 2678 — Query String and Cookie Handling
- Whitelist/blacklist parameters
- Include only meaningful parameters (ignore tracking IDs like `?
- Lesson 607 — Cache Key Normalization
- Whitelisting
- is the "allow-only" approach—you specify which countries *can* access your content, and everyone else is denied.
- Lesson 592 — Geographic Restrictions and Content Blocking
- who
- (identities) can access **what** (resources) and **how** (permissions) in your cloud environment.
- Lesson 331 — What is IAM and Why It MattersLesson 344 — IAM Audit and Compliance LoggingLesson 547 — API Gateway Logging and MetricsLesson 689 — IaC Benefits: Documentation and AuditingLesson 795 — Handling State Lock FailuresLesson 1088 — ECR Authentication and IAM IntegrationLesson 1237 — Ingress Rules BasicsLesson 1269 — RBAC for Secrets (+10 more)
- Who decides
- Which team or role has authority to invoke the policy
- Lesson 2120 — Error Budget Policies and Decision Making
- why
- (detailed execution traces).
- Lesson 535 — API Gateway Monitoring and LogsLesson 689 — IaC Benefits: Documentation and AuditingLesson 1533 — Helm Best Practices for UsersLesson 2349 — Audit Logging FundamentalsLesson 2467 — Sticky Sessions and Affinity
- Why create private images
- Lesson 55 — Public vs Private Images
- Why it matters
- Type 1 hypervisors offer better performance, security, and efficiency because they eliminate the extra operating system layer.
- Lesson 52 — Hypervisors and Virtualization TypesLesson 284 — Load Balancer Security Best Practices
- Why root is risky
- Lesson 377 — AWS IAM Users and Root Account
- Why this matters
- When engineering scales infrastructure, finance needs to know if margins improve or erode.
- Lesson 2953 — Unit Economics in Cloud
- Why use subqueries
- Sometimes you need to calculate a metric over a sliding window, then perform another aggregation or function on *that result*.
- Lesson 1975 — Subqueries and Complex Expressions
- Windowing
- Flink provides the richest event-time window operators; Kafka Streams offers solid time-based windows; Spark uses micro-batch intervals
- Lesson 2611 — Stream Processing Frameworks
- Windowing decisions
- Should you count revenue by when sales happened or when you learned about them?
- Lesson 2604 — Event Time vs Processing Time
- Windows (Chocolatey)
- Lesson 1523 — Installing Helm CLI
- Windows Server
- (latest, 2022, 2019)
- Lesson 1689 — GitHub-hosted RunnersLesson 1823 — CodeBuild Build Environments and Images
- Wireshark
- is a graphical tool that excels at analyzing captured packets.
- Lesson 2184 — Network Packet Capture Tools
- With references
- Your database security group rule says "allow traffic from the web-tier-security-group.
- Lesson 205 — Security Group Chaining and References
- Without references
- You'd need to constantly update database security group rules with new web server IPs—tedious and error-prone.
- Lesson 205 — Security Group Chaining and References
- Worker crashes
- If your consumer dies mid-processing, the visibility timeout ensures the message automatically returns to the queue for retry.
- Lesson 554 — Message Visibility and Timeouts
- Worker Nodes
- The "muscle" of the cluster.
- Lesson 1100 — Kubernetes Cluster Architecture OverviewLesson 1461 — EKS Architecture Overview
- workflow
- contains one or more **jobs**.
- Lesson 1683 — GitHub Actions Architecture ComponentsLesson 1684 — Workflows and Workflow FilesLesson 2648 — Glue Job Triggers and Workflows
- Workflow orchestration
- is a control plane that coordinates multiple serverless functions, managing:
- Lesson 2515 — Workflow Orchestration FundamentalsLesson 2723 — Delay Queues and Message Timers
- Workflow orchestration tools
- act as conductors for your data pipelines, defining task dependencies as code and automatically triggering jobs in the correct order.
- Lesson 2626 — Workflow Orchestration Tools
- Workflow-level variables
- apply to all jobs and steps:
- Lesson 1693 — Environment Variables in Workflows
- Workflows
- let you define these multi-step processes, while **triggers** determine when and how jobs execute.
- Lesson 2648 — Glue Job Triggers and Workflows
- Workload Identity
- to link Kubernetes pods to service accounts
- Lesson 393 — GCP Service AccountsLesson 1096 — GCP Registry Authentication and IAMLesson 1488 — GKE Security: Private Clusters and Hardening
- Workload Identity Patterns
- Let applications (not just humans) authenticate across clouds using service accounts
- Lesson 395 — Cross-Provider IAM Federation
- Workload migration
- VMs and containers move between locations
- Lesson 2195 — Hybrid Cloud Connectivity Overview
- Works across distributed caches
- Multiple cache nodes don't need coordination
- Lesson 2706 — Version-Based Cache Invalidation
- Workspace Cleanup Plugin
- Automatically deletes workspace contents before or after builds
- Lesson 1780 — Workspace Management and Build Artifacts
- Workspace data
- Usually excluded (regenerated on next build)
- Lesson 1808 — Backup and Disaster Recovery
- Workspace separation
- Some IaC tools let you maintain separate state files for each environment while using the same configuration code
- Lesson 712 — Environment Separation Strategies
- Workspace-Aware Variables
- Lesson 832 — Workspace Strategies for Scale
- Workspaces
- in Terraform Cloud are isolated environments that each contain their own state file, variables, and execution history.
- Lesson 836 — Terraform Cloud for Team Collaboration
- Workspaces or directory structure
- help organize multiple environments without code duplication while keeping state isolated.
- Lesson 831 — Scaling Challenges and Patterns
- writable layer
- on top.
- Lesson 976 — Union Filesystem MechanicsLesson 979 — Copy-on-Write StrategyLesson 1032 — Docker Storage Architecture OverviewLesson 1035 — Introduction to Docker Volumes
- write
- access to storage—not compute or network changes
- Lesson 334 — The Principle of Least PrivilegeLesson 725 — Your First Terraform ConfigurationLesson 1680 — Artifact Repository Access Control
- Write Capacity Units (WCUs)
- in advance.
- Lesson 432 — DynamoDB Capacity Modes: Provisioned vs On-DemandLesson 2532 — DynamoDB Capacity Modes
- Write once, deploy anywhere
- Your containerized app moves between clouds with minimal changes
- Lesson 2765 — Container-Based Portability
- Write Separation
- Write operations still target the primary, often through a separate endpoint
- Lesson 2481 — Read Replica Scaling
- Write throughput
- How fast your database can accept new data or updates
- Lesson 454 — Database Storage Performance
- Write-Back
- ) pattern writes data to the cache immediately and returns success to the client, while persisting that data to the underlying data store asynchronously in the background.
- Lesson 2699 — Write-Behind (Write-Back) Caching Pattern
- Write-Behind
- Data is written to cache immediately and asynchronously persisted to the database later, improving write performance but risking data loss.
- Lesson 2594 — Distributed Caching StrategiesLesson 2699 — Write-Behind (Write-Back) Caching Pattern
- Write-through
- Application writes to cache and database simultaneously
- Lesson 453 — Caching Strategies for DatabasesLesson 2594 — Distributed Caching StrategiesLesson 2683 — Cache-Aside vs Write-Through PatternsLesson 2708 — Multi-Layer Caching Strategies
- writes
- .
- Lesson 448 — Index Design and StrategyLesson 979 — Copy-on-Write StrategyLesson 2481 — Read Replica Scaling
- Writing a template
- that declares this resource with its current configuration
- Lesson 891 — Stack Import Operations
X
Y
- YAML
- (YAML Ain't Markup Language).
- Lesson 860 — YAML vs JSON Template FormatsLesson 863 — Intrinsic Function Ref
- YAML manifests
- declarative configuration files that describe exactly what you want Kubernetes to create.
- Lesson 1147 — Creating Pods with YAML Manifests
- YAML structure
- Lesson 1266 — Mounting Secrets as Volumes
- YAML syntax
- Lesson 865 — Fn::Sub for String SubstitutionLesson 1048 — Docker Compose File Structure and Syntax
- Yellow ball
- Unstable build (tests failed but build completed)
- Lesson 1782 — Jenkins UI Navigation and Monitoring Builds
- Yellow/Amber
- Warning state (CPU 70-85%, response time 200-500ms)
- Lesson 2106 — Threshold Indicators and Alerts
- you
- choose to identify the resource within your template.
- Lesson 849 — Resource Declaration SyntaxLesson 2293 — Key Import and External Key StoresLesson 2297 — Client-Side EncryptionLesson 2300 — Server-Side Encryption with Customer-Managed Keys
- You (Customer)
- Secure what you put **in** the cloud (data encryption, access policies, application code, user authentication, key management decisions)
- Lesson 2322 — Introduction to Compliance in Cloud
- You both modify infrastructure
- Your state files diverge, causing conflicts and potential data loss
- Lesson 783 — Why Remote State Matters
- You can roll back
- to a known-good state instantly
- Lesson 373 — Policy Versioning and Change Management
- You manage
- operating systems, applications, data, security configurations, and patches.
- Lesson 16 — Comparing IaaS, PaaS, and SaaS ResponsibilitiesLesson 1491 — AKS Architecture and Control Plane Management
- You need credentials
- Unlike SSH keys, you'll typically use a username and password
- Lesson 58 — Windows VMs and RDP Access
- You secure
- Operating system patches, network configuration, firewall rules, applications, data, identity management, encryption
- Lesson 2842 — Shared Responsibility Model
- Your application code
- can now access AWS services without managing keys
- Lesson 353 — IAM Roles for Resources
- Your application is outdated
- and would require major refactoring anyway
- Lesson 2795 — Repurchase Strategy
- Your applications
- consume the resulting Secrets normally via environment variables or volume mounts
- Lesson 2277 — Sealed Secrets for GitOps
- Your on-premises edge
- Your routers connect to the ExpressRoute circuit
- Lesson 2215 — Azure ExpressRoute Fundamentals
- Your Responsibility
- Lesson 2330 — Compliance Inheritance Model
- Your workload isn't moving
- Multi-region within one cloud meets your needs
- Lesson 2777 — Lock-In vs Portability Trade-offs
Z
- Zero administration
- No patching, no instance sizing decisions, no manual scaling policies for most operational concerns.
- Lesson 2530 — Serverless Database Concepts
- Zero code changes
- Adding logging, metrics collection, or TLS encryption doesn't require modifying application code.
- Lesson 2599 — Sidecar Pattern for Cross-Cutting Concerns
- Zero downtime
- Users experience no interruption
- Lesson 277 — Blue-Green Deployments with Load BalancersLesson 1664 — Blue-Green Deployment Pattern
- Zero invalidation failures
- Can't fail to invalidate what you're not trying to delete
- Lesson 2706 — Version-Based Cache Invalidation
- Zero Maintenance
- The cloud provider handles everything: servers, storage, networking, application updates, security patches, and backups.
- Lesson 15 — Software as a Service (SaaS) Overview
- Zero standing privileges
- Credentials exist only during active use
- Lesson 2262 — Dynamic Secrets Fundamentals
- Zero Trust
- principles to workloads: every service must prove its identity before accessing resources, and that identity determines precisely what it can do.
- Lesson 2853 — Service Identity and Workload AuthenticationLesson 2863 — Azure Security Center and SentinelLesson 2864 — Google Security Command Center
- Zero Trust Architecture
- principles—never trust, always verify—and extends **Identity as the Perimeter** by making authentication the prerequisite for network visibility.
- Lesson 2400 — Software-Defined Perimeter (SDP)
- Zero Trust Architecture (ZTA)
- flips this assumption: *no user, device, or service is trusted by default*, regardless of location.
- Lesson 2392 — Zero Trust Architecture Principles
- Zero-downtime migrations
- applications keep writing to the source while the target stays synchronized
- Lesson 2825 — Continuous Data Replication for Databases
- Zero-downtime priority
- Lower `maxUnavailable`, higher `maxSurge`
- Lesson 1189 — DaemonSet Update Parameters
- Zero-downtime updates
- Route traffic away from instances being updated
- Lesson 2457 — Load Distribution for Availability
- zero-trust networking
- without modifying application code.
- Lesson 1594 — Consul Connect and Sidecar ProxiesLesson 1618 — Mutual TLS (mTLS) Fundamentals
- Zipkin
- Industry-standard B3 propagation
- Lesson 1635 — Distributed Tracing IntegrationLesson 2085 — Integrating OTel with Tracing Backends
- Zonal MIG
- All instances run in a single zone (e.
- Lesson 326 — GCP Managed Instance Groups (MIG) Overview
- Zone affinity
- Restrict volumes to zones where your application runs
- Lesson 1313 — StorageClass Topology Constraints
- Zoom in/out
- Click-drag on a panel to focus on a time window
- Lesson 2000 — Annotations and Time Range Controls