← Back to Cloud and Infrastructure

Cloud and Infrastructure Glossary

Key terms from the Cloud and Infrastructure course, linked to the lesson that introduces each one.

8,084 terms.

#

`data`
field holds key-value pairs where values are UTF-8 strings.
Lesson 1249ConfigMap YAML ManifestsLesson 1263Declarative Secret Manifests
`env` context
Accesses environment variables defined in your workflow or job:
Lesson 1692Context and Expression SyntaxLesson 1707Contexts: Accessing Runtime Information
`github` context
Contains workflow run metadata like repository name, branch, commit SHA, and triggering event:
Lesson 1692Context and Expression SyntaxLesson 1707Contexts: Accessing Runtime Information
`labels`
Key-value pairs you attach for organization, selection, and grouping.
Lesson 1121API Object MetadataLesson 1956Prometheus Configuration Basics
`list`
Retrieve all resources of a type (like viewing all Pods in a namespace)
Lesson 1379Common RBAC VerbsLesson 2264Vault Policies and Access Control
`Never`
Kubernetes never restarts the container, regardless of how it exits.
Lesson 1154Pod Restart PoliciesLesson 1193Job Restart and Backoff Policies
`no-cache`
– Must revalidate with origin before serving (doesn't mean "don't cache")
Lesson 596TTL and Cache Control HeadersLesson 2672Cache-Control Headers Deep Dive
`OnFailure`
Kubernetes only restarts the container if it exits with an error (non-zero exit code).
Lesson 1154Pod Restart PoliciesLesson 1193Job Restart and Backoff Policies
`ports`
Map container ports to host ports for external access
Lesson 1049Defining Services in ComposeLesson 1054Port Mapping and Exposure
`properties`
The configuration details specific to your resource type.
Lesson 895Resource Declarations in ARM TemplatesLesson 948Resource Definition Basics
`secrets` context
Safely retrieves encrypted secrets stored in your repository settings:
Lesson 1692Context and Expression SyntaxLesson 1707Contexts: Accessing Runtime Information
`type`
Specifies what kind of data this variable accepts (like `string`, `number`, `bool`, `list`, or `map`).
Lesson 755Variable Declaration SyntaxLesson 895Resource Declarations in ARM TemplatesLesson 948Resource Definition Basics
3-2-1 rule
by replicating snapshots to different regions or accounts, treating them as separate backup copies.
Lesson 2423VM and Volume Backup StrategiesLesson 2424Database Backup Approaches
30 seconds
execution time (viewer events) or **5 seconds** (origin events), supports up to **10GB memory**, **50MB** code packages, and runs Node.
Lesson 615CloudFront Functions vs Lambda@EdgeLesson 623Edge Computing Limitations and Considerations

A

Ability
to manually reprocess events later
Lesson 488Function Error Handling and Retries
Aborts
Return HTTP error codes (500, 503) or connection failures to simulate service crashes.
Lesson 1610Fault Injection for Resilience Testing
Abstraction through IaC tools
like Terraform, which can provision resources across clouds using the same workflow but different provider configurations
Lesson 2775CI/CD Pipeline Portability
Accelerated Computing
instances deliver specialized hardware.
Lesson 78Choosing Instance Types for Your Workload
Accelerated computing instances
are VMs equipped with Graphics Processing Units (GPUs), Field-Programmable Gate Arrays (FPGAs), or custom silicon chips designed for specific computational tasks.
Lesson 70Accelerated Computing Instance Types
Accelerating delivery
proven patterns mean less debugging and rework
Lesson 2935Golden Paths and Paved Roads
Accepter DNS resolution
– allows VPC-B to resolve private DNS names in VPC-A
Lesson 225DNS Resolution Between VPCs
Access Analyzer
is an automated tool that continuously scans your IAM policies and resource-based policies to detect potential security risks.
Lesson 372Access Analyzer for Policy Review
Access and Security
Traditional ops requires cluster credentials in CI/CD systems.
Lesson 1853GitOps vs Traditional Operations
Access control enforcement
happens at multiple layers:
Lesson 2058Multi-Tenancy and Log Isolation
Access controls
determine *who* can read, write, or delete your data.
Lesson 122Storage Security Basics
Access instructions
How to reach the application (LoadBalancer IP, NodePort, port-forward commands)
Lesson 1544NOTES.txt and User Instructions
access keys
(an ID and secret) that stay valid until you manually delete them.
Lesson 341Temporary vs Permanent CredentialsLesson 343Access Keys and Credential Management
Access method
– Console password for web UI access, or access keys for programmatic access (CLI/API)
Lesson 346Creating and Managing User Identities
Access mode incompatibility
PVC wants `ReadWriteMany` but PVs only offer `ReadWriteOnce`
Lesson 1302Troubleshooting PV and PVC Issues
Access patterns
Unusual login times, new geographic locations, unfamiliar devices
Lesson 2858Behavioral Analytics and Anomaly Detection
Access policies
control who (users, service principals, managed identities) can perform which operations (get, list, set, delete) on which object types.
Lesson 2242Azure Key Vault FundamentalsLesson 2243Azure Key Vault Access Policies and RBACLesson 2280Introduction to Key Management SystemsLesson 2315Azure Key Vault Access Policies and RBAC
Access region-specific providers
Use local cloud providers that comply with national sovereignty requirements while maintaining global operations on major platforms.
Lesson 2755Multicloud Benefits: Geographic and Regulatory Coverage
access reviews
to prove only authorized users can retrieve secrets
Lesson 2250Secrets Auditing and ComplianceLesson 2857Identity Governance and Lifecycle
Accidental damage
A user with delete permissions might accidentally wipe critical resources
Lesson 334The Principle of Least Privilege
Accidental deletion protection
Deleted objects can be recovered
Lesson 156Object Versioning Fundamentals
Account A
grants its users or services permission to assume that role
Lesson 354Cross-Account Roles
Account B
(the resource owner) creates a role with a **trust policy** that says "Account A can assume this role"
Lesson 354Cross-Account Roles
Account compromise
or misconfiguration impacting a single account
Lesson 2426Cross-Region and Cross-Account Backup
Account for reserved IPs
Cloud providers always reserve ~5 addresses per subnet
Lesson 177Subnet Sizing and Planning
Account ID
All transactions for account `ABC` remain sequential
Lesson 578Event Ordering and Partitioning
Account-level
default AWS regional limits
Lesson 2540Serverless API Rate Limiting and Throttling
Account-level quotas
Cloud providers enforce maximum concurrency per account/region; you might want to reserve capacity for critical functions
Lesson 478Function Concurrency Limits
Achieve better pricing tiers
Larger shared resources often qualify for volume discounts
Lesson 2164Multi-Tenancy and Resource Sharing
ACID transactions
on object storage (S3, ADLS, GCS) using formats like Delta Lake, Iceberg, or Hudi
Lesson 2629Data Lakehouse Architecture
Acknowledgment
After successful processing, the consumer acknowledges the message, removing it from the queue
Lesson 2720Competing Consumers Pattern
Acknowledgment levels
`acks=0` (fire-and-forget), `acks=1` (leader confirms), `acks=all` (all replicas confirm)
Lesson 2609Kafka Producers and Consumers
ACM (Certificate Manager)
Seamless mTLS certificate provisioning
Lesson 1595AWS App Mesh Overview
AcrDelete
Can delete images and repositories
Lesson 1092ACR Authentication and RBAC
AcrPull
Can only pull (download) images—ideal for production workloads
Lesson 1092ACR Authentication and RBAC
AcrPush
Can push and pull images—perfect for CI/CD pipelines
Lesson 1092ACR Authentication and RBAC
Act
If there's a difference, take corrective action
Lesson 1105Controller Manager: Maintaining Desired State
Action groups
define *what happens* when an alert fires—the notifications and automated responses.
Lesson 675Azure Monitor Metrics and Alerts
Action items
Create concrete, assigned tasks with deadlines to prevent similar incidents.
Lesson 2134Post-Incident Reviews and Blameless Postmortems
Action name
Identifier for this build action
Lesson 1842Build Stage with CodeBuild Integration
Actionability Over Completeness
Don't display every data point.
Lesson 2970Cost Dashboard Design
Actionable insights
Each finding explains what resource is affected, who can access it, and which policy grants that access
Lesson 372Access Analyzer for Policy Review
Actionable Metrics
Monitor queue depths, message age, delivery attempts, and consumer concurrency.
Lesson 581Event-Driven Monitoring and Observability
Active pods/containers
Current count in your cluster
Lesson 1950Metric Types: Gauge
Active use
Application uses them to authenticate
Lesson 343Access Keys and Credential Management
Activity Functions
perform the actual work—calling APIs, processing data, or updating databases.
Lesson 2523Azure Durable Functions
Activity Log
is a platform log that records subscription-level events: resource creation, deletion, policy changes, and access attempts.
Lesson 2359Azure Monitor and Activity Logs
Actual costs
Alert when real spending crosses 85% of budget
Lesson 2170AWS Budgets and Alerts
Ad-hoc exploration
Data analysts investigating patterns or validating hypotheses without waiting for data engineering pipelines
Lesson 2656Serverless Query Engine Overview
Ad-hoc querying
with `OPENROWSET` reads files directly without schema definition:
Lesson 2667Azure Synapse Serverless SQL Pool
Adaptive application controls
Whitelisting recommendations based on machine learning
Lesson 2863Azure Security Center and Sentinel
Adaptive Protection
, which uses machine learning to detect and mitigate application-layer DDoS attacks by analyzing traffic baselines.
Lesson 2371Google Cloud Armor Fundamentals
Adaptive sampling
adjusts rates dynamically based on traffic volume or error rates.
Lesson 1636Trace Sampling Strategies
Add custom metadata
like version numbers or debugging information
Lesson 604Response Header Customization
Add Descriptive Metadata
Use the `metadata` property on parameters to document purpose and valid values.
Lesson 919ARM Template Best Practices and Validation
Add DNS records
mapping names to private IP addresses
Lesson 224Private Hosted Zones
Add field from calculation
creates new columns using math or logic.
Lesson 1999Transformations and Data Processing
Add growth buffer
Multiply by 2-3x for future expansion
Lesson 177Subnet Sizing and Planning
Add instances instantly
during traffic spikes without complex coordination
Lesson 2462Stateless Services and Horizontal Scaling
Add metadata
Link back to original requirement for audit trails
Lesson 2337Compliance Requirements Translation
Add mTLS gradually
Begin with permissive mode (allows both encrypted and plain traffic), then move to strict
Lesson 1601Service Mesh Adoption Patterns
Add new rooms
(new columns) — backward compatible; old queries ignore them
Lesson 2638Schema Evolution and Versioning
Add or remove permissions
as job roles change
Lesson 346Creating and Managing User Identities
Add or remove users
from groups without changing policies
Lesson 378AWS IAM Groups
Add users
to the group
Lesson 378AWS IAM Groups
Add Version
Store actual secret data (creates version 1, 2, etc.
Lesson 2245GCP Secret Manager Fundamentals
Add warnings
as comments where manual review is needed
Lesson 933Decompiling ARM to Bicep
Adding users
means placing them into a group so they inherit that group's permissions.
Lesson 351Assigning Users to Groups
Adding/removing fields
Inject metadata or strip sensitive data
Lesson 537Request and Response Transformation
Additional Authenticated Data (AAD)
in authenticated encryption schemes.
Lesson 2306Encryption Context for Access Control
Additional identification fields
include:
Lesson 1535Chart.yaml Metadata
additional storage volumes
to your VM, similar to plugging external hard drives into your computer.
Lesson 61Root and Additional Storage VolumesLesson 85VM Termination and Deletion
Additive changes only
Add new optional fields while keeping existing fields unchanged.
Lesson 2732Event Schema Evolution
Address Space (CIDR block)
The range of private IP addresses available in this network—typically using RFC 1918 ranges like `10.
Lesson 174Creating a Virtual Network
Adds
resources declared in the template that don't yet exist
Lesson 901Template Deployment Modes
Adds or updates
resources declared in the template
Lesson 901Template Deployment Modes
Adjusting instance sizes
– Downsize from `large` to `medium`, or switch from Memory Optimized to General Purpose if memory isn't your constraint
Lesson 79Cost Optimization with Right-Sizing
Admin access
Full control including deletion and policy management
Lesson 992Registry Authentication and Authorization
Admin Account
is a simple username/password pair built into each registry, useful for quick testing but not recommended for production due to limited control and auditability.
Lesson 1092ACR Authentication and RBAC
Admin Activity Logs
capture who did what administrative action.
Lesson 2360Google Cloud Audit Logs Types
Admin interfaces
Temporarily access internal dashboards
Lesson 1142kubectl port-forward for Local Access
Admin vs Auditor
System administrators manage infrastructure, but separate security teams audit logs and access patterns—preventing admins from hiding their tracks.
Lesson 2835Separation of Duties
Administrative operations
like key deletion or policy changes
Lesson 2290Audit Logging for Key Usage
Administrator account
Where you create and manage the StackSet
Lesson 883StackSets Fundamentals
Administrators
– Elevated privileges for infrastructure management
Lesson 349Groups FundamentalsLesson 1288Kubernetes Storage Abstractions
Admission Controller
Applies resource changes when pods are created or restarted
Lesson 1455Vertical Pod Autoscaler (VPA) Basics
Advanced
Upload plugins manually or configure update sites
Lesson 1775Jenkins Plugins and Extensibility
Advanced features
request modification, sticky sessions based on cookies
Lesson 263Layer 4 vs Layer 7 Load Balancing
Advanced health checks
probe what matters—not just if the server answers, but if it can actually do its job.
Lesson 285Advanced Health Check Strategies
Advisor Recommendations
automatically identifies optimization opportunities: underutilized VMs, idle resources, and potential reserved instance purchases.
Lesson 2173Azure Cost Management and Billing
Affects execution speed
CPU-intensive tasks run faster with higher memory settings
Lesson 475Function Memory and CPU Allocation
Affinity
provides more expressive rules, like "prefer nodes in zone us-east-1a" or "avoid nodes with high memory pressure.
Lesson 1187DaemonSet Scheduling and Node Selection
After Build, Before Deploy
Verify build artifacts meet quality standards
Lesson 1844Manual Approval Actions
After staging validation
Verify that QA sign-off is complete
Lesson 1662Manual Approval Gates
Agent executors
Match CPU cores (typically 1-2 per core for I/O-bound tasks)
Lesson 1806Performance Tuning and Resource Management
Agent level
Filter and sample before shipping
Lesson 2013Log Volume Management
Agent/executor configuration
How many concurrent jobs the master can handle
Lesson 1772Installing and Configuring Jenkins
Aggregate and group
Count login attempts per IP address
Lesson 2047Structured Logging in Applications
Aggregate functions
`COUNT()`, `SUM()`, `APPROX_QUANTILES()`
Lesson 2666BigQuery Standard SQL and Functions
Aggregate metrics
Count success rates without parsing sentence patterns
Lesson 654Structured vs Unstructured Logs
Aggregates
this data in-memory (no persistent storage)
Lesson 1445Metrics Server ArchitectureLesson 1447Resource Metrics API
Aggregation key
what identifier groups requests together
Lesson 2372Rate Limiting and Bot Management
Aggregation operators
let you roll up these individual time series into summary values that answer questions like "What's my total request rate?
Lesson 1966Aggregation OperatorsLesson 1975Subqueries and Complex ExpressionsLesson 1997Query Builder and Query Editor
Aggressive
`maxUnavailable: 3, maxSurge: 1` — faster updates with temporary resource overhead
Lesson 1189DaemonSet Update Parameters
Aggressive update
`maxSurge: 50%`, `maxUnavailable: 0` (never lose capacity)
Lesson 1167Rolling Update Strategy
Akamai
is the oldest and largest CDN provider with the most extensive Points of Presence (PoPs) globally —over 4,000 locations.
Lesson 594Popular CDN Providers Overview
AKS
, node image upgrades happen automatically or manually per node pool.
Lesson 1509Node Image UpgradesLesson 1512Add-Ons and Extensions
ALARM → OK
The CPU drops back below 80% and remains stable.
Lesson 640Alarm States and Transitions
Alarm actions
define what happens when your alarm changes state (OK → ALARM, ALARM → OK, or transitioning to INSUFFICIENT_DATA).
Lesson 646Alarm Actions and Notifications
ALARM state
Send email to ops team + trigger auto-scaling
Lesson 646Alarm Actions and Notifications
Alarm suppression
lets you temporarily disable specific alarms so your team isn't bombarded with alerts they already know about.
Lesson 648Alarm Suppression and Maintenance Windows
AlarmARN
The specific CloudWatch alarm that can trigger rollback
Lesson 890Stack Rollback Configuration
Alarms
(also called alerts) are automated notifications triggered when a metric crosses a threshold you've defined.
Lesson 639Introduction to Alarms and Alerting
Alarms widgets
show alarm status at a glance
Lesson 673CloudWatch Dashboards
Alarms without clear owners
or response procedures
Lesson 651Alarm Best Practices and Anti-Patterns
ALB Listeners and Rules
) and forward to the appropriate **Target Group**.
Lesson 275Content-Based Routing and Path Rules
ALB updates automatically
The ALB immediately starts routing traffic to that dynamic port
Lesson 258ALB and Container Integration
Alert
defines *what* events trigger notifications and *which* Flux resources to watch (like specific Kustomizations or HelmReleases).
Lesson 1928Flux Notifications and AlertsLesson 1936Notification Controller
Alert Channels
Route alerts to where your team actually is: email, Slack, PagerDuty, SMS.
Lesson 457Monitoring and Alerting for Performance
Alert proactively
when patterns cross thresholds
Lesson 667Log-Based Metrics and Alerting
Alert routing
Notifications to appropriate teams via email, Slack, or incident management tools
Lesson 2150Cost Anomaly DetectionLesson 2969Cost Anomaly Detection
Alert thresholds
Trigger notifications at 50%, 80%, 100%, or custom percentages
Lesson 2170AWS Budgets and Alerts
Alerting Policies
define conditions that trigger notifications.
Lesson 680Cloud Monitoring in GCP
alias
is a friendly pointer or label that references a specific function version.
Lesson 486Function Versions and AliasesLesson 744Resource Meta-Arguments: provider
Aliases
You can configure multiple instances of the same provider (different regions or accounts) using aliases—though you haven't reached that pattern yet.
Lesson 728Provider Configuration BlocksLesson 1144kubectl Aliases, Plugins, and Productivity Tips
All points are summed
across all affinity rules for that node
Lesson 1357Affinity Weight and Priorities
All subsequent packets
in that TCP flow follow the same path
Lesson 264NLB Connection Handling
All-at-once
Instant 100% traffic switch
Lesson 1835Blue/Green Deployments with CodeDeploy
Allocate infrastructure
– Provision compute resources
Lesson 2543Cold Start Fundamentals
Allocate to resources
Distribute that $833.
Lesson 2148Amortizing Reserved Instance Costs
Allocates proportional CPU power
More memory = more vCPU share
Lesson 475Function Memory and CPU Allocation
Allocation
is attributing costs to the right owners—teams, projects, or departments.
Lesson 2137Cost Management Fundamentals
Allocation strategy
How to pick from the pool (e.
Lesson 309Mixed Instance Policies
Allow all outbound traffic
(your instance can reach anywhere unless restricted)
Lesson 202Security Group Fundamentals
Allow inbound traffic
on ports 80 (HTTP) and 443 (HTTPS) from the internet (`0.
Lesson 260ALB Security Features and WAF Integration
Allow lists
Known good bots verified by reverse DNS (like Googlebot)
Lesson 2372Rate Limiting and Bot Management
Allow outbound traffic
to your target instances/containers
Lesson 260ALB Security Features and WAF Integration
Allowed Headers
Include any custom headers like `Authorization` or `Content-Type`
Lesson 542API Gateway CORS Configuration
Allowed Methods
Match the methods your API supports (GET, POST, PUT, DELETE, etc.
Lesson 542API Gateway CORS Configuration
Allowed Origins
Specify exact domains or use `*` (though `*` prevents credentials from being sent)
Lesson 542API Gateway CORS Configuration
Allowed registries example
Only permit container images from approved registries:
Lesson 1415Implementing Constraints
AllowedPattern
for regex validation.
Lesson 861Parameters Section Deep Dive
AllowedValues
restricts choices to a predefined list, preventing invalid inputs (like someone requesting a "t2.
Lesson 861Parameters Section Deep DiveLesson 897Parameters in ARM Templates
Allowlists
Only images from specific registries (like `gcr.
Lesson 1486GKE Binary Authorization
Allows programmatic access
for automation that needs it
Lesson 766Sensitive Outputs
Already mounted elsewhere
Volume with `ReadWriteOnce` already attached to different node
Lesson 1302Troubleshooting PV and PVC Issues
Alternating-User Rotation
Two sets of credentials alternate.
Lesson 2240AWS Secrets Manager Rotation
always
follow the deny instruction, even though you have a valid keycard
Lesson 363Allow vs Deny EffectsLesson 2310AWS KMS Key Policies and Grants
Always increasing
Values only go up (except on reset)
Lesson 1949Metric Types: Counter
Always start closed
Like a bouncer at an exclusive club, deny everything unless explicitly allowed.
Lesson 1629Security Policies Best Practices
Always switch to non-root
before the final `CMD` or `ENTRYPOINT`
Lesson 1011USER: Running as Non-Root
Always use `.gitignore`
for Secret YAML files or manage them outside version control entirely.
Lesson 1274Secret Security Best Practices
Always verify before upgrading
Lesson 1533Helm Best Practices for Users
Always-on availability
with no single point of failure
Lesson 443Keyspaces and Cassandra-Compatible Services
Amazon Athena
, **Presto**, and **Spark SQL** read directly from Parquet, ORC, or CSV files organized in your data lake zones, executing SQL queries without copying data into a separate database.
Lesson 2640Query Engines for Data LakesLesson 2668Query Federation and External Data
Amazon CloudFront
integrates tightly with AWS services (S3, Lambda@Edge, Shield).
Lesson 594Popular CDN Providers Overview
Amazon ECR
(your private Docker registry) and push the built images directly.
Lesson 1830CodeBuild with Docker and ECR
Amazon EventBridge
(formerly CloudWatch Events) captures detailed pipeline events and routes them to targets for automated responses.
Lesson 1849Pipeline Notifications and EventBridge
Amazon Linux 2
images with Java, Python, Node.
Lesson 1823CodeBuild Build Environments and Images
Amazon Machine Image
Amazon Web Services' specific term for these templates.
Lesson 54Operating System Images and AMIs
Ambassador
, or **Tyk** use standard configuration formats (YAML, CRDs) and can run on any Kubernetes cluster, regardless of cloud provider.
Lesson 2772API Gateway Abstraction
AMI
stands for **Amazon Machine Image**—Amazon Web Services' specific term for these templates.
Lesson 54Operating System Images and AMIs
AMI ID
Which image was used to launch this VM
Lesson 86Instance Metadata Service
Amortization
means spreading that upfront payment evenly across the commitment period.
Lesson 2148Amortizing Reserved Instance Costs
Amortize initialization costs
Set up connections once per batch, not per record
Lesson 502Batch Processing Pattern
Amount
Your monthly or quarterly threshold (e.
Lesson 2170AWS Budgets and Alerts
Analysis
Run queries and detect patterns across your entire infrastructure
Lesson 657Centralized Logging Concepts
Analytics
tools track *how* your storage is accessed—which objects are frequently retrieved, which haven't been touched in months, and whether your storage class choices align with actual access patterns.
Lesson 170Inventory and AnalyticsLesson 561Azure Service Bus Topics
Analytics jobs
Computing daily metrics from logs
Lesson 2614Batch Processing Fundamentals
Analytics workloads
performing complex calculations
Lesson 67Compute Optimized Instance Types
Analytics/Consumption Zone
Aggregated datasets ready for reporting
Lesson 2627Data Lake Concepts and Architecture
Analyze costs
Identify which resources generate the most network traffic.
Lesson 222VPC Flow Logs
Analyze traffic patterns
Understand peak times and popular endpoints
Lesson 257ALB Access Logs and Monitoring
annotations
store arbitrary metadata that doesn't affect selection or scheduling.
Lesson 1124Annotations for MetadataLesson 1153Pod Labels and Annotations
Annual full tests
are the minimum industry baseline, but many organizations test more frequently based on their RTO and RPO requirements.
Lesson 2415DR Testing and Validation Frequency
Anomaly Detection
Compares current metrics against this band; deviations beyond a certain threshold trigger the alarm
Lesson 644Anomaly Detection AlarmsLesson 2386DDoS Monitoring and MetricsLesson 2402Continuous Verification and Monitoring
Anomaly detection alarms
use machine learning to study your metric's historical patterns — its typical values, daily cycles, weekly trends — and automatically determine what "normal" looks like.
Lesson 644Anomaly Detection Alarms
Antimalware
Deploys Microsoft Antimalware protection
Lesson 100Azure VM Extensions and Custom Script
Any state → INSUFFICIENT_DATA
Metric data stops arriving (perhaps an agent crashed or network issues occurred).
Lesson 640Alarm States and Transitions
Any static assets
your function requires
Lesson 472Function Packaging and Deployment
Any-to-Any (IPVPN)
Integration with your existing MPLS WAN
Lesson 2215Azure ExpressRoute Fundamentals
AOF
(Append-Only File) logs every write operation as it happens—like keeping a detailed diary of every change.
Lesson 2686Redis Persistence and Durability
AOF (append-only file)
Logs every write operation — more durable but slower and larger files
Lesson 2684Redis Architecture and Data Structures
AP systems
(like DynamoDB or Cassandra) choose availability over strong consistency.
Lesson 2466Stateful Services: Challenges and Trade-offs
Apache Airflow
is the most popular open-source choice, defining workflows in Python.
Lesson 2626Workflow Orchestration Tools
Apache Beam pipelines
in batch mode.
Lesson 2621Google Cloud Dataflow Batch
Apache Beam SDK
You define pipelines using Beam's SDK (Python, Java, or Go), which provides built-in transformations like `Map`, `Filter`, `GroupByKey`, and `Combine`.
Lesson 2621Google Cloud Dataflow Batch
Apache Flink
is a dedicated distributed processing engine with true event-time processing and sophisticated state management.
Lesson 2611Stream Processing Frameworks
Apache HBase API
, meaning applications built on HBase can migrate to Bigtable with minimal code changes.
Lesson 441Cloud Bigtable for Wide-Column Storage
Apache Spark pools
– Distributed big data processing using Spark notebooks
Lesson 2635Azure Synapse Analytics
API
defines *what* telemetry operations look like—creating spans, adding attributes, recording metrics.
Lesson 2074OpenTelemetry Architecture and Components
API and SDK access
for programmatic retrieval
Lesson 2238Cloud-Native Secrets Services Overview
API contract
is a formal agreement between a consumer and provider about request/response formats, endpoints, status codes, and behavior.
Lesson 2585Contract Testing and API Contracts
API descriptor
– typically an OpenAPI/Swagger spec that describes available operations
Lesson 958Type Providers and External APIs
API Design Validation
Test API structure before building backend logic
Lesson 545Mock Integrations and Testing
API discovery portal
acts like a library catalog for your organization's services.
Lesson 2931API Discovery and Documentation
API endpoint URL
– where the external service lives
Lesson 958Type Providers and External APIs
API gateway failures
Return 403/503 errors, not bypass authentication
Lesson 2837Fail Secure Principles
API Gateway integration
provides the HTTP interface, mapping `/users` POST requests to `createUser()` and `/users/:id` GET requests to `getUser()`.
Lesson 2567Microservices on Serverless
API Gateway Integration Pattern
places a managed gateway service in front of your serverless functions (like AWS Lambda, Azure Functions, or Google Cloud Functions) to handle HTTP routing, request transformation, authentication, rate limiting, and response formatting.
Lesson 2502API Gateway Integration Pattern
API gateway layer
sitting between clients and your backend microservices.
Lesson 2573GraphQL in Microservices
API gateways
where clients may send bursts of requests followed by quiet periods
Lesson 2745Token Bucket Algorithm
API key
is a unique string that identifies who's calling your API.
Lesson 540API Keys and Usage Plans
API Server ↔ etcd
The API server uses client certificates to authenticate with etcd, protecting your cluster's entire state database
Lesson 1115Component Communication and Security
API server availability
– The Kubernetes API is always reachable
Lesson 1505Managed Kubernetes Overview
API stages
Which deployment stages (like "dev" or "prod") this plan can access
Lesson 540API Keys and Usage Plans
API tokens
Long-lived or scoped tokens for automation
Lesson 992Registry Authentication and Authorization
API versioning
, and **security filtering** directly at the load balancer layer—before requests ever hit your servers.
Lesson 250HTTP Header and Method-Based RoutingLesson 1604Request Routing Based on Headers and PathsLesson 2502API Gateway Integration Pattern
API-driven automation
lets you programmatically orchestrate migration services—triggering replication jobs, querying status, and handling failures without human intervention.
Lesson 2816Migration Automation and Scripting
API-First Platforms
Expose infrastructure capabilities through REST APIs or CLIs, allowing developers to integrate provisioning directly into their application deployment pipelines.
Lesson 2926Self-Service Infrastructure Patterns
API-level
applies to all requests on that API
Lesson 2540Serverless API Rate Limiting and Throttling
API/stage-level limits
Apply to specific deployments
Lesson 539API Gateway Throttling and Rate Limits
App Engine
is Google's fully managed platform-as-a-service (PaaS) that lets you deploy applications without managing the underlying infrastructure.
Lesson 105GCP App Engine Standard and Flexible
App repo
Source code, Dockerfile, unit tests
Lesson 1866GitOps Repository Structure
App version
The version of the application being deployed (e.
Lesson 1532Helm Versioning and Chart Versions
AppArmor
are Linux kernel security modules that enforce **mandatory access control**.
Lesson 1396SELinux and AppArmor Profiles
Append events
to an event store (a specialized database or log)
Lesson 573Event Sourcing Fundamentals
Application
is simply a logical name that groups everything related to a specific deployment.
Lesson 1832CodeDeploy Application and Deployment GroupsLesson 2681Multi-Tier Caching with CDN
Application and State Chaos
targets the application layer itself.
Lesson 2497Application and State Chaos
Application behavior
Items added to cart, search queries performed, feature usage counts
Lesson 638Custom Metrics and Instrumentation
Application Cache
Redis/Memcached for session data, computed results
Lesson 2708Multi-Layer Caching Strategies
Application compatibility
(what your software requires)
Lesson 398Supported Database Engines
Application cookie
Use your app's own session cookie as the sticky identifier.
Lesson 278Session Affinity and Sticky Sessions
Application Cutover
Update DNS records, load balancer configurations, or routing policies to redirect traffic back to primary—similar to your initial failover process but in reverse.
Lesson 2443Failback Procedures
Application deployments
– Your Pods, Deployments, Services, and configurations
Lesson 1505Managed Kubernetes Overview
Application developers
may want: "Deploy my app" with minimal infrastructure decisions
Lesson 2920Abstraction Levels and User Personas
Application errors
Look for stack traces, error messages, or unusual patterns.
Lesson 1444Troubleshooting with Logs
Application Health Extension
A lightweight agent installed on each VM that reports whether the application inside is responding correctly.
Lesson 324VMSS Health Monitoring and Automatic Repairs
Application Insights
, which provides rich telemetry including request rates, failure rates, dependency tracking, and custom metrics.
Lesson 518Provider-Specific Monitoring and ObservabilityLesson 676Azure Log Analytics Workspaces
Application integration
Allow your application to serve private assets without exposing storage credentials
Lesson 165Pre-Signed URLs and Temporary Access
Application Load Balancer (ALB)
is a Layer 7 (application layer) load balancer designed specifically for web traffic.
Lesson 245Introduction to Application Load Balancers (ALB)Lesson 2368AWS WAF Fundamentals
Application Load Balancers
operate at Layer 7 of the OSI model—the application layer.
Lesson 236Application Load Balancers (Layer 7)
Application Load Balancers (ALB)
automatically handle HTTP/2 by:
Lesson 283HTTP/2 and gRPC Load Balancing
Application Load Balancers (ALBs)
.
Lesson 267NLB Target Types
Application Map
visualization automatically discovers your architecture by analyzing telemetry.
Lesson 2095Azure Monitor Application Insights
Application policies
Service-to-service communication
Lesson 1246NetworkPolicy Best Practices
Application portfolio analysis
ranking by business criticality and technical complexity
Lesson 2797Migration Assessment Framework
Application presents both
to Vault's `/auth/approle/login` endpoint
Lesson 2258AppRole Authentication for Applications
Application Recovery Testing
validates that your complete application stack—not just individual components—functions correctly after failover to your disaster recovery site.
Lesson 2908Application Recovery Testing
Application servers
running standard business software
Lesson 66General Purpose Instance Types
Application settings
database connection strings, API endpoints, feature flags
Lesson 1247ConfigMap Fundamentals and Use Cases
Application updates
and rollbacks
Lesson 96AWS Elastic Beanstalk Introduction
Application-aware routing
SD-WAN can prioritize critical applications over the best-performing link
Lesson 2209SD-WAN Integration with Cloud
Application-consistent
Required for databases, enterprise applications, and any stateful workload where data integrity is critical
Lesson 2421Application-Consistent vs. Crash-Consistent Backups
Application-consistent backups
ensure the application's data is in a known, valid state before the snapshot.
Lesson 2421Application-Consistent vs. Crash-Consistent BackupsLesson 2424Database Backup Approaches
Application-consistent snapshots
that coordinate with the guest OS
Lesson 2423VM and Volume Backup Strategies
Application-controlled
The app explicitly tells the load balancer where to route
Lesson 2467Sticky Sessions and Affinity
Application-level
security and data handling
Lesson 2329Cloud Provider Compliance Certifications
Application-Level Cache
– In-memory or distributed cache (Redis, Memcached) at your origin
Lesson 2681Multi-Tier Caching with CDN
Application-level failover handling
means building intelligence into your code to detect, recover from, and adapt to these disruptions without crashing or losing data.
Lesson 2487Application-Level Failover Handling
Application-level health checks
verify your app actually works, not just that the port is open
Lesson 263Layer 4 vs Layer 7 Load Balancing
Application-level logging
refers to how your application code generates logs.
Lesson 1433Logging Architecture in Kubernetes
Application-Level Ordering
Deploy foundation applications first (databases, message queues), then mid-tier services, then user-facing apps.
Lesson 1902Application Dependencies
Application-specific temporary files
that CSI drivers can provision on-demand
Lesson 1326Ephemeral Inline Volumes
Applications
Use managed identities with narrowly-defined IAM policies
Lesson 2834Principle of Least Privilege
ApplicationSets with Dependencies
When using App-of-Apps patterns, structure your parent application to create child apps sequentially based on their readiness.
Lesson 1902Application Dependencies
Apply changes
only after validation
Lesson 718Change Management and Planning
Apply different security rules
Each subnet can have its own access controls and firewall rules
Lesson 175Subnet Fundamentals
Apply encryption automatically
(storage encryption, TLS for transit)
Lesson 2844Secure by Default Configuration
Apply filters and groupings
Focus on what matters to your stakeholders
Lesson 2151Custom Cost Reports and Export
Apply labels to namespaces
Start in `warn` or `audit` mode before enforcing
Lesson 1400Migrating from PodSecurityPolicy
Apply least privilege
grant keys only the permissions they absolutely need
Lesson 348Access Keys and Programmatic Access
Apply network restrictions
(deny-by-default firewall rules)
Lesson 2844Secure by Default Configuration
Apply resilience patterns
you've learned: circuit breakers, health checks, better failover automation, redundancy improvements
Lesson 2500Measuring and Improving Resilience
Apply tags consistently
to all resources (VMs, databases, storage buckets) using those cost center names
Lesson 2145Cost Centers and Business Units
Apply transformations
– Add visual steps like derived columns, lookups, sorting, window functions, or conditional splits
Lesson 2651ADF Mapping Data Flows
Applying changes in order
to maintain consistency
Lesson 2809Continuous Data Replication and CDC
Approval
Manual gate requiring human confirmation
Lesson 1841Pipeline Actions and Action Types
Approval gates
Require security team review before merging risky changes
Lesson 695IaC Security and Compliance Benefits
Approval workflows
Routes high-impact changes to humans, auto-applies low-risk changes
Lesson 2979Right-Sizing at Scale with Automation
AppSpec file
(Application Specification) is CodeDeploy's instruction manual for your deployment.
Lesson 1833AppSpec File for EC2 and On-Premises
Architectural efficiency
(choosing serverless vs.
Lesson 2954Shared Responsibility Model
Architecture
REST-based queue with peek/get/delete operations
Lesson 2725Provider-Specific Queue Services
Architecture diagrams
Visual representation of resource relationships
Lesson 717Documentation and Comments
Archival tasks
Compressing and moving old data to cold storage
Lesson 2614Batch Processing Fundamentals
Archive artifacts
Save build outputs (JARs, logs, reports) for later retrieval
Lesson 1776Build Steps and Post-Build Actions
Archive to Storage Account
For cold storage and long-term compliance requirements
Lesson 2359Azure Monitor and Activity Logs
Archive/Glacier
Long-term retention, up to 90% cheaper, hours to retrieve
Lesson 2156Storage Lifecycle and Tiering
ARG
Build-time only; not visible in running containers; used for conditional build logic
Lesson 1006ARG: Build-Time Variables
Argo Rollouts
is a Kubernetes controller that works alongside ArgoCD to provide these advanced deployment capabilities beyond what standard Kubernetes Deployments offer.
Lesson 1912Progressive Delivery with Argo Rollouts
ArgoCD
is the most popular GitOps operator for Kubernetes.
Lesson 1863GitOps Tooling Landscape
arguments
to set properties, and **expressions** to create dynamic, reusable values—forming the foundation of all Terraform code.
Lesson 726HCL Syntax FundamentalsLesson 740Resource Arguments and AttributesLesson 750Data Source Arguments and Filters
Artifact Management
Archive logs, test results, or build artifacts only when specific conditions are met.
Lesson 1790Post Actions and Notifications
Artifact Registry
, a unified solution that handles container images *and* multiple artifact types in one place.
Lesson 1094Google Container Registry (GCR) and Artifact RegistryLesson 1095Artifact Registry Multi-Format Support
artifact storage
CodePipeline uses S3 behind the scenes to pass outputs between stages.
Lesson 1818Integration Between AWS Code ServicesLesson 1820Pricing Model for AWS Code Services
Artifact types
Docker images in one registry, NPM packages in another, each with distinct access rules
Lesson 1680Artifact Repository Access Control
Artifact Versioning
Redeploy the last stable artifact from your artifact repository
Lesson 1663Rollback and Recovery Patterns
Assembles the complete image
in your local image store
Lesson 994Pulling Images from Registries
Assess impact over time
What happens after 1 hour of downtime?
Lesson 2410Business Impact Analysis (BIA)
Assessment reports
Flag incompatible features that need manual intervention
Lesson 2824Schema Conversion Tools
Asset Discovery and Inventory
SCC automatically discovers and maintains an inventory of all your GCP resources—compute instances, storage buckets, IAM policies, and more.
Lesson 2864Google Security Command Center
Assign
the policy to a scope (management group, subscription, or resource group)
Lesson 2343Azure Policy for Compliance Automation
Assign minimum necessary permissions
using groups and policies
Lesson 377AWS IAM Users and Root Account
Assign permissions once
to many users
Lesson 378AWS IAM Groups
Assign public IP addresses
to resources that need internet access
Lesson 187Internet Gateway Fundamentals
Assign RTO/RPO per tier
Critical systems get aggressive targets; less important systems get relaxed ones.
Lesson 2410Business Impact Analysis (BIA)
Assign them
(RoleBinding/ClusterRoleBinding).
Lesson 1375RBAC API Objects Overview
Associated tickets/approvals
Link to change requests
Lesson 375Policy Documentation and Governance
Associates metadata
like creation time and key hierarchy position
Lesson 2284Key Generation and Randomness
Asymmetric encryption
uses a *pair of keys*: a public key for encryption and a private key for decryption.
Lesson 2281Symmetric vs Asymmetric EncryptionLesson 2295Symmetric vs. Asymmetric EncryptionLesson 2307Hybrid Encryption for Large Data
Asymmetric keys
encrypt those symmetric keys for secure distribution (solving the key-sharing problem)
Lesson 2295Symmetric vs. Asymmetric Encryption
Asymmetric routing
Traffic goes out one path but returns via another, breaking stateful firewalls
Lesson 2190Route Table Verification
Async Export
Ensure your instrumentation library sends spans in background threads or processes.
Lesson 2071Instrumentation Overhead
Async HTTP APIs
(long-running operations with status polling)
Lesson 2523Azure Durable Functions
async processing with queues
(covered earlier) so users don't wait for function initialization
Lesson 2544Cold Start Mitigation StrategiesLesson 2551Asynchronous Processing Patterns
Asynchronous processing
No blocking waits
Lesson 567Event-Driven Architecture Overview
Asynchronous updates
Background process handles refreshes without blocking requests
Lesson 2701Refresh-Ahead Caching Pattern
At cutover
Immediately after final sync
Lesson 2830Data Validation and Consistency Checks
At install time
`helm install myapp .
Lesson 1536Values Files and Default Values
At-Least-Once Delivery
Messages are delivered at least once, but occasionally a message might be delivered more than once.
Lesson 555AWS SQS Standard QueuesLesson 562Google Cloud Pub/Sub
At-Most-Once
The system delivers each message zero or one time—never duplicates, but messages may be lost.
Lesson 552Message Delivery GuaranteesLesson 2711Queue Types and SemanticsLesson 2712Message Delivery Guarantees
Athena's Azure counterpart
you pay only for the data processed by your queries, not for idle servers.
Lesson 2667Azure Synapse Serverless SQL Pool
Atomic operations
Safe concurrent updates across instances
Lesson 2693Session Store and User State Caching
Attach an internet gateway
to your VPC (one per VPC)
Lesson 187Internet Gateway Fundamentals
Attach policies
to the group (e.
Lesson 378AWS IAM Groups
Attach the role
to your resource (e.
Lesson 353IAM Roles for Resources
Attached volumes
Usually persist through both stop and termination unless explicitly deleted
Lesson 83Starting and Stopping VMs
Attaching
the service account to a GCP resource (like a VM)
Lesson 393GCP Service Accounts
Attack trends
which OWASP vulnerabilities are being targeted most
Lesson 2374WAF Logging and Monitoring
Attack vectors
are the paths adversaries use to exploit vulnerabilities—stolen credentials, misconfigured network rules, or compromised supply chains.
Lesson 2860Threat Detection Fundamentals
Attestations required
Images must have cryptographic signatures proving they passed CI/CD checks, vulnerability scans, or code reviews
Lesson 1486GKE Binary Authorization
Attribute Collection
Gathering stack traces, request bodies, or environment metadata is expensive.
Lesson 2071Instrumentation Overhead
Attribute matching
Search by region, state, type, or other properties
Lesson 750Data Source Arguments and FiltersLesson 2736Event Filtering and Routing
Attribution chaos
Tagging strategies differ across providers; tracking which team or project owns what becomes nearly impossible
Lesson 2757Multicloud Challenges: Cost Management and Visibility
Audit access logs
to track who views or modifies state
Lesson 704State File Security Concerns
Audit access patterns
to ensure users only access what they need
Lesson 346Creating and Managing User Identities
Audit and Compliance
IAM tracks who accessed what and when, creating an audit trail essential for security investigations and regulatory compliance.
Lesson 331What is IAM and Why It Matters
Audit and Reporting
Regularly scan your environment for tag compliance, generating reports showing coverage percentages and highlighting gaps.
Lesson 2964Cost Allocation Tags
Audit and Rotation
Log when secrets are accessed (but never log the values themselves).
Lesson 1654CI/CD Security and Secrets Management
Audit compliance
Prove which resources communicated with each other during specific timeframes.
Lesson 222VPC Flow Logs
Audit Controls
Log all PHI access attempts (who, what, when)
Lesson 2327HIPAA for Healthcare Data
Audit existing PSPs
Understand what policies you currently enforce
Lesson 1400Migrating from PodSecurityPolicy
Audit gaps emerge
Mixed encrypted/unencrypted resources are hard to track
Lesson 2839Encryption by Default
Audit logs
Continuously monitor which requests are denied and verify they're actually malicious
Lesson 1629Security Policies Best Practices
Audit mode
and **dry-run** capabilities let you observe what *would* be blocked without actually rejecting requests.
Lesson 1416Policy Testing and Audit Mode
Audit permissions
Regularly review what functions can access
Lesson 519Provider-Specific Security and IAM
Audit regularly
Run reports to find untagged resources and remediate
Lesson 2141Tagging Strategy for Cost Allocation
Audit secret sprawl
regularly to remove orphaned or duplicate secrets
Lesson 2251Secrets Management Cost Optimization
Audit security rules
See which security group or NACL rules are actually blocking or allowing traffic
Lesson 213Network Security Logging and Monitoring
Audit Trail Gaps
Unlike dedicated secrets managers (like AWS Secrets Manager or Vault you've learned), environment variables provide no audit trail of who accessed which secret or when.
Lesson 2270Environment Variables for Secrets
Audit trail generation
automatically documenting compliance evidence
Lesson 2335Introduction to Compliance as Code
Aurora Capacity Units (ACUs)
.
Lesson 2536Aurora Serverless
Authenticates
and **authorizes** users before allowing access
Lesson 520What is an API Gateway?
Authentication & Authorization
Verifies who you are and what you're allowed to do
Lesson 1116Kubernetes API Server OverviewLesson 2576API Gateway Pattern
Authentication bridging
Setting up credentials so one provider's services can authenticate to another's registry (using IAM roles, service accounts, or shared secrets)
Lesson 1099Cross-Provider Registry Integration
Authentication credentials
(often referencing a Kubernetes Secret containing API keys or tokens)
Lesson 1278SecretStore Resource
Authentication dependencies
What identity services are required?
Lesson 2798Application Discovery and Dependencies
Authentication details
– how to authenticate with the external API
Lesson 958Type Providers and External APIsLesson 2931API Discovery and Documentation
Authentication failures
logging full credentials
Lesson 664Security and Sensitive Data in Logs
Authentication handling
automatically
Lesson 1130What is kubectl and Its Role
Authentication happens first
You log in with credentials or present an API token.
Lesson 332Authentication vs Authorization
Authentication mechanism
(IAM roles for CodeCommit/S3, OAuth/connections for GitHub/Bitbucket)
Lesson 1840Source Stage Configuration
Authentication Mechanisms
ensure only authorized clients connect:
Lesson 2696Cache Security and Access Control
Authentication methods
(pre-shared keys, certificates)
Lesson 2199VPN Gateway Configuration
Authentication Options
Configure authentication methods including basic auth, OAuth, LDAP, or SAML.
Lesson 1993Installing and Configuring Grafana
Authenticator
(`authenticator`): IAM authentication attempts
Lesson 1473EKS Logging and CloudWatch Integration
Authenticity
the image came from the expected publisher
Lesson 1076Image Signing and Verification
Authorization chaos
Each service needs to enforce its own access policies
Lesson 1617Service Mesh Security Overview
Authorization happens second
Once authenticated, IAM policies determine what you can do.
Lesson 332Authentication vs Authorization
Authorization strategy
Who can do what (matrix-based permissions, role-based access)
Lesson 1772Installing and Configuring Jenkins
Auto minor version upgrade
Whether to automatically apply small patches (like 14.
Lesson 413Maintenance Windows and Updates
Auto Scaling
excels for unpredictable workloads, always-on applications, and anything requiring rapid response to changing demand.
Lesson 287Auto Scaling vs Manual Scaling
Auto Scaling actions
Add/remove instances automatically
Lesson 670CloudWatch Alarms and Actions
Auto Scaling Group
(ASG) is the manager that holds everything together.
Lesson 289Auto Scaling Components
Auto Scaling Group (ASG)
is AWS's service for managing a collection (or "fleet") of EC2 instances that scale automatically.
Lesson 313AWS Auto Scaling Groups (ASG) Overview
Auto Scaling Groups (ASG)
, Azure uses **Virtual Machine Scale Sets (VMSS)**, and GCP has **Managed Instance Groups (MIG)**.
Lesson 330Cross-Provider Auto Scaling Comparison
Auto sync
is like authorizing "leave at door"—the moment it arrives, it's deployed.
Lesson 1884Sync Policies and Manual vs Auto Sync
Auto-correct
Modify configurations before deployment (e.
Lesson 2901Policy Reporting and Remediation
Auto-creation
If `/app/backend` doesn't exist, Docker creates it.
Lesson 1004WORKDIR: Setting Working Directory
Auto-deny
Block non-compliant deployments in CI/CD
Lesson 2901Policy Reporting and Remediation
Auto-remediate
Run `terraform apply` automatically to restore desired state (risky—use with caution)
Lesson 842Drift Detection and Remediation
Auto-repair
and **auto-upgrade** enabled
Lesson 1477Creating a GKE Standard Cluster
Auto-scaling headroom
– Pre-warm instances or use predictive scaling to avoid cold-start delays during sudden demand
Lesson 2460Capacity Planning for High Availability
Auto-unseal
solves this by delegating the master key encryption to an external Key Management Service (KMS), letting Vault unseal itself automatically.
Lesson 2267Vault Auto-Unseal and Seal Wrap
Auto-upgrade channels
(patch, stable, rapid, or none)
Lesson 1501AKS Cluster Upgrades and Maintenance
Autohealing
is the automatic recovery mechanism.
Lesson 329MIG Health Checks and Autohealing
Automate
Apply tags via infrastructure-as-code templates, not manual clicking
Lesson 2141Tagging Strategy for Cost Allocation
Automate alerting
Trigger alarms based on specific field values
Lesson 654Structured vs Unstructured Logs
Automate backend configuration
Use partial backend configuration in CI/CD to avoid hardcoding credentials in version control.
Lesson 797Remote State Best Practices
Automate teardown
Always destroy test resources in cleanup phases.
Lesson 2882Integration Testing Strategies
Automated Backup Configuration
and **Point-in-Time Recovery**?
Lesson 424Manual Snapshots and Retention
automated backups
(which capture full snapshots) and **transaction logs** (which record every single change made to your database).
Lesson 423Point-in-Time RecoveryLesson 424Manual Snapshots and RetentionLesson 444NoSQL Backup, Point-in-Time Recovery, and TTL
Automated Data Collection
Your tracking system continuously queries the metrics that feed your SLIs (availability percentages, latency measurements, throughput rates).
Lesson 2123Measuring and Reporting SLO Compliance
Automated enforcement
blocking non-compliant deployments before they reach production
Lesson 2335Introduction to Compliance as CodeLesson 2964Cost Allocation Tags
Automated failover
systems instead of manual processes
Lesson 2409Relationship Between RTO, RPO, and Cost
Automated guardrails
that prevent common mistakes
Lesson 2917Golden Paths and Paved Roads
Automated implementation
Uses IaC or APIs to execute approved changes during maintenance windows
Lesson 2979Right-Sizing at Scale with Automation
Automated incident response
uses serverless compute services (AWS Lambda, Azure Logic Apps, Google Cloud Functions) to take immediate containment actions without human delay.
Lesson 2871Automated Incident Response
Automated Operations
AKS provides one-click upgrades, automatic scaling capabilities, and automated patching of the underlying infrastructure.
Lesson 1490Introduction to Azure Kubernetes Service (AKS)
Automated policy enforcement
through Infrastructure as Code
Lesson 2980Storage Lifecycle Optimization
Automated PR Creation
The pipeline commits generated manifests to your GitOps repository and uses Git APIs to automatically open a pull request
Lesson 1876GitOps Workflow Automation
Automated Provisioning
When a new employee starts or changes roles, identity management systems automatically create accounts, assign group memberships, and grant appropriate permissions based on role templates.
Lesson 2857Identity Governance and Lifecycle
Automated Report Generation
Tools like OPA, Sentinel, or cloud-native services query logs and compliance scans, then format results according to framework requirements.
Lesson 2363Compliance Reporting and Evidence
Automated Resource Lifecycle Management
Lesson 694Cost Optimization Through IaC
Automated rollback
Return to primary when it recovers
Lesson 2456Failover Mechanisms and Automation
Automated rotation
Keys updated regularly without downtime
Lesson 2280Introduction to Key Management Systems
Automated scheduling
Use plugins like ThinBackup or Jenkins Configuration as Code (JCasC) combined with version control to snapshot configurations regularly (daily or after major changes).
Lesson 1808Backup and Disaster Recovery
Automated Synchronization
Automated agents continuously monitor Git and ensure the live environment matches the desired state.
Lesson 1852What is GitOps?Lesson 1919Introduction to Flux and GitOps Philosophy
Automated testing
validates infrastructure changes
Lesson 693IaC and the DevOps Culture
Automated Testing Scripts
run scheduled validations using the monitoring tools you've already learned: VPC Flow Logs analysis, packet captures, route table verification, and NAT gateway metrics.
Lesson 2193Network Monitoring Automation
Automated tests
Do your modules and configurations behave as expected?
Lesson 721Continuous Integration for IaC
Automated Triggers
rebuild images when:
Lesson 1091ACR Tasks and Automated Builds
Automatic anomaly detection
highlights unusual latency spikes
Lesson 2094Google Cloud Trace
Automatic backups
Most backends version your state, protecting against accidental deletions
Lesson 783Why Remote State Matters
Automatic cleanup
No manual rotation needed; Vault handles revocation
Lesson 2262Dynamic Secrets Fundamentals
Automatic Deletion
Old snapshots are automatically removed when they exceed retention limits, preventing storage costs from spiraling out of control.
Lesson 132Snapshot Lifecycle Management
Automatic DNS resolution
containers discover each other by name
Lesson 1042Bridge Networks
Automatic encryption
Artifacts are encrypted at rest using AWS KMS keys (either AWS-managed or customer-managed)
Lesson 1847Pipeline Artifacts and Artifact Stores
Automatic enrichment
The APM agent injects trace and span identifiers into your log statements
Lesson 2044New Relic Logs in Context
Automatic injection
uses a Kubernetes admission webhook that intercepts pod creation requests.
Lesson 1579Sidecar Injection Mechanisms
Automatic Linking
Click from a log line with a trace ID straight into the full trace visualization
Lesson 2092Tempo by Grafana
Automatic Load Balancing
The queue handles distribution without custom logic
Lesson 2720Competing Consumers Pattern
Automatic log access
The agent reads container logs from the node's filesystem (typically `/var/log/pods` and `/var/log/containers`)
Lesson 1434Node-Level Logging Agents
Automatic mutual TLS (mTLS)
Encrypts and authenticates all service-to-service traffic by default
Lesson 1617Service Mesh Security Overview
Automatic optimization
The cloud scales resources without human intervention
Lesson 32Elasticity and Cost Benefits of Auto-ScalingLesson 2651ADF Mapping Data Flows
Automatic reconciliation
The GitOps controller notices the Git state changed and applies the old configuration
Lesson 1873Rollback and Recovery
Automatic recovery
If a server fails, users simply get routed to another—no data is lost because nothing was stored locally
Lesson 42Stateless Application Design
Automatic trigger
All `ONBUILD` instructions execute immediately after `FROM`
Lesson 1014ONBUILD: Triggered Instructions
Automatic updates
AWS can patch security vulnerabilities without breaking your workloads
Lesson 1469EKS Add-ons Overview
Automatic upgrades
AWS handles Kubernetes version updates
Lesson 1460Introduction to Amazon EKS
automatically
upgrades your control plane and nodes (during maintenance windows).
Lesson 1482GKE Release ChannelsLesson 2839Encryption by Default
Automatically created
The service creates the role when you first use that service
Lesson 357Service-Linked Roles
Automatically fails over
to the standby if the primary becomes unavailable due to hardware failure, network issues, or scheduled maintenance
Lesson 415Multi-AZ Deployments Fundamentals
Automatically revokes
it when the lease expires or the app finishes
Lesson 2262Dynamic Secrets FundamentalsLesson 2265Vault Leases and Revocation
Automatically rolls back
if failures are detected
Lesson 1813CodeDeploy: Deployment Automation Overview
Automation actions
trigger systems to respond automatically:
Lesson 646Alarm Actions and Notifications
Automation and notifications
(Slack, email, webhook triggers)
Lesson 1775Jenkins Plugins and Extensibility
Automation triggers
CI/CD tools (Jenkins, GitLab CI, GitHub Actions, etc.
Lesson 1647Version Control as the Source of Truth
Automation workflows
Streamlined processes for provisioning, scaling, and decommissioning
Lesson 2914Internal Developer Platform (IDP) Fundamentals
Autopilot flips this model
Google manages all the infrastructure, automatically provisions nodes based on your workload requirements, and optimizes resource allocation.
Lesson 1478Creating a GKE Autopilot Cluster
Autopilot mode
is Google's managed experience where GKE handles the entire infrastructure layer for you.
Lesson 1476GKE Cluster Types: Standard vs Autopilot
Autoscaling
Dataflow continuously monitors your pipeline's workload and automatically adds or removes workers.
Lesson 2621Google Cloud Dataflow Batch
Availability guarantee
Minimum capacity ensures service continuity
Lesson 310Capacity Limits and Constraints
Availability needs
Multi-AZ deployments require VM scale sets or managed services with built-in redundancy
Lesson 110Compute Service Selection Criteria
Availability sets
distribute your VMs across multiple **fault domains** and **update domains** within a single datacenter:
Lesson 99Azure VM Availability Sets and Zones
Availability Zone (AZ)
is a physically isolated data center—or cluster of data centers—within a cloud region.
Lesson 2454Availability Zones and Data Center Distribution
Availability Zone balancing
Terminate from the AZ with the most instances
Lesson 319ASG Termination Policies
Availability zone outage
– The entire data center zone loses connectivity
Lesson 416Multi-AZ Failover Process
Availability Zones (AZs)
within your region.
Lesson 315ASG Instance Distribution and Availability Zones
Available libraries
(standard library features vary by version)
Lesson 471Function Runtime Environments
Avoid
Choose a different migration strategy (remember your 7 R's—maybe refactor instead of rehost if compatibility risks are too high)
Lesson 2803Risk Assessment and Mitigation
Avoid API lock-in
You code against Kubernetes APIs, not provider-specific services
Lesson 2765Container-Based Portability
Avoid Expensive Operations
Some functions are computationally heavy.
Lesson 1976Query Optimization and Best Practices
Avoid hardcoded credentials
Use provider IAM mechanisms
Lesson 519Provider-Specific Security and IAM
Avoid heavy operations
Don't perform complex computations or large data transformations at the edge.
Lesson 622Edge Function Performance Optimization
Avoid high cardinality
Partitioning by user ID (millions of values) creates management nightmares.
Lesson 2661Athena Partitioning Strategies
Avoid large transitive dependencies
One innocent-looking package might pull in dozens of others.
Lesson 496Dependency Management
Avoid over-provisioning
If pods request 2 CPU and 4GB RAM, don't use 16-core VMs
Lesson 1504AKS Cost Management and Cluster Sizing
Avoid overlap
If two groups have identical permissions, merge them
Lesson 350Creating and Organizing Groups
Avoid relying on `latest`
it's ambiguous and changes frequently.
Lesson 1064Image Naming and Tagging Conventions
Avoid rewrite costs
No translation layer needed when changing providers
Lesson 2772API Gateway Abstraction
Avoid spot instances
for databases, critical production apps, or anything requiring continuous uptime.
Lesson 75Spot Instance Pricing
Avoid wildcard queries
on high-cardinality fields like `trace_id` or `user_id` without additional filters.
Lesson 2097Query Performance and Indexing
Avoiding Full Table Scans
prevents the database from reading every row.
Lesson 449Query Optimization Techniques
Avro
stores data row-by-row with embedded schemas, making it ideal for streaming pipelines and schema evolution.
Lesson 2632File Formats for AnalyticsLesson 2660Querying Data Formats in Athena
AWS AppSync
provide managed GraphQL endpoints that execute your data-fetching logic (resolvers) on- demand, charging only for queries executed.
Lesson 2537Serverless GraphQL APIs
AWS ASGs
use Launch Templates for configuration and offer Lifecycle Hooks for custom actions during scaling events.
Lesson 330Cross-Provider Auto Scaling Comparison
AWS best practices
(inefficient API usage, missing error handling)
Lesson 1816CodeGuru: AI-Powered Code Review
AWS CLI
`aws cloudformation describe-stack-events --stack-name my-stack`
Lesson 887Stack Events and MonitoringLesson 1462EKS Cluster Creation Options
AWS Cloud Map
Native service discovery integration
Lesson 1595AWS App Mesh Overview
AWS CloudTrail
logs every Secrets Manager API call (who retrieved which secret, when)
Lesson 2250Secrets Auditing and ComplianceLesson 2290Audit Logging for Key UsageLesson 2862AWS GuardDuty
AWS CloudTrail Insights
and **CloudWatch Logs Insights** let you query events using SQL-like syntax
Lesson 2355Audit Log Analysis and SearchLesson 2358AWS CloudTrail Deep Dive
AWS CloudWatch
excels at native AWS service integration with automatic metric collection.
Lesson 683Cross-Provider Monitoring ComparisonLesson 2055Log Retention and Storage Classes
AWS CloudWatch Network Monitor
Synthetic monitoring between VPCs
Lesson 2232Network Load Testing Tools
AWS CodeArtifact
acts as a package repository for dependencies, while **CodeGuru** provides AI-powered code reviews.
Lesson 1810Introduction to AWS Developer Tools Ecosystem
AWS CodeBuild
compiles your code, runs tests, and produces deployable artifacts—it's the build engine.
Lesson 1810Introduction to AWS Developer Tools Ecosystem
AWS CodeCommit
serves as your Git repository (like GitHub or GitLab), hosting your source code directly in AWS.
Lesson 1810Introduction to AWS Developer Tools EcosystemLesson 1840Source Stage Configuration
AWS CodeDeploy
automates application deployments to EC2, Lambda, ECS, or on-premises servers—it's the deployment orchestrator.
Lesson 1810Introduction to AWS Developer Tools Ecosystem
AWS CodePipeline
ties everything together as the pipeline orchestrator, defining the flow from source → build → test → deploy.
Lesson 1810Introduction to AWS Developer Tools Ecosystem
AWS Cost Explorer
excels at rich filtering and grouping options, offering the most mature anomaly detection through dedicated AWS Cost Anomaly Detection.
Lesson 2181Cross-Provider Cost Tool Comparison
AWS Cost Explorer API
Query costs by service, tag, linked account, or time period
Lesson 2973Cost Allocation APIs and Automation
AWS DataSync
is an online agent-based service that automates and accelerates data transfer over the network.
Lesson 2810Large-Scale Data Transfer Services
AWS Direct Connect
establishes a dedicated network connection from your on-premises data center or colocation facility to AWS.
Lesson 2780Direct Connect vs ExpressRoute vs Interconnect
AWS Direct Connect locations
specialized facilities where AWS networking equipment coexists with third-party network providers.
Lesson 2212AWS Direct Connect Fundamentals
AWS DocumentDB
is a fully managed document database service that emulates MongoDB's API.
Lesson 442DocumentDB and MongoDB-Compatible Services
AWS Elastic Beanstalk
, which does all of this for you automatically.
Lesson 96AWS Elastic Beanstalk Introduction
AWS Elastic Disaster Recovery
Automates replication and orchestrates failover with defined runbooks
Lesson 2440Automated DR Orchestration
AWS EMR (Elastic MapReduce)
provisions Spark clusters that integrate seamlessly with S3 for data storage, IAM for security, and CloudWatch for monitoring.
Lesson 2618Spark on Cloud Platforms
AWS Glue Crawlers
(which you've already learned) to automatically discover and catalog data.
Lesson 2653Data Catalog Services Across Providers
AWS KMS keys (SSE-KMS)
for enhanced key management and audit logging—critical for compliance requirements.
Lesson 1828Artifact Management and S3 Integration
AWS Lambda functions
(trigger serverless processing)
Lesson 557AWS SNS Topics and Subscriptions
AWS Management Console
is the graphical, point-and-click interface.
Lesson 1462EKS Cluster Creation Options
AWS Native Integration
CodeCommit naturally connects with other AWS Developer Tools.
Lesson 1811CodeCommit: Git Repository Service
AWS Organizations
with consolidated billing, where a payer account aggregates charges from all linked member accounts.
Lesson 2147Multi-Account Cost ConsolidationLesson 2968Multi-Account Cost Aggregation
AWS Partner
who already has connectivity to these locations
Lesson 2212AWS Direct Connect Fundamentals
AWS Partner Network
providers offer sanctioned testing that simulates various attack vectors (volumetric floods, application-layer attacks, protocol exploits) without risking account termination.
Lesson 2389DDoS Testing and Simulation
AWS public services
(S3, DynamoDB, public endpoints) using public IP addresses you own.
Lesson 2213Direct Connect Virtual Interfaces
AWS RDS Performance Insights
, for example, automatically captures and visualizes database load, breaking it down by SQL statements, users, hosts, or applications.
Lesson 456Performance Insights and Diagnostics Tools
AWS Route 53
offers weighted routing, latency-based routing, and health checks
Lesson 2782Cross-Cloud DNS Management
AWS S3
Enable versioning per bucket, define lifecycle rules with `NoncurrentVersionTransition` actions
Lesson 2425Object Storage Versioning and Lifecycle
AWS Snowball/Snowmobile
and **Azure Data Box** are ruggedized physical devices shipped to your data center.
Lesson 2810Large-Scale Data Transfer Services
AWS SQS FIFO queues
deduplicate based on message content or deduplication ID for 5 minutes
Lesson 577Event Deduplication Strategies
AWS Transit Gateway
, enabling scalable routing to multiple VPCs and on-premises locations through a central hub.
Lesson 2213Direct Connect Virtual Interfaces
AWS VPC Reachability Analyzer
Tests connectivity between source and destination resources within your VPC
Lesson 2188Network Path Analysis Tools
AWS-assigned static IPs
AWS automatically assigns a fixed IP per AZ that never changes
Lesson 266Static IP and Elastic IP Support
AWS-generated tags
automatically appear with the prefix `aws:` (like `aws:createdBy`).
Lesson 2142Cost Allocation Tags in AWS
AWS-Heavy Workloads
If you're deploying to EC2, Lambda, ECS, or Elastic Beanstalk, AWS native services integrate seamlessly with IAM roles and service-to-service permissions without extra authentication layers.
Lesson 1821When to Use AWS Native CI/CD
AWS-owned infrastructure
, not your account.
Lesson 1461EKS Architecture Overview
AZ spreading
Distribute across all availability zones in your region
Lesson 2978Spot Instance Fleet Management
Azure Active Directory authentication
, **webhook notifications** for registry events, and **Azure RBAC integration** for granular access control.
Lesson 1090Azure Container Registry (ACR) Overview
Azure Activity Logs
track Key Vault operations like key retrieval, encryption operations, and access policy changes.
Lesson 2290Audit Logging for Key Usage
Azure AD
Identity-based authentication alongside traditional connection strings
Lesson 2691Azure Cache for Redis
Azure AD Authentication
uses your existing Azure Active Directory identities.
Lesson 1092ACR Authentication and RBAC
Azure AD Pod Identity
or **Azure Workload Identity**.
Lesson 1283Azure Key Vault Integration
Azure Application Gateway
(regional load balancer)
Lesson 2370Azure WAF Overview
Azure Blob
Use blob versioning with lifecycle management policies for tier transitions
Lesson 2425Object Storage Versioning and Lifecycle
Azure Blob Storage
to store Terraform state files remotely.
Lesson 788Azure Storage Backend Setup
Azure CDN
integrates naturally with Microsoft Azure services and offers multiple underlying providers (Verizon, Akamai) through a unified interface—useful for multi-CDN strategies.
Lesson 594Popular CDN Providers OverviewLesson 617Azure Functions on CDN Edge
Azure CLI
and **PowerShell** act as the deployment engines that understand Bicep natively.
Lesson 922Bicep Tooling and CLI
Azure CNI networking
(not kubenet) because ACI containers need direct integration with your Azure virtual network.
Lesson 1503AKS Virtual Nodes and Serverless Bursting
Azure Container Registry (ACR)
is Microsoft's private registry service.
Lesson 929Module Registries
Azure Cost Exports
let you automatically dump cost and usage data to a storage account on a schedule (daily, weekly, monthly).
Lesson 2176Azure Cost Exports and APIs
Azure Cost Management
shines in enterprise scenarios with built-in chargeback/showback features and tight integration with Azure Advisor for optimization recommendations.
Lesson 2181Cross-Provider Cost Tool Comparison
Azure Cost Management API
Retrieve usage details, budgets, and forecasts
Lesson 2973Cost Allocation APIs and Automation
Azure Data Box
are ruggedized physical devices shipped to your data center.
Lesson 2810Large-Scale Data Transfer Services
Azure Data Factory
, track schema versions explicitly.
Lesson 2654Schema Evolution and Versioning
Azure Database Migration Service
offers similar capabilities with tight integration to Azure Database offerings.
Lesson 2806Database Migration Service FundamentalsLesson 2824Schema Conversion Tools
Azure DNS
integrates with Traffic Manager for geographic routing
Lesson 2782Cross-Cloud DNS Management
Azure Enterprise Agreements
aggregate subscriptions under a single enrollment
Lesson 2968Multi-Account Cost Aggregation
Azure ExpressRoute
provides similar dedicated connectivity to Azure services and Microsoft 365.
Lesson 2780Direct Connect vs ExpressRoute vs Interconnect
Azure Functions
JavaScript/TypeScript, Python, C#, Java, PowerShell
Lesson 471Function Runtime EnvironmentsLesson 517Cross-Provider Function Comparison
Azure HDInsight
offers similar managed Spark clusters tightly coupled with Azure Blob Storage and Data Lake Storage.
Lesson 2618Spark on Cloud Platforms
Azure Monitor Agent
(AMA).
Lesson 2053Azure Monitor Logs
Azure Monitor Autoscale
, specifying:
Lesson 322VMSS Scaling Policies and Rules
Azure Monitor Logs
uses Kusto Query Language (KQL) for powerful filtering and aggregation
Lesson 2355Audit Log Analysis and Search
Azure Network Watcher
Provides "Next Hop" and "IP Flow Verify" features
Lesson 2188Network Path Analysis ToolsLesson 2232Network Load Testing Tools
Azure Policies
, meanwhile, are like building codes for construction—they enforce rules about what can be deployed and how resources must be configured.
Lesson 918Resource Tags and Policy Assignment
Azure Policy
, **GCP Organization Policy Service**, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
Lesson 2345Continuous Compliance Scanning
Azure Premium
provides pre-warmed instances.
Lesson 517Cross-Provider Function Comparison
Azure Private Peering
Connects to your Azure VNets and private IP resources
Lesson 2203Azure ExpressRoute Fundamentals
Azure Purview
, and **Google Cloud Dataplex** automatically crawl your data sources (S3 buckets, database tables, BigQuery datasets) to extract **metadata**—information *about* your data.
Lesson 2637Data Catalog and Metadata Management
Azure RBAC integration
for granular access control.
Lesson 1090Azure Container Registry (ACR) Overview
Azure Security Center
(now part of Microsoft Defender for Cloud) provides unified security posture management across your Azure resources, while **Azure Sentinel** serves as a cloud-native SIEM (Security Information and Event Management) solution for advanced threat de...
Lesson 2863Azure Security Center and Sentinel
Azure Sentinel
serves as a cloud-native SIEM (Security Information and Event Management) solution for advanced threat detection and response.
Lesson 2863Azure Security Center and Sentinel
Azure Service Bus
offers duplicate detection using message IDs
Lesson 577Event Deduplication Strategies
Azure Site Recovery
Manages replication and executes recovery plans with dependency ordering
Lesson 2440Automated DR Orchestration
Azure Storage
, enable blob versioning on your storage account.
Lesson 794State Versioning and History
Azure Synapse Analytics
is Microsoft's answer to the lakehouse architecture.
Lesson 2635Azure Synapse Analytics
Azure VM Extensions
work similarly: they're add-on components that automatically install software, configure settings, or run scripts on your VM right after it starts.
Lesson 100Azure VM Extensions and Custom Script
Azure VMSS
provides Orchestration Modes (uniform vs flexible) and unique features like Automatic OS Upgrades and automatic instance repairs.
Lesson 330Cross-Provider Auto Scaling Comparison

B

B3
originated with Zipkin and uses multiple headers:
Lesson 2070Context Propagation Standards
Backend for Frontend (BFF)
pattern creates **separate serverless API layers for each client type**.
Lesson 2507Backend for Frontend (BFF) Pattern
Backend integrations
define how the gateway connects to and communicates with the services that actually handle the request.
Lesson 528Backend Integration Types
Backend load spikes
when many cold requests arrive simultaneously
Lesson 2707Cache Warming Strategies
Backend Mappings
Where each request should go
Lesson 524REST API Gateway Basics
Backend services
Which ClusterIP Services receive the traffic
Lesson 1219Ingress Resource Fundamentals
Background deletion
Parent is deleted immediately; children are cleaned up asynchronously
Lesson 1125Owner References and Garbage Collection
Background jobs
(cron tasks, batch workers): 1–5m intervals since metrics change slowly
Lesson 1988Scrape Interval Optimization
Background workers
Processing queue items or batch jobs in parallel
Lesson 1057Scaling Services with Compose
Backoff strategy
Time delay between retries
Lesson 488Function Error Handling and Retries
BackoffRate
exponential backoff multiplier
Lesson 2520Error Handling in State Machines
Backpressure
occurs when downstream consumers can't keep pace with upstream producers.
Lesson 2613Streaming Performance ConsiderationsLesson 2741Flow Control Mechanisms
Backstage
integrate API discovery directly into the developer portal.
Lesson 2931API Discovery and Documentation
Backup 1
Snapshots in the same region (fast recovery, low RPO)
Lesson 2418The 3-2-1 Backup Rule
Backup 2
Cross-region replication or archived backups in object storage like S3 Glacier
Lesson 2418The 3-2-1 Backup Rule
Backup and Recovery
Regular snapshots protect against data loss from accidental deletion, corruption, or hardware failure.
Lesson 131Volume Snapshots
Backup and recovery speed
Faster storage means quicker backups and restores
Lesson 454Database Storage Performance
Backup and Restore
pattern and the fully replicated **Warm Standby** or **Hot Standby** patterns.
Lesson 2432Pilot Light Pattern
Backup Configuration
Specify backup retention period and maintenance windows
Lesson 402Creating and Launching RDS Instances
Backup storage
for automated snapshots
Lesson 397RDS Architecture and Components
Backup strength
True backups are self-contained and can restore data even if the entire source infrastructure is gone.
Lesson 2417Backup vs. Snapshot: Understanding the Difference
Backups and archives
Store massive amounts of data cost-effectively
Lesson 115Object Storage Overview
Bad encapsulation
Exposing 30 variables that map directly to every resource argument, forcing users to understand your internal resource structure.
Lesson 807Module Encapsulation and Abstraction
Bake config into images
(inflexible, requires rebuilds)
Lesson 1247ConfigMap Fundamentals and Use Cases
Balance cost and coverage
Integration tests are expensive and slow.
Lesson 2882Integration Testing Strategies
Balanced
`maxSurge: 25%`, `maxUnavailable: 25%` (Kubernetes default)
Lesson 1167Rolling Update Strategy
Balanced requirements
(web servers, small databases, development environments) → **General Purpose** instances provide cost-effective, well-rounded resources.
Lesson 78Choosing Instance Types for Your Workload
Ban actions
Automatically block abusive sources
Lesson 2750Cloud Provider Rate Limiting Services
Bandwidth Savings
You pay less for origin bandwidth since the CDN handles delivery.
Lesson 582What is a CDN and Why Use OneLesson 1097Registry Mirroring and Caching
Bandwidth Usage
tracks data transferred in and out.
Lesson 2191NAT Gateway Monitoring
Bar charts
compare metrics (error rates across Lambda functions)
Lesson 673CloudWatch DashboardsLesson 2103Visualization Types and Best Practices
Base configurations
Common manifests shared across all clusters
Lesson 1945Multi-Cluster Management with Flux
base image
is the first layer—the foundation—of a container image.
Lesson 978Base Images and Parent LayersLesson 1024Base Image Selection
Base image lineage
parent layers your image inherited
Lesson 986Inspecting Image Layers
Base Image Policies
Only allow images built from approved base images (e.
Lesson 1084Compliance and Policy Enforcement
Base layers establish foundations
– system libraries, shells, package managers
Lesson 981Layer Order and Dependencies
Base manifests + overlays
Core Kubernetes YAML in one repo, Kustomize patches in another
Lesson 1893Multiple Source Applications
Baseline establishment
Historical cost data trains the detection model
Lesson 2150Cost Anomaly DetectionLesson 2969Cost Anomaly Detection
Baseline learning
The system learns your typical daily, weekly, and seasonal spending
Lesson 2987Cost Anomaly Detection Systems
Baseline scan
Image is scanned when first pushed
Lesson 1085Continuous Vulnerability Monitoring
Baseline Values
Establish acceptable ranges from historical data.
Lesson 2492Steady State Hypothesis
Basic Authentication
is the simplest approach: you provide a username and password to access the registry.
Lesson 1079Private Registry Authentication
Basic cache configuration
Lesson 1750Cache Configuration
Basic Options
Tags for organization, whether to enable features like DNS resolution, and flow logs for monitoring
Lesson 174Creating a Virtual Network
Basic scanning
Uses the open-source Clair scanner (now being phased out)
Lesson 1089ECR Image Scanning with Inspector
Batch
Processes historical data in bulk.
Lesson 2614Batch Processing Fundamentals
Batch secret retrieval
when multiple secrets are needed simultaneously
Lesson 2251Secrets Management Cost Optimization
Batching
Configure telemetry exporters to batch data before sending to collectors, reducing network calls.
Lesson 1643Observability Performance Impact
Batching and compression
grouping messages for efficiency
Lesson 2609Kafka Producers and Consumers
BBR
(Bottleneck Bandwidth and RTT) measure actual path capacity instead of inferring congestion from packet loss.
Lesson 2228TCP Performance Optimization
Be descriptive
`Backend-Developers` beats `Group7`
Lesson 350Creating and Organizing Groups
Be selective
Only preserve what's necessary (compiled binaries, test reports, deployment packages)
Lesson 1746Job Artifacts
Be specific early
narrow by time range first, then add filters
Lesson 2030Kibana Query Language (KQL)
Before Infrastructure Changes
Review planned changes to critical resources
Lesson 1844Manual Approval Actions
Before major changes
deploying a risky schema update
Lesson 424Manual Snapshots and Retention
Before production deployment
Review metrics, test results, or business readiness
Lesson 1662Manual Approval GatesLesson 1844Manual Approval Actions
Before promotion
block artifacts with critical issues from advancing to staging or production
Lesson 1679Artifact Security Scanning
Before/after views
Show the state pre- and post-deployment
Lesson 2104Time Series and Temporal Context
Behavior
Does this activity match normal patterns?
Lesson 2848Continuous Verification and Contextual Access
Behavior Analysis
Systems establish baselines of normal activity patterns—when users typically log in, which resources they access, typical data transfer volumes.
Lesson 2402Continuous Verification and Monitoring
Behavioral analysis
Mouse movements, JavaScript execution, browser fingerprints
Lesson 2372Rate Limiting and Bot ManagementLesson 2388Anycast and Traffic Scrubbing
Behavioral analytics
watches *how* identities behave over time—what they normally do, when, and from where—then flags deviations that suggest account takeover or insider threats.
Lesson 2858Behavioral Analytics and Anomaly DetectionLesson 2863Azure Security Center and Sentinel
Benchmark Regularly
Measure P50, P95, and P99 latency with and without instrumentation.
Lesson 2071Instrumentation Overhead
Benchmarking
measures performance against known standards or baselines.
Lesson 459Performance Testing and Benchmarking
Benefit
Maximum resource utilization and instant failover
Lesson 2451Redundancy Principles and Types
Best match
Object storage or file storage often excel here because they're optimized for moving large volumes of data efficiently.
Lesson 119Storage Access Patterns and Workload Types
Best practice violations
missing tags, hardcoded secrets, deprecated resource types
Lesson 2877Static Analysis and Linting
Best-Effort Ordering
Messages are generally delivered in the order sent, but this isn't guaranteed.
Lesson 555AWS SQS Standard Queues
Better access control
File permissions and ownership provide finer-grained control over who reads secrets.
Lesson 2271Volume-Mounted Secrets
Better availability
If one instance type is unavailable in an Availability Zone, Auto Scaling can try another from your list.
Lesson 309Mixed Instance Policies
Better cache efficiency
Higher overall hit rates across the CDN
Lesson 591Origin Shield and Cache Hierarchies
Better caching
– irrelevant file changes won't invalidate your cache
Lesson 1023Using .dockerignore
Better compliance
Required for many regulatory frameworks
Lesson 2811Network Optimization for Migration
Better cost predictability
Expenses align with actual business activity
Lesson 29CapEx vs OpEx: Financial Models in Cloud Computing
Better debugging
Examine actual payloads that caused failures
Lesson 500Dead Letter Queues
Better isolation
only containers on the same custom bridge can communicate
Lesson 1042Bridge Networks
Better parallelism
(Spark can process partitions independently)
Lesson 2622Batch Data Partitioning
Better parallelization
Multiple jobs execute simultaneously
Lesson 1760Pipeline DAG and Needs
Better resilience
Keeps traffic patterns predictable during zone failures
Lesson 1615Locality-Aware Load Balancing
Better scalability
The storage system doesn't need complex locking mechanisms
Lesson 145Object Immutability Concepts
Better security posture
Traffic never touches the public internet
Lesson 2211Private Connectivity Overview
Better separation of concerns
Different handlers for different message types
Lesson 2715Message Attributes and Filtering
Between Environments
Control promotion from staging to production
Lesson 1844Manual Approval Actions
Beyond retention
Delete permanently
Lesson 2055Log Retention and Storage Classes
BGP
with appropriate AS path prepending or local preference to control active/standby or active/active traffic distribution.
Lesson 2220Private Connectivity Redundancy
BGP (Border Gateway Protocol)
, each VPN gateway advertises routes with health checks.
Lesson 2200High Availability VPN Connections
BGP authentication
using MD5 passwords or TCP-AO to prevent route injection attacks.
Lesson 2223Private Connectivity Security
BGP peering sessions
for different traffic types:
Lesson 2204ExpressRoute Routing and BGP
BGP session health
Are routing protocols properly exchanging routes between environments?
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Bicep CLI
is your main command-line tool for compiling and validating Bicep files.
Lesson 922Bicep Tooling and CLI
Big Data Analytics
Processing large datasets with Apache Spark or Hadoop where keeping data in memory dramatically speeds up computation.
Lesson 68Memory Optimized Instance Types
BigQuery (Google Cloud)
for massive-scale analytics—its serverless query engine excels at petabyte datasets
Lesson 2754Multicloud Benefits: Best-of-Breed Services
Billing hour proximity
Choose instances closest to their next billing hour (cost optimization)
Lesson 319ASG Termination Policies
Billing mode
Pay-per-request is cost-effective for most use cases
Lesson 787DynamoDB for State Locking
Binaries
Compiled executables (`.
Lesson 1671What are Build Artifacts?
Binary Authorization
(already covered) to verify container images
Lesson 1488GKE Security: Private Clusters and Hardening
Binary data
can corrupt ConfigMaps if not properly encoded.
Lesson 1259ConfigMap Troubleshooting and Validation
Binary log replication
MySQL binlog, PostgreSQL logical replication, or Oracle GoldenGate
Lesson 2822Homogeneous Database Migration
bind mounts
for development convenience and specific host-path requirements.
Lesson 1038Bind MountsLesson 1039tmpfs MountsLesson 1053Volume Management in Compose
Bind them together
using IAM policy and annotation
Lesson 1481GKE Workload Identity
Binding mode settings
in your StorageClass
Lesson 1323Topology-Aware Volume Provisioning
Blackhole destinations
(packets disappearing at a specific point)
Lesson 2227Network Path Analysis and Traceroute
Blacklist (geo-blocking)
Everyone except these countries can access
Lesson 603Geographic Restrictions
Blacklisting
is the opposite—you specify which countries *cannot* access your content, while everyone else is allowed.
Lesson 592Geographic Restrictions and Content Blocking
Blackout periods
for critical business events
Lesson 1501AKS Cluster Upgrades and Maintenance
Blast radius concerns
arise when one mistake can affect your entire infrastructure.
Lesson 831Scaling Challenges and Patterns
Blast radius control
ensures experiments are safe.
Lesson 2490Introduction to Chaos Engineering
Blast Radius Limitation
If an attacker breaches one segment (say, a web server), they're trapped in that zone.
Lesson 2390Network Segmentation Fundamentals
Blast radius reduction
If something goes wrong in the database partition, your networking remains untouched.
Lesson 834State File PartitioningLesson 2262Dynamic Secrets Fundamentals
Blinking icon
Build currently in progress
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Blob triggers
Execute when files are added/modified
Lesson 511Azure Functions: Bindings and Triggers
Block I/O
Throttle read/write speeds to disk
Lesson 964Resource Limits with cgroups
Block IP addresses
at the firewall or WAF level
Lesson 2871Automated Incident Response
Block malicious traffic
(like DDoS attacks) early
Lesson 282Rate Limiting and Throttling at Load Balancer
Block merges
if cost increases exceed a threshold (e.
Lesson 2885Cost Estimation Testing
Block public access
unless explicitly required
Lesson 2844Secure by Default Configuration
Block the queue
(if ordering matters)
Lesson 2714Dead Letter Queues
Block unsigned images
(verifying they passed content trust checks like Notary)
Lesson 1078Admission Controllers for Image Policy
Blocking certain public IPs
Deny access to known malicious addresses
Lesson 1241IP Block Rules
Blocking I/O operations
– synchronous calls when async would work
Lesson 2547Execution Duration Optimization
Blocking non-compliant changes
in CI/CD pipelines
Lesson 2886Compliance Testing with Open Policy Agent
Blue Ocean
Modern, visual pipeline editor and dashboard
Lesson 1775Jenkins Plugins and Extensibility
blue-green deployment
uses your load balancer to maintain two complete, identical production environments—let's call them "Blue" (current) and "Green" (new).
Lesson 277Blue-Green Deployments with Load BalancersLesson 1767Deployment Strategies and Environments
Blue-Green deployment patterns
you've learned—the infrastructure changes, but feature flags control *what users experience*.
Lesson 1666Feature Flag Integration
Blue-green transitions
Gradually shift traffic between environments
Lesson 1605Traffic Splitting and Weighted Routing
Blue-green upgrades
involve creating an entirely new cluster (the "green" environment) running the target version, then migrating your workloads from the old cluster (the "blue" environment).
Lesson 1507In-Place vs Blue-Green Cluster Upgrades
Blue/Green Deployment
A completely new set of instances (green) is provisioned with the new version while the old instances (blue) continue running.
Lesson 1831CodeDeploy Overview and Deployment Types
Boolean constraints
Enable or disable a feature entirely (e.
Lesson 2344GCP Organization Policy Service
Boolean Filters
Accept all (`TrueFilter`) or none (`FalseFilter`)
Lesson 561Azure Service Bus Topics
Boolean logic
combines conditions:
Lesson 2030Kibana Query Language (KQL)
Boolean parameters
offer simple yes/no toggles for feature flags:
Lesson 1788Parameters and User Input
Bootable volumes
– you can install operating systems on block storage
Lesson 125Block Storage vs Other Storage Types
Bootstrapping
the Git connection, which means configuring Flux to watch a specific repository and sync its contents to your cluster
Lesson 1921Installing Flux on a Kubernetes Cluster
Bot management
goes deeper, analyzing request patterns to distinguish "good bots" (like search engine crawlers or monitoring tools) from "bad bots" (credential stuffers, scrapers, or DDoS participants).
Lesson 2372Rate Limiting and Bot Management
Both parties verify
the other's certificate against a trusted Certificate Authority (CA)
Lesson 1618Mutual TLS (mTLS) Fundamentals
Bottleneck Identification
These tools pinpoint exactly where traffic is blocked.
Lesson 2188Network Path Analysis Tools
Bottom tier
Individual Prometheus instances scrape application metrics
Lesson 1979Prometheus Federation Basics
Bottom-up approach
Migrate databases and backend services before the applications that consume them
Lesson 2829Dependency Mapping and Migration Order
Bounded Staleness
Reads might lag by a defined amount (time or number of versions).
Lesson 437Cosmos DB Consistency LevelsLesson 2709Cache Consistency and Trade-offs
Branch names
(run security scans only on `main`)
Lesson 1661Conditional Execution Pattern
Branch protection rules
prevent direct commits to `main` or `production` branches
Lesson 1874GitOps Access Control
Branch-based environments
Create separate Applications for `main`, `staging`, and `dev` branches, each pointing to different clusters.
Lesson 1908Git Generator Patterns
branches
to test infrastructure changes safely, then merge them after review—just like application code.
Lesson 687IaC Benefits: Version Control and CollaborationLesson 1908Git Generator Patterns
Branching
Test dashboard changes safely before merging
Lesson 2111Dashboard as Code and Version Control
Branching strategy
Development environment tied to feature branches, staging to main branch, production to tagged releases
Lesson 712Environment Separation Strategies
Breach impact grows
Unencrypted data stolen in a breach is immediately readable
Lesson 2839Encryption by Default
Break container isolation
Can access other containers' data
Lesson 1394Privileged Containers
Broadcast address
(last IP) - Network broadcast operations
Lesson 179Reserved IP Addresses in Subnets
Broadcasting updates
to multiple connected clients simultaneously
Lesson 525WebSocket API Support
Bronze
Raw ingested data (minimal transformation)
Lesson 2615Batch Processing Architectures
Brotli
before sending it to users' browsers.
Lesson 601Compression and Content Optimization
Browser/Client Cache
Stores static assets locally (Cache-Control headers)
Lesson 2708Multi-Layer Caching Strategies
Bucket
Fetches from S3-compatible storage
Lesson 1933Source Controller
Bucket capacity
Maximum tokens the bucket can hold.
Lesson 2745Token Bucket Algorithm
Buckets
are containers that hold objects.
Lesson 141Objects, Buckets, and Keys
Budget accountability
(managing spend within allocated budgets)
Lesson 2954Shared Responsibility Model
Budget alerts
when spending approaches thresholds
Lesson 2138Cloud Billing Structure Basics
Budget enforcement
Set alerts when a tagged group exceeds limits
Lesson 2141Tagging Strategy for Cost Allocation
Budgets
let you set spending thresholds with customizable alert rules.
Lesson 2173Azure Cost Management and Billing
Budgets API
Programmatically create and manage budgets
Lesson 2176Azure Cost Exports and APIs
Buffer Configuration
Reduce in-memory buffering if your backend can keep up.
Lesson 1442Logging Performance and Overhead
Buffer Pool Size
allocates memory for caching data pages.
Lesson 451Database Parameter Tuning
Buffer sizes
on both sender and receiver must be large enough to accommodate your bandwidth-delay product (BDP = bandwidth × RTT).
Lesson 2228TCP Performance Optimization
Buffering
Absorbing traffic spikes
Lesson 2602Streaming Architecture Patterns
Buffering and reliability
guarantees
Lesson 2038Fluentd and Fluent Bit Overview
Bug Fixes
Discovered your processing logic had a bug last month?
Lesson 2731Event Replay and Reprocessing
Build a Roadmap
Prioritize capabilities like any product backlog.
Lesson 2938Platform as a Product Mindset
Build and test
your artifact in early workflow jobs
Lesson 1725Deployment Strategies and Blue-Green Patterns
Build arguments
let you parameterize builds with variables, while **secrets** require special handling to prevent leaking credentials into image layers.
Lesson 1028Build Arguments and Secrets
Build artifacts
Compilers, build tools, and intermediate files needed only during image creation.
Lesson 985Layer Size and Bloat
Build confidence
in your circuit breakers, health checks, and failover automation
Lesson 2490Introduction to Chaos Engineering
Build Environment
details like builder version, build tools, timestamps, and build parameters complete the picture.
Lesson 1677Artifact Metadata and Traceability
Build Executor Status
Shows active builds running on agents
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Build isolation
Each build gets a fresh, clean environment
Lesson 1801Kubernetes Plugin for Dynamic Agents
Build metadata
version numbers, commit SHAs, build dates
Lesson 1124Annotations for Metadata
Build optimization
When building images, unchanged layers are reused from cache.
Lesson 975Image Layers: The Foundation
Build ordering
respects the dependency graph—you can't deploy Service C until Services A and B (its dependencies) have successfully deployed and passed their tests.
Lesson 1669Microservices Pipeline Orchestration
Build outputs
that don't change between identical code states
Lesson 1719Caching Dependencies and Build Artifacts
Build parameters
transform a single job into a flexible template that accepts input at runtime—like function arguments in programming.
Lesson 1778Build Parameters and Environment Variables
Build Provenance
includes the git commit SHA, branch name, repository URL, and the identity of who or what triggered the build.
Lesson 1677Artifact Metadata and Traceability
Build team confidence
in both the chaos tooling and recovery procedures
Lesson 2494Chaos Experiments in Non-Production
Build the new service
Create a microservice that implements that functionality
Lesson 2598Strangler Fig Pattern for Migration
Build timeline
Graphical view of build durations
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Build tools and integrations
(Git, Maven, Docker, Kubernetes)
Lesson 1775Jenkins Plugins and Extensibility
Build trust
with stakeholders who see security isn't an afterthought
Lesson 2836Security by Design
Build, Test, Deploy
pattern is the industry-standard workflow that ensures code quality gates before release.
Lesson 1740Basic Pipeline Patterns: Build, Test, Deploy
Built-in analytics rules
Pre-configured threat detection based on Microsoft's security research
Lesson 2863Azure Security Center and Sentinel
Built-in best practices
(security, compliance, observability)
Lesson 2940Golden Paths and Paved Roads
Built-in parsers
JSON, regex, and common log formats supported
Lesson 2027Fluent Bit for Edge Collection
Built-in proxy
A simple Go-based proxy included with Consul, suitable for development or basic workloads
Lesson 1594Consul Connect and Sidecar Proxies
Built-in redundancy
No need to buy duplicate hardware for failover
Lesson 28Understanding Total Cost of Ownership (TCO) in the Cloud
built-in roles
pre-configured sets of permissions that define what actions someone can perform on your cloud resources.
Lesson 387Azure Built-in RolesLesson 1890ArgoCD RBAC and User Management
Built-in Scaling
App Service can automatically scale your application up (more powerful instances) or out (more instances) based on traffic demand—similar to the elasticity and auto-scaling concepts you've learned, but without configuring virtual machine infrastru...
Lesson 101Azure App Service Overview
Built-in sources
Grafana's own alert events
Lesson 2000Annotations and Time Range Controls
Bulk operations
let you add or remove multiple users at once—essential for onboarding entire teams or responding to security incidents quickly.
Lesson 351Assigning Users to Groups
Burst allowances
Allow short traffic spikes but throttle sustained high volume
Lesson 282Rate Limiting and Throttling at Load BalancerLesson 2385Rate Limiting and Throttling
Burst capacity
A temporary allowance for sudden spikes (like filling a bucket that drains at the steady-state rate)
Lesson 531Throttling and Rate LimitingLesson 2540Serverless API Rate Limiting and Throttling
Burst into public cloud
when you need extra computing power temporarily
Lesson 22Hybrid Cloud Deployment Model
Burst tolerance
How much spike traffic you need to absorb
Lesson 2742Queue Depth and Capacity Planning
Burst traffic
– Many simultaneous requests trigger multiple cold starts
Lesson 463Cold Starts and Warm Starts
Burstable
AWS T-series credits = Azure B-series credits = (GCP uses different approach)
Lesson 109Cross-Provider Compute Feature Comparison
Burstable Performance
Lower baseline with occasional burst capacity for dev/test (e.
Lesson 399Database Instance Classes
Business
Product line, customer segment, department
Lesson 2633Data Partitioning StrategiesLesson 2948What is FinOps?
Business agility
requires rapid feature deployment and independent service updates
Lesson 2794Refactor/Re-architect StrategyLesson 2956Executive Buy-in and Sponsorship
Business Associate
) share legal responsibility.
Lesson 2327HIPAA for Healthcare Data
Business continuity
Leveraging cloud provider disaster recovery capabilities, global redundancy, and high availability without building it yourself.
Lesson 2790Introduction to Cloud Migration
Business criticality
– Lower-risk applications migrate first to build confidence and refine processes
Lesson 2812Migration Wave Planning and Execution
Business hours protection
Prevent risky changes during peak usage
Lesson 1898Sync Windows
Business Impact Analysis (BIA)
is the structured process of identifying and ranking your critical business functions, then mapping them to supporting IT systems to determine appropriate RTO and RPO values.
Lesson 2410Business Impact Analysis (BIA)
Business logic
Integrate with external databases or services for authorization
Lesson 1626External Authorization Integration
Business logic delays
Process refunds after return window closes
Lesson 2723Delay Queues and Message Timers
Business logic errors
Data that violates validation rules
Lesson 553Dead Letter Queues
Business Logic Validation
Run queries that verify business rules—account balances sum correctly, foreign key relationships intact, date ranges valid.
Lesson 2830Data Validation and Consistency Checks
Business operations
Orders placed, accounts created, payments processed
Lesson 638Custom Metrics and Instrumentation
Business requirements
Can your application tolerate stale data?
Lesson 2709Cache Consistency and Trade-offs
Business Risks
Extended downtime, loss of functionality, user disruption, compliance violations.
Lesson 2803Risk Assessment and Mitigation
Business Rule Validation
Apply domain logic—checking that prices are positive, dates fall within reasonable ranges, or required fields aren't null.
Lesson 2624Data Quality in Batch Pipelines
Business strategy
Roll out features gradually by region or enforce pricing tiers by geography.
Lesson 603Geographic Restrictions
Business units
(organizational divisions like "Product Engineering" or "Sales Operations")
Lesson 2965Cost Centers and Business Units
Business-unit waves
Migrate entire business units or product lines together to minimize cross-team coordination.
Lesson 2802Migration Wave Planning
By aggregate ID
All events for `Order-123` go to partition `hash(Order-123)`
Lesson 2739Event Store Implementation Patterns
By Capability
Run your ML training pipelines on Google Cloud (for strong AI/ML tools), host databases on AWS (for mature RDS offerings), and deploy static content on Azure (for CDN integration with your existing Microsoft stack).
Lesson 2761Multicloud Architecture Patterns: Workload Distribution
By File
Delete everything defined in a YAML file (reverses `kubectl apply`):
Lesson 1136Deleting Resources with kubectl delete
By function
Different groups for different services—one for SSH bastion hosts, another for internal APIs, another for batch processing jobs.
Lesson 2395Segmentation with Security Groups
By Geography
Use AWS in North America, Alibaba Cloud in China (for regulatory compliance), and Google Cloud in Europe—each serving their regional user base optimally.
Lesson 2761Multicloud Architecture Patterns: Workload Distribution
By Name
Remove specific resources directly:
Lesson 1136Deleting Resources with kubectl delete
By Selector
Remove multiple resources matching labels:
Lesson 1136Deleting Resources with kubectl delete
By tenant
Isolate customer data for security and performance
Lesson 2739Event Store Implementation Patterns
By tier
Create separate security groups for web, application, and database layers.
Lesson 2395Segmentation with Security Groups
By time
Archive older events to cold storage, keep recent ones hot
Lesson 2739Event Store Implementation Patterns
By Workload Type
Place latency-sensitive applications close to users on one provider, batch processing jobs on the cheapest provider, and GPU-intensive workloads where GPU availability and pricing are best.
Lesson 2761Multicloud Architecture Patterns: Workload Distribution
BYOL
lets you use existing on-premises licenses in the cloud.
Lesson 2162License Optimization
Byte Hit Ratio
Measures bandwidth saved.
Lesson 2680CDN Cache Analytics and Hit Rates
Bytes transferred
through a network interface
Lesson 1949Metric Types: Counter

C

CA bundle
The certificate authority used to verify your webhook's TLS certificate
Lesson 1411Webhook Configuration and Registration
CA unavailability
If the control plane is down, proxies can't renew certificates
Lesson 1628Certificate Rotation and Expiry
CaaS
is like a pod hotel—you get standardized, efficient rooms (containers) that are ready to use, but you still control what goes inside them
Lesson 18Container as a Service (CaaS) Introduction
CaaS sits in between
The cloud provider manages the container orchestration platform (the system that runs and coordinates your containers), while you maintain control over your containers' contents and configurations.
Lesson 18Container as a Service (CaaS) Introduction
Cache aggressively
Avoid recomputing or re-fetching the same data
Lesson 2165Cost-Aware Architecture PatternsLesson 2547Execution Duration Optimization
Cache Check
The edge server checks if it has the requested content cached (cache hit) or needs to fetch it from the origin (cache miss).
Lesson 586CDN Request Flow and Routing
Cache content
closer to users to reduce repeated transfers
Lesson 199Internet Connectivity Costs
Cache expiration
Setting time-to-live (TTL) values to refresh stale data automatically
Lesson 453Caching Strategies for Databases
Cache expires
after the TTL (Time To Live) period
Lesson 536API Gateway Caching
Cache Hit
The edge server *has* the requested content in its cache and can serve it immediately to the user without contacting the origin server.
Lesson 585Cache Hit vs Cache MissLesson 611Edge vs. Origin: The Request FlowLesson 2671CDN Caching Fundamentals ReviewLesson 2697Cache-Aside (Lazy Loading) Pattern
Cache hit/miss ratios
When caching is enabled, this shows effectiveness
Lesson 535API Gateway Monitoring and Logs
Cache invalidation
(also called **purging** or **clearing**) tells the CDN to immediately remove specific cached objects so the next request fetches fresh content from the origin.
Lesson 600Cache Invalidation and PurgingLesson 2594Distributed Caching Strategies
Cache invalidation coordination
Broadcasting cache-clear events across multiple application servers
Lesson 2685Redis Pub/Sub and Messaging
Cache key normalization
Treat `/product?
Lesson 621Edge Caching with Functions
Cache key patterns
matter enormously:
Lesson 1765Cache Optimization and Artifacts
Cache Miss
The edge server *does not* have the content in its cache, so it must fetch it from the origin server first, then deliver it to the user (and typically store it for future requests).
Lesson 585Cache Hit vs Cache MissLesson 600Cache Invalidation and PurgingLesson 611Edge vs. Origin: The Request FlowLesson 2671CDN Caching Fundamentals ReviewLesson 2697Cache- Aside (Lazy Loading) Pattern
Cache optimization
Override origin headers by setting `Cache-Control: max-age=3600` to cache content longer at the edge.
Lesson 604Response Header Customization
Cache partial responses correctly
each byte range is cached independently based on cache keys that include the range
Lesson 606Range Requests and Partial Content
Cache policy
How long to cache (TTL), which headers to respect
Lesson 595Cache Behavior Configuration
Cache secrets in memory
after retrieval (refresh periodically rather than per-request)
Lesson 2251Secrets Management Cost Optimization
Cache tags
If you've labeled content groups with custom headers
Lesson 600Cache Invalidation and Purging
Cache with query frontend
Use Grafana's caching features to reduce load on data sources.
Lesson 2003Grafana Best Practices and Performance
cache-control headers
come in—they're instructions that tell the CDN (and browsers) how long to store content before fetching a fresh copy.
Lesson 587TTL and Cache Control HeadersLesson 596TTL and Cache Control Headers
Cache-warming
solves this by deliberately requesting content before real traffic arrives, populating edge locations with "hot" cached copies.
Lesson 2676Cache-Warming and Preloading
caching
saves files—like package dependencies (`node_modules`, Python `pip` packages) or compiled code—between workflow runs.
Lesson 1719Caching Dependencies and Build ArtifactsLesson 2502API Gateway Integration Pattern
Cadence
are open-source alternatives that let you define workflows in general-purpose code (Go, Java, Python, TypeScript) that can run anywhere—on-premises, multi-cloud, or hybrid environments.
Lesson 2529Temporal and Alternative Orchestrators
Calculate error rates
(errors per total requests)
Lesson 667Log-Based Metrics and Alerting
Calculate monthly cost
$10,000 ÷ 12 months = $833.
Lesson 2148Amortizing Reserved Instance Costs
Calculates
what changes are needed
Lesson 774What is Terraform State
Calculates the diff
– Compares the two and determines what needs to be created, updated, or destroyed
Lesson 771terraform plan Explained
Calico
– Popular, feature-rich, excellent policy support
Lesson 1244NetworkPolicy CNI Requirements
Can preemption help
It identifies nodes where evicting lower-priority pods would free enough resources.
Lesson 1371Pod Preemption Behavior
Canary
and **Blue-Green deployment patterns** you've learned—the infrastructure changes, but feature flags control *what users experience*.
Lesson 1666Feature Flag IntegrationLesson 1835Blue/Green Deployments with CodeDeploy
Canary Deployment
Roll out changes to a small subset of users first (the "canary").
Lesson 1767Deployment Strategies and Environments
Canary Deployment Pattern
is a release strategy where you deploy new code to a small subset of users or servers before rolling it out to everyone.
Lesson 1665Canary Deployment Pattern
Canary releases
Route users with a `beta-tester: true` header to version 2.
Lesson 1604Request Routing Based on Headers and Paths
Cancel scheduled deletion
before the deadline expires
Lesson 2291Key Deletion and Recovery
Cancelled
Someone manually stopped the workflow or a timeout occurred (gray circle with slash)
Lesson 1694Workflow Status and Logs
Cannot aggregate
across instances (each calculates independently)
Lesson 1952Metric Types: Summary
Capacity buffer
If one instance fails, remaining instances absorb the load
Lesson 2457Load Distribution for Availability
Capacity expansion
Increase a volume's size (e.
Lesson 133Volume Resizing and Modification
Capacity metrics
Total size, used space, available space
Lesson 1324Volume Metrics and Monitoring
Capacity Planners
focus on trends over weeks or months—CPU usage growth, storage consumption—not minute-by- minute fluctuations.
Lesson 2100Dashboard Purpose and Audience
Capacity planning dashboards
inform infrastructure teams about growth trends
Lesson 2100Dashboard Purpose and Audience
Capacity Settings
– Your minimum, maximum, and desired instance counts
Lesson 313AWS Auto Scaling Groups (ASG) Overview
Capacity Units
Many serverless databases (like DynamoDB On-Demand or Aurora Serverless) use abstracted units that automatically adjust.
Lesson 2530Serverless Database Concepts
Capacity vs demand
Are you over-provisioned or under-provisioned?
Lesson 312Scaling Policy Monitoring
Capacity-optimized
Prioritizes pools with deepest capacity (lowest interruption likelihood)
Lesson 2978Spot Instance Fleet Management
CapEx
approaches where you'd purchase physical hardware for worst-case scenarios, leaving expensive equipment underutilized most of the time.
Lesson 32Elasticity and Cost Benefits of Auto-Scaling
Capital Expenditure (CapEx)
is money spent upfront to purchase physical assets.
Lesson 29CapEx vs OpEx: Financial Models in Cloud ComputingLesson 2799TCO Analysis for Migration
Capital expenses (CapEx)
Servers, storage, networking equipment, facility construction
Lesson 28Understanding Total Cost of Ownership (TCO) in the Cloud
Capture events
triggered by user actions or system changes
Lesson 2508Event Sourcing with Functions
Capture every state change
as an immutable event (e.
Lesson 573Event Sourcing Fundamentals
Capture logs immediately
before containers terminate
Lesson 2046Cloud-Native Logging Overview
Cascade effects
Did one failure trigger others?
Lesson 2500Measuring and Improving Resilience
Cascading failures
Overloaded consumers slow down, causing timeout errors upstream
Lesson 2740Understanding Backpressure in Distributed SystemsLesson 2744Rate Limiting Fundamentals
Case normalization
Treat `/Image.
Lesson 607Cache Key Normalization
Case-insensitive
for instructions, but UPPERCASE is convention
Lesson 1000Dockerfile Structure and Parsing
Cassandra API
Works with Apache Cassandra clients — column-family data model
Lesson 436Azure Cosmos DB: Architecture and APIsLesson 2534Azure Cosmos DB Serverless
catch blocks
(handle specific errors), and **fallback strategies** (alternative execution paths).
Lesson 2520Error Handling in State MachinesLesson 2526Workflow Monitoring and Debugging
Catch bugs early
Infinite loops or hanging operations fail fast
Lesson 476Function Timeout Configuration
Catch integration issues
Verify cross-resource dependencies and configurations in realistic conditions
Lesson 2883Ephemeral Test Environments
Catches delayed failures
(memory leaks, race conditions, external dependency issues)
Lesson 1173MinReadySeconds and Stability
Categorizes by complexity
– simple stateless apps vs.
Lesson 2797Migration Assessment Framework
Caution
All devices in the path must support the same MTU.
Lesson 2229MTU and Jumbo Frames
CDN Caching
places static or semi-static responses at edge locations worldwide.
Lesson 2549Caching Strategies in Functions
CDN Edge Cache
– Closest to users, handles the majority of traffic
Lesson 2681Multi-Tier Caching with CDNLesson 2708Multi-Layer Caching Strategies
CDN Integration
leverages Content Delivery Networks to distribute large artifacts globally.
Lesson 1681Artifact Distribution and Caching
Central storage
One source of truth for all your images
Lesson 1060What is a Container Registry
Centralize common patterns
Store policies in a version-controlled repository organized by compliance framework or control family (e.
Lesson 2347Policy Libraries and Reusability
Centralize standards
Ensure everyone uses the approved template, not old copies
Lesson 908Template Specs for Reusable Templates
Centralized access control
for all AWS services (EC2, S3, Lambda, RDS—everything)
Lesson 376AWS IAM Service Overview
Centralized authentication
Users sign in with Azure AD accounts
Lesson 1498AKS Integration with Azure Active Directory
Centralized backend configuration
One team manages the connection to AWS Secrets Manager, and all application teams reference it.
Lesson 1279ClusterSecretStore Resource
Centralized Configuration Management
Use tools like GitOps to maintain a single source of truth for cluster configurations.
Lesson 1513Multi-Cluster Management
Centralized control
One place to manage all encryption keys
Lesson 2280Introduction to Key Management Systems
Centralized dependency management
All teams access packages from a single source of truth, preventing "works on my machine" scenarios caused by different package versions.
Lesson 1815CodeArtifact: Artifact Repository Service
Centralized governance
Network admins control routing, DNS, and connectivity patterns
Lesson 230Shared VPCs and Multi-Account NetworkingLesson 2763Evaluating When Multicloud is the Right Strategy
Centralized logging
means all logs from all sources flow into a single, searchable repository.
Lesson 657Centralized Logging Concepts
Centralized permission sets
that define what users can do in each account
Lesson 383AWS IAM Identity Center (SSO)
Centralized policies
across dozens of resources
Lesson 2422Cloud-Native Backup Services Overview
Centralized policy enforcement
across your entire mesh
Lesson 1576Istio Overview and Core Value Proposition
Centralized policy management
across thousands of storage buckets and volumes
Lesson 2980Storage Lifecycle Optimization
Centralized routing
The transit gateway manages all inter-VPC traffic
Lesson 218Transit Gateway ConceptsLesson 2208Transit Gateway for Hybrid Networks
Centralized security policy
management
Lesson 253SSL/TLS Termination at ALB
Centralized service registry
A single source of truth (like Consul or a custom registry) that tracks services regardless of their cloud location.
Lesson 2784Multicloud Service Discovery
Centralized shipping
Each agent forwards collected logs to your chosen destination (Elasticsearch, Splunk, CloudWatch, etc.
Lesson 1434Node-Level Logging Agents
Centralized updates
Fix or improve in one place
Lesson 1716Workflow Templates and Reusable Workflows
Centralized visibility
into total cloud spend across the organization
Lesson 2147Multi-Account Cost Consolidation
Certificate age distribution
Are some services holding expired certificates?
Lesson 1628Certificate Rotation and Expiry
Certificate automation
The mesh handles certificate generation, rotation, and distribution
Lesson 1618Mutual TLS (mTLS) Fundamentals
Certificate expiration time
How much time remains before expiry
Lesson 1628Certificate Rotation and Expiry
Certificate expiry
mTLS certificates nearing expiration dates.
Lesson 1642Alerting on Service Mesh Metrics
Certificate management
Automatic rotation and distribution of security credentials
Lesson 1617Service Mesh Security Overview
Certificate managers
verifying certificates are issued and valid
Lesson 1914Resource Health Customization
Certificate problems
are frequent culprits.
Lesson 1630mTLS Troubleshooting and Verification
Certificate validation errors
Refuse connection rather than proceeding insecurely
Lesson 2837Fail Secure Principles
Certificate warnings
TLS Secret missing or misconfigured
Lesson 1232Ingress Troubleshooting
cgroups
, are a Linux kernel feature that put guardrails around resource consumption.
Lesson 964Resource Limits with cgroupsLesson 965Container Portability Benefits
Chaining
Execute functions in sequence, passing outputs to inputs
Lesson 512Azure Functions: Durable Functions
Challenge mechanisms
CAPTCHA, JavaScript puzzles, proof-of-work
Lesson 2372Rate Limiting and Bot Management
Change approval workflows
Require peer review before policy updates
Lesson 375Policy Documentation and Governance
Change Data Capture (CDC)
, meaning you can react to data changes in real-time without constantly polling your database.
Lesson 434DynamoDB Streams and Change Data CaptureLesson 2787Cross-Cloud Database ReplicationLesson 2825Continuous Data Replication for Databases
Change freeze periods
Block all syncs during critical business events
Lesson 1898Sync Windows
Change logs
Track major infrastructure changes and their rationale
Lesson 717Documentation and Comments
Change management and planning
in Infrastructure as Code means always knowing what will happen *before* you make changes to real systems.
Lesson 718Change Management and Planning
Change room layouts carefully
(type changes) — risky; needs explicit handling
Lesson 2638Schema Evolution and Versioning
change set
is like a "preview" or "diff" of what will happen when you update your stack.
Lesson 851Stack Updates and Change SetsLesson 878Stack Updates and Change Sets
Changes
Source control commits that triggered this build
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Changes cost per millisecond
Higher memory = higher per-ms cost, BUT faster execution may reduce total billable time
Lesson 475Function Memory and CPU Allocation
Channels
act as named message topics.
Lesson 2685Redis Pub/Sub and Messaging
Chaos engineering
flips this: it intentionally breaks things in production-like environments to discover **unknown weaknesses**.
Lesson 2491Chaos Engineering vs Traditional TestingLesson 2501Event-Driven Invocation PatternLesson 2776Portability Testing and Validation
chargeback
are two approaches for distributing cloud cost visibility internally, but they serve different purposes.
Lesson 2146Showback vs Chargeback ModelsLesson 2958Showback vs ChargebackLesson 2966Showback vs Chargeback Models
Chargeback/showback
Accurately bill internal teams or customers
Lesson 2141Tagging Strategy for Cost Allocation
Chart.yaml
Metadata about the chart (name, version, description, maintainers)
Lesson 1522Charts: Helm's Packaging Format
Check
Run `kubectl describe pod <pod-name>` and look for events like "0/5 nodes are available: 5 node(s) didn't match node selector" or "didn't match pod affinity rules.
Lesson 1359Affinity Troubleshooting
Check application logs
`kubectl exec my-pod -- cat /var/log/app.
Lesson 1140kubectl exec: Executing Commands in Containers
Check BGP
Verify peer status and advertised routes
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Check cache first
Application queries the cache with a key
Lesson 2697Cache-Aside (Lazy Loading) Pattern
Check cluster capacity
Use `kubectl top nodes` and review available resources
Lesson 1519Troubleshooting Common Cluster Issues
Check error logs
correlated with message timestamps
Lesson 2714Dead Letter Queues
Check for Explicit Allow
– If no explicit deny exists, AWS looks for at least one policy that explicitly allows the action.
Lesson 381AWS IAM Policy Evaluation Logic
Check for Explicit Deny
– If *any* policy explicitly denies the action, access is **immediately blocked**.
Lesson 381AWS IAM Policy Evaluation Logic
Check Frequency Trade-offs
Frequent checks (every 5 seconds) detect failures faster but consume resources.
Lesson 2455Health Checks and Failure Detection
Check interval
for monitoring
Lesson 1612Circuit Breaking Patterns
Check network exposure
for overly permissive security groups or public access
Lesson 2868Vulnerability Scanning and Management
Check real dependencies
A liveness probe should verify the application process itself works.
Lesson 1427Designing Effective Health Check Endpoints
Checkov
is a policy-as-code tool that scans Terraform, CloudFormation, Kubernetes manifests, and more.
Lesson 2884Security Scanning in IaC Tests
checkpoints
progress, so if a function restarts mid-workflow, it resumes from the last checkpoint without re- executing completed steps.
Lesson 512Azure Functions: Durable FunctionsLesson 2835Separation of Duties
Checks local storage
for any matching layers (by digest)
Lesson 994Pulling Images from Registries
Checksum and Hash Validation
Generate checksums (MD5, SHA-256) on data blocks or entire tables.
Lesson 2830Data Validation and Consistency Checks
Checksum Comparison
Generate cryptographic hashes of data blocks at both sites and compare them to detect any differences.
Lesson 2444Data Consistency Validation
Child image build
Child specifies `FROM your-base-image`
Lesson 1014ONBUILD: Triggered Instructions
Child instructions continue
Child's own instructions then proceed normally
Lesson 1014ONBUILD: Triggered Instructions
Child modules
are separate, self-contained configurations that the root module calls to create reusable infrastructure patterns.
Lesson 800Root Module vs Child Modules
Child Process Inheritance
Environment variables are inherited by all child processes, spreading secrets throughout your process tree.
Lesson 2270Environment Variables for Secrets
Choice
states add branching logic based on input
Lesson 2517AWS Step Functions Overview
Choice parameters
provide a dropdown of predefined options, ensuring valid selections:
Lesson 1788Parameters and User Input
Choose a domain name
(like `mycompany.
Lesson 224Private Hosted Zones
Choose appropriate replication
– Only replicate secrets that truly need multi-region availability
Lesson 2251Secrets Management Cost Optimization
Choose cost-effective metrics
Target tracking on CPU or request count often works better than complex custom metrics that might keep instances running longer than necessary.
Lesson 311Scaling for Cost Optimization
Choose lightweight libraries
– When possible, select slim alternatives to bulky frameworks.
Lesson 485Function Packaging and Deployment Size
Choose Managed Node Groups
when you want simplicity, automatic updates, and standard workloads.
Lesson 1464EKS Node Groups: Managed vs Self-Managed
Choose Self-Managed Nodes
when you need custom AMIs, specialized hardware (GPUs, ARM), specific kernel parameters, or tight control over node lifecycle.
Lesson 1464EKS Node Groups: Managed vs Self-Managed
Choose the right runtime
Compiled languages (Go, Rust) typically execute faster than interpreted ones (Python, Node.
Lesson 2547Execution Duration Optimization
Choose time granularity
Daily, weekly, monthly, or custom periods
Lesson 2151Custom Cost Reports and Export
Choose visualizations
column charts, area charts, or pivot tables
Lesson 2174Azure Cost Analysis and Views
Choosing poorly
means "hot partitions"—imagine if 80% of customers had the same ID!
Lesson 438Cosmos DB Partitioning and Request Units
CI runs constantly
on every small commit to main
Lesson 1668Trunk-Based vs GitFlow Patterns
CI/CD
Automated pipelines pull images for testing and push successful builds
Lesson 988Container Registry FundamentalsLesson 2154Spot Instances and Preemptible VMs
CI/CD > Pipelines
, then selecting any pipeline to see its detailed graph view.
Lesson 1739Pipeline Visualization and Job Logs
CI/CD Analytics
(found in your project's sidebar).
Lesson 1768Pipeline Performance Monitoring
CI/CD integration
Embedding pipeline status from Jenkins, GitHub Actions, GitLab CI, or ArgoCD directly in service catalog pages
Lesson 2934Integrating CI/CD and Observability
CI/CD pipeline integration
schedules tests (weekly, nightly) and provides visibility into results.
Lesson 2906Automated DR Test Frameworks
CI/CD Pipeline Portability
means structuring your deployment automation so it can target multiple clouds through conditional logic and environment abstraction.
Lesson 2775CI/CD Pipeline Portability
CIDR notation
(Classless Inter-Domain Routing) — a compact way to describe entire blocks of IP addresses at once.
Lesson 172IP Address Ranges and CIDR Notation
Cilium
– Modern, eBPF-based, high performance
Lesson 1244NetworkPolicy CNI Requirements
circuit breaker
is a design pattern that monitors calls to downstream services and "trips" (opens) when failures exceed a threshold.
Lesson 501Circuit Breaker PatternLesson 2497Application and State ChaosLesson 2583Bulkhead Pattern for IsolationLesson 2748Throttling and Circuit Breaker Patterns
Circuit Breaker for Functions
knowledge to create resilient background processing.
Lesson 2551Asynchronous Processing Patterns
Circuit Breaker Pattern
(from your previous lesson) to stop retries when a service is definitively down.
Lesson 2582Retry and Timeout StrategiesLesson 2588Circuit Breaker PatternLesson 2589Bulkhead Pattern for Isolation
circuit breakers
if many backends start failing simultaneously, keep them in rotation rather than removing all of them
Lesson 285Advanced Health Check StrategiesLesson 2458Graceful Degradation PatternsLesson 2748Throttling and Circuit Breaker Patterns
Circular dependencies
(errors that prevent execution)
Lesson 829Terraform Graph and Visualization
Citadel
(certificate authority for mTLS), and **Galley** (configuration validation).
Lesson 1577Istio Control Plane Components
Classic Load Balancers
(legacy): You directly attach the classic load balancer to the ASG.
Lesson 320ASG Integration with Elastic Load Balancing
Classification
Automatically detect and tag sensitive data like credit cards or emails
Lesson 2637Data Catalog and Metadata Management
Clean separation
No mixed-version states
Lesson 1664Blue-Green Deployment Pattern
Cleaner revision history
– one revision for related changes
Lesson 1171Pausing and Resuming Rollouts
Cleanup
Delete temporary files, stop test containers, or free workspace resources.
Lesson 1790Post Actions and Notifications
Cleanup automation
Delete logs or temporary files after a set period
Lesson 158Object Lifecycle Policies
Cleanup tasks
Deleting expired records, archiving logs, or purging temp files
Lesson 2510Scheduled Job Pattern
Cleanup with defer
ensures isolated test runs don't leave orphaned resources consuming costs.
Lesson 841Testing at Scale with Terratest
Clear dependencies
Explicit relationships between jobs
Lesson 1760Pipeline DAG and Needs
Clear deployment practices
– Forces proper version control and intentional updates
Lesson 1255Immutable ConfigMaps
Clear handoffs
Document ongoing issues before rotation changes
Lesson 2127On-Call Rotation Structures
Clear Naming Conventions
Use descriptive resource names with consistent patterns.
Lesson 919ARM Template Best Practices and Validation
Clear ownership
Developers own app repos; platform/ops teams own config repos.
Lesson 1866GitOps Repository StructureLesson 2560Service Boundaries and Decomposition
Clear ownership boundaries
so teams know which directories they manage
Lesson 833Repository Structure for Large Projects
CLI flags
One-off overrides, automation scripts, sensitive values
Lesson 760Passing Variables: CLI and tfvars Files
CLI scripting
enables you to wrap provider tools (like AWS CLI or Azure CLI) into shell scripts that execute multi-step procedures: snapshot creation, validation checks, cutover sequences, and rollback procedures.
Lesson 2816Migration Automation and Scripting
CLI tool
(what you interact with) and the **Go library** that powers it.
Lesson 1521Helm Architecture: Client and Library
Click individual jobs
to expand step-by-step logs
Lesson 1694Workflow Status and Logs
client
that communicates with the **Kubernetes API server** (which you learned about in previous lessons).
Lesson 1130What is kubectl and Its RoleLesson 2575Service Discovery Patterns
Client config
Where to reach your webhook service (typically a Kubernetes Service with TLS)
Lesson 1411Webhook Configuration and Registration
Client initiates connection
and sends its certificate
Lesson 1618Mutual TLS (mTLS) Fundamentals
Client-side encryption
(you encrypt before uploading)
Lesson 122Storage Security Basics
Client-side tokens
carry authentication details
Lesson 42Stateless Application Design
ClientIP-based
affinity.
Lesson 1215Session Affinity
Clock skew
Mismatched system clocks between nodes can cause premature expiration
Lesson 1628Certificate Rotation and Expiry
ClosestToNextInstanceHour
Minimizes cost by terminating instances near their billing hour
Lesson 308Scale-In Protection and Termination
Cloud agents
Dynamically provisioned (Docker, Kubernetes, EC2)
Lesson 1779Jenkins Build Agents and Executors
Cloud Audit Logs
(GCP), or **Azure Monitor** to track every query execution—who ran it, when, what data accessed, and whether it succeeded.
Lesson 2669Serverless Query Engine Security
Cloud Billing reports
and **dashboards**, which work together to give you a comprehensive view of your spending patterns.
Lesson 2177Google Cloud Cost Management
Cloud Custodian
, **Azure Policy**, **GCP Organization Policy Service**, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
Lesson 2345Continuous Compliance Scanning
Cloud Debugger
Inspects application state in production without stopping code
Lesson 679Google Cloud Operations Suite Overview
Cloud Function
responds to the message and executes rotation logic:
Lesson 2247GCP Secret Manager Rotation Strategies
Cloud Functions
capture invocation traces out-of-the-box
Lesson 2094Google Cloud Trace
Cloud implementation
Use a public subnet with ALB/NLB, connecting to application servers in private subnets.
Lesson 2845Security Architecture Patterns
Cloud Integration
simplifies deployment.
Lesson 2099Trace Backend Selection Criteria
Cloud Interconnect (GCP)
are dedicated private network connections between your on-premises datacenter and cloud provider.
Lesson 2811Network Optimization for Migration
Cloud Logging
(formerly Stackdriver) captures all function logs with structured data support, making filtering and analysis straightforward.
Lesson 518Provider-Specific Monitoring and ObservabilityLesson 679Google Cloud Operations Suite Overview
Cloud Logging and Monitoring
for observability
Lesson 1475GKE Overview and Architecture
Cloud Profiler
Continuous CPU and memory profiling
Lesson 679Google Cloud Operations Suite Overview
Cloud Provider
Secures the infrastructure (physical data centers, network hardware, hypervisors, encryption services like KMS)
Lesson 2322Introduction to Compliance in Cloud
Cloud provider adapters
(AWS CloudWatch, Azure Monitor, GCP Stackdriver)
Lesson 1453External Metrics and HPA
Cloud provider APIs
to query resource metadata (creation date, attachment status, metrics)
Lesson 2986Idle Resource Detection and Cleanup
Cloud Provider Auth
AWS IAM, Azure Managed Identity, and GCP Service Accounts can authenticate directly.
Lesson 2256Vault Authentication Methods Overview
Cloud Provider Drivers
(AWS EBS CSI, Azure Disk CSI, GCP PD CSI)
Lesson 1327CSI Driver Selection and Comparison
Cloud provider entropy pools
Managed sources that continuously collect environmental noise
Lesson 2284Key Generation and Randomness
Cloud provider integration
(automatically creating cloud disks)
Lesson 1303StorageClass FundamentalsLesson 2278Container Registry Authentication
Cloud provider reserved
(often fourth IP) - For future cloud services
Lesson 179Reserved IP Addresses in Subnets
Cloud registry caching
Azure Container Registry, AWS ECR, GCP Artifact Registry all offer pull-through cache features
Lesson 997Registry Mirroring and Caching
Cloud resources
Databases (RDS, Cloud SQL), storage buckets, load balancers, IAM roles
Lesson 2932Kubernetes and Cloud Resource VisualizationLesson 2965Cost Centers and Business Units
Cloud Router
Acts as your BGP routing endpoint in Google Cloud.
Lesson 2206Interconnect VLAN Attachments
Cloud Run
Fully serverless—logs from your containerized apps automatically appear in Cloud Logging with zero configuration.
Lesson 2054Google Cloud Logging (Operations)
Cloud Scheduler
triggers a Pub/Sub topic on a schedule (e.
Lesson 2247GCP Secret Manager Rotation Strategies
Cloud SQL
uses Cloud KMS for encrypting database instances.
Lesson 2321GCP Cloud KMS Integration and HSM
Cloud storage
S3, Azure Blob, GCS for managed durability
Lesson 2253Vault Architecture and Components
Cloud storage drivers
Connect to AWS EBS, Azure Disk, Google Persistent Disk
Lesson 1040Volume Drivers and Plugins
Cloud Storage Events
Your function fires when objects are created, deleted, or updated in a bucket.
Lesson 515Google Cloud Functions: Event-Driven Architecture
Cloud Trace
adds distributed tracing capabilities, showing the complete request path across multiple functions and services.
Lesson 518Provider-Specific Monitoring and ObservabilityLesson 679Google Cloud Operations Suite Overview
Cloud VPN Gateway
This is the cloud provider's end of the tunnel—a managed service that terminates your VPN connection in the cloud.
Lesson 2199VPN Gateway Configuration
Cloud-agnostic observability
Metrics, traces, and logs collected uniformly regardless of underlying infrastructure
Lesson 2769Service Mesh for Portability
Cloud-config
– A YAML-based declarative format that's more powerful:
Lesson 87User Data and Cloud-Init
Cloud-native APIs
for dynamic path selection based on cloud resource health
Lesson 2209SD-WAN Integration with Cloud
Cloud-native approach
Applications write to stdout/stderr.
Lesson 666Cloud-Native Logging Standards
Cloud-Provider Implementations
(like AWS ALB Ingress Controller, GKE Ingress, Azure Application Gateway) integrate directly with your cloud provider's native load balancers.
Lesson 1230Ingress Controller Options
CloudEvents
specification—an industry-standard format for describing events.
Lesson 515Google Cloud Functions: Event-Driven Architecture
CloudExchange Co-location
Direct connection at a facility where both you and Azure have presence
Lesson 2215Azure ExpressRoute Fundamentals
Cloudflare
offers a generous free tier and emphasizes security features like DDoS protection and Web Application Firewall (WAF) alongside content delivery.
Lesson 594Popular CDN Providers OverviewLesson 2389DDoS Testing and Simulation
CloudFormation Console
Real-time event stream showing color-coded status
Lesson 887Stack Events and Monitoring
CloudFormation stack
is what happens when AWS reads your template and provisions those resources in your account.
Lesson 846CloudFormation Templates and Stacks
CloudFormation template
is a text file that declares what infrastructure you want—EC2 instances, S3 buckets, VPCs, databases, and their configurations.
Lesson 846CloudFormation Templates and Stacks
CloudFront (CDN)
WAF rules execute at AWS edge locations globally, filtering malicious traffic before it crosses the internet to your origin servers
Lesson 2368AWS WAF Fundamentals
CloudFront Functions
execute in **under 1 millisecond** with strict limits: maximum 2MB memory, 10KB code size, and sub-millisecond runtime.
Lesson 615CloudFront Functions vs Lambda@Edge
CloudTrail
(AWS), **Cloud Audit Logs** (GCP), or **Azure Monitor** to track every query execution—who ran it, when, what data accessed, and whether it succeeded.
Lesson 2669Serverless Query Engine Security
CloudTrail Lake
, and **EventBridge integration** transform CloudTrail from a passive recorder into an intelligent compliance and security engine.
Lesson 2358AWS CloudTrail Deep Dive
CloudWatch Alarms
monitor metrics and trigger notifications or automated actions when thresholds are crossed, connecting directly to the alarm concepts you've already learned.
Lesson 668AWS CloudWatch Overview
CloudWatch and X-Ray
Built-in metrics and distributed tracing without additional configuration
Lesson 1595AWS App Mesh Overview
CloudWatch Dashboards
provide customizable visual displays of your metrics and logs, giving you at-a-glance health views.
Lesson 668AWS CloudWatch Overview
CloudWatch Events
, enabling real-time responses.
Lesson 1818Integration Between AWS Code Services
CloudWatch Logs
, where every console output from your function appears.
Lesson 518Provider-Specific Monitoring and ObservabilityLesson 668AWS CloudWatch Overview
CloudWatch Logs Insights
lets you query these logs with SQL-like syntax to find patterns, errors, or specific execution traces.
Lesson 518Provider-Specific Monitoring and ObservabilityLesson 2355Audit Log Analysis and Search
CloudWatch Metrics
track numerical data points over time (CPU usage, request counts, error rates).
Lesson 668AWS CloudWatch Overview
CloudWatch/Azure Monitor
for utilization metrics (CPU, network, IOPS)
Lesson 2986Idle Resource Detection and Cleanup
Cluster
Speed matters most (HPC, ML training)
Lesson 106AWS Placement Groups
Cluster Autoscaler events
Review logs for scale-up failures or quota issues
Lesson 1519Troubleshooting Common Cluster Issues
Cluster bootstrap
Each cluster runs its own Flux installation, pointed to the same repo but different paths
Lesson 1945Multi-Cluster Management with Flux
Cluster communication
between compute nodes
Lesson 2229MTU and Jumbo Frames
Cluster federation
provides a control layer that sits above individual clusters, letting you manage them as a logical group.
Lesson 1514Cluster Federation Basics
Cluster Fleets
Treat clusters as a fleet rather than individuals.
Lesson 1513Multi-Cluster Management
Cluster-level logging
aggregates logs from all nodes into a centralized system.
Lesson 1433Logging Architecture in KubernetesLesson 2049Kubernetes Logging Architecture
Cluster-Level Resource
PVs exist at the cluster scope, not within a specific namespace.
Lesson 1289PersistentVolume (PV) Fundamentals
Cluster-per-environment
Separate clusters for dev, staging, prod
Lesson 1871Multi-Cluster GitOps
cluster-scoped resources
(like Nodes, PersistentVolumes, or Namespaces themselves)
Lesson 1377Role vs ClusterRoleLesson 1382Creating a ClusterRole
Cluster-specific overlays
Kustomizations that modify the base for each cluster's needs (replica counts, regions, resource limits)
Lesson 1945Multi-Cluster Management with Flux
Cluster-wide access
to namespaced resources (like viewing Pods across all namespaces)
Lesson 1377Role vs ClusterRole
Cluster-Wide Health
aggregates everything: total resource utilization, deployment rollout status, and cross-node networking issues.
Lesson 1518Observability for Cluster Operations
Cluster-wide impact
Attackers could pivot to other nodes
Lesson 1394Privileged Containers
Cluster-wide permissions
– Grant access to non-namespaced resources (like nodes, persistent volumes) or all namespaces at once
Lesson 1382Creating a ClusterRole
Clustered applications
that manage their own data synchronization (like clustered databases)
Lesson 135Multi-Attach Volumes
ClusterIP
is the default Service type in Kubernetes.
Lesson 1204ClusterIP Service Type
ClusterRole
Grants permissions *cluster-wide* or on non-namespaced resources.
Lesson 1375RBAC API Objects OverviewLesson 1377Role vs ClusterRoleLesson 1382Creating a ClusterRole
ClusterRoleBinding
Binds a ClusterRole to subjects *cluster-wide*.
Lesson 1375RBAC API Objects OverviewLesson 1383ClusterRoleBinding Usage
ClusterRoleBindings
define *who* can do it.
Lesson 1375RBAC API Objects Overview
ClusterRoles
define *what* can be done, while **RoleBindings** and **ClusterRoleBindings** define *who* can do it.
Lesson 1375RBAC API Objects OverviewLesson 1377Role vs ClusterRoleLesson 1388RBAC Best Practices
Clusters
Define the API server endpoints (where the cluster lives)
Lesson 1132Kubeconfig Files and Contexts
CNI plugin issues
Check VPC CNI (EKS), Azure CNI, or GKE network plugin logs
Lesson 1519Troubleshooting Common Cluster Issues
Code conversion
Translate stored procedures, functions, triggers, and views
Lesson 2824Schema Conversion Tools
Code loading
– Downloading your function package
Lesson 463Cold Starts and Warm Starts
Code quality issues
(duplicated code, complex methods)
Lesson 1816CodeGuru: AI-Powered Code Review
Code vs Deployment
Developers write code but cannot deploy to production; DevOps engineers deploy but don't write application logic.
Lesson 2835Separation of Duties
Code-based
Write workflows in your application language, not configuration files
Lesson 2529Temporal and Alternative Orchestrators
CodeArtifact
charges for **storage** (GB-month) and **data transfer** out of AWS.
Lesson 1820Pricing Model for AWS Code Services
CodeBuild
is a fully managed continuous integration service that compiles your source code, runs unit tests, and produces deployment-ready artifacts.
Lesson 1812CodeBuild: Managed Build Service OverviewLesson 1820Pricing Model for AWS Code ServicesLesson 1830CodeBuild with Docker and ECR
CodeBuild project
Which project contains your buildspec
Lesson 1842Build Stage with CodeBuild Integration
CodeBuild role
Permissions to pull source code, push build artifacts, access CodeArtifact, write logs to CloudWatch, and pull Docker images from ECR
Lesson 1819IAM Roles and Permissions for Code Services
CodeDeploy
is **free for EC2 and on-premises deployments**.
Lesson 1820Pricing Model for AWS Code Services
CodeDeploy role
Permissions to update EC2 instances, Lambda functions, or ECS services, plus read deployment configurations
Lesson 1819IAM Roles and Permissions for Code Services
CodeDeployDefault.AllAtOnce
– Updates all instances simultaneously.
Lesson 1836Deployment Configurations and Rollback
CodeDeployDefault.HalfAtATime
– Updates 50% of instances, waits for success, then updates the remaining 50%.
Lesson 1836Deployment Configurations and Rollback
CodeDeployDefault.OneAtATime
– Updates one instance at a time.
Lesson 1836Deployment Configurations and Rollback
CodeGuru
provides AI-powered code reviews.
Lesson 1810Introduction to AWS Developer Tools Ecosystem
CodeGuru Profiler
(for runtime performance analysis).
Lesson 1816CodeGuru: AI-Powered Code Review
CodeGuru Reviewer
(for code quality) and **CodeGuru Profiler** (for runtime performance analysis).
Lesson 1816CodeGuru: AI-Powered Code Review
CODEOWNERS files
automatically assign reviewers based on which files changed (e.
Lesson 1874GitOps Access Control
CodePipeline
charges per **active pipeline per month**.
Lesson 1820Pricing Model for AWS Code Services
CodePipeline role
Permissions to invoke CodeBuild, access source repositories (CodeCommit), trigger CodeDeploy, and read/write pipeline artifacts in S3
Lesson 1819IAM Roles and Permissions for Code Services
Cognitive Load
quantifies the mental burden on developers.
Lesson 2916Developer Experience Goals
Cohesive services
, by contrast, group related capabilities around a business domain.
Lesson 2564Service Size and Granularity
Cold standby
Infrastructure definitions and recent backups ready to deploy, but not running until needed
Lesson 2760Multicloud Architecture Patterns: Active-Passive
Cold start frequency
at different loads
Lesson 2554Performance Testing and Benchmarking
Cold start performance
(some languages start faster than others)
Lesson 471Function Runtime Environments
Cold/Archive
Hours to retrieve, lowest cost (compliance/long-term)
Lesson 2055Log Retention and Storage ClassesLesson 2157Object Storage Cost Optimization
Cold/Archive storage
For rarely accessed data like compliance records or backups.
Lesson 148Storage Classes Introduction
Cold/Archive tier
Rarely accessed data on low-cost, high-latency storage
Lesson 2980Storage Lifecycle Optimization
Collaborative editing
tools where multiple users see changes immediately
Lesson 525WebSocket API Support
Collection
Agents (covered in "Log Collection Agents") run on each host, tailing log files or capturing streams.
Lesson 665Log Aggregation PipelinesLesson 1438Fluentd and Fluent Bit
Collection functions
work with lists and maps to merge, filter, or lookup values
Lesson 736Built-in Functions OverviewLesson 824Terraform Functions for Data Transformation
Collection layer
Ensure logging agents only access logs from their designated namespace
Lesson 2058Multi-Tenancy and Log Isolation
Collector
is a standalone service that receives telemetry from applications, processes it (filtering, batching, enriching), and forwards it to backends.
Lesson 2074OpenTelemetry Architecture and Components
Collects
logs from all your sources (applications, servers, containers)
Lesson 665Log Aggregation Pipelines
Collects entropy
from multiple hardware sources
Lesson 2284Key Generation and Randomness
Collects system metrics
CPU, memory, disk, and network usage at cluster, node, and pod levels
Lesson 1487GKE Monitoring with Cloud Monitoring
Colocation (colo) facilities
are data centers where you can physically place your own network equipment (routers, switches) alongside equipment from cloud providers, ISPs, and other enterprises.
Lesson 2222Private Peering and Exchange Points
Color Coding
is the most common approach:
Lesson 2106Threshold Indicators and Alerts
Colorblind-Friendly Palettes
The most common form is red-green colorblindness.
Lesson 2105Color Theory and Accessibility
Column customization
Add relevant fields to see structured data at a glance
Lesson 2029Kibana Index Patterns and Discover
Columnar formats (Parquet, ORC)
Store data by column rather than row.
Lesson 2660Querying Data Formats in Athena
Columnar Storage
Data is stored in a highly compressed columnar format optimized for analytical workloads, enabling fast scans of specific columns across billions of rows.
Lesson 2636Google BigQuery Fundamentals
Combine related commands
using `&&`:
Lesson 1002RUN: Executing Commands
Combine with NOT
`not status: 200` excludes successful requests
Lesson 2030Kibana Query Language (KQL)
Combine with spot instances
Use mixed instance policies to incorporate cheaper spot instances where your workload can tolerate interruptions.
Lesson 311Scaling for Cost Optimization
Combines with other patterns
Often used alongside Cache-Aside or Read-Through
Lesson 2701Refresh-Ahead Caching Pattern
Command execution
Does a command inside the container exit successfully?
Lesson 1420Liveness Probes Fundamentals
Command exit code 1
Exec probe script failing
Lesson 1430Debugging Failed Probes
Command history
the exact `RUN`, `COPY`, and `ADD` instructions from the build
Lesson 986Inspecting Image Layers
Command Query Responsibility Segregation
.
Lesson 2727CQRS Pattern Basics
Command-line arguments
injecting parameters into container commands
Lesson 1247ConfigMap Fundamentals and Use Cases
Commit messages
(skip tests if message contains `[skip ci]`)
Lesson 1661Conditional Execution Pattern
Commit the SealedSecret
YAML to your Git repository
Lesson 2277Sealed Secrets for GitOps
Committed Use Discounts
when you commit to using specific resources for 1 or 3 years.
Lesson 2179GCP Committed Use Discounts and Budgets
Common architecture
Fluent Bit collects at the edge → forwards to Fluentd → Fluentd aggregates, transforms, and routes to backends.
Lesson 2038Fluentd and Fluent Bit Overview
Common AWS-specific types include
Lesson 862Parameter Types and Validation
Common condition types
Lesson 394GCP IAM Conditions
Common environment variables
or volume mounts
Lesson 1557Advanced Templating with Named Templates
Common in
AWS Kinesis (default), Azure Event Hubs, basic message queues
Lesson 2603At-Least-Once vs Exactly-Once Semantics
Common normalization strategies
Lesson 607Cache Key Normalization
Common pattern
Create specific deny rules for known bad actors, then broader allow rules for legitimate traffic.
Lesson 208NACL Allow and Deny Rules
Common use case
Node maintenance or degradation.
Lesson 1365Toleration Seconds and Eviction Grace Period
Communicates
with a specific platform's API (AWS, Azure, GCP, etc.
Lesson 724Installing Terraform and Provider Basics
Communication
Share the plan with teammates for review
Lesson 698Planning and PreviewLesson 2555What Are Microservices?
Communication plans
Who does what during an incident
Lesson 2405What is Disaster Recovery (DR)?
Compaction
is a special retention mode that keeps only the *latest value* for each message key.
Lesson 2610Kafka Retention and Storage
Compaction overhead
background operations that merge data blocks consume significant resources
Lesson 1977Challenges of Running Prometheus at Scale
Compactor
Runs maintenance tasks on object storage—downsampling data for faster queries over long time ranges and compacting small blocks into larger ones.
Lesson 1982Thanos Architecture OverviewLesson 2035Loki Components and Deployment Modes
Compares
your desired configuration against what actually exists
Lesson 774What is Terraform State
compensating transaction
is a specific action that reverses the effect of a previously completed operation.
Lesson 2587Compensating TransactionsLesson 2735Compensating Transactions
Competing Consumers Pattern
solves the problem of processing high volumes of messages efficiently.
Lesson 2720Competing Consumers Pattern
Compiles the code
using your specified runtime environment
Lesson 1822CodeBuild Overview and Core Concepts
Complete
Once all parts arrive, you tell the service "assemble these pieces into the final object"
Lesson 166Multipart UploadLesson 912Deployment Modes: Complete vs Incremental
Complete control
Custom configurations that public clouds don't easily support
Lesson 21Private Cloud Deployment Model
Complete History
Every state change is preserved forever.
Lesson 2726Event Sourcing Fundamentals
Complete Mode
Azure treats your template as the **complete desired state** of the resource group.
Lesson 912Deployment Modes: Complete vs Incremental
Completeness Checks
Verify expected record counts, ensure critical fields are populated, and detect suspiciously small or large batch sizes that might indicate upstream failures.
Lesson 2624Data Quality in Batch Pipelines
Completion count
how many successful pod completions you need
Lesson 1192Job Completion Modes and Parallelism
Completions
How many successful pod completions you need (default: 1)
Lesson 1191Kubernetes Job Resource Fundamentals
Complex filtering and transformation
logic
Lesson 2038Fluentd and Fluent Bit Overview
Complex security requirements
where mutual TLS and policy enforcement justify the cost
Lesson 1573Service Mesh Performance Overhead
Complexity and maintenance
grow exponentially.
Lesson 831Scaling Challenges and Patterns
Complexity and Operational Overhead
Lesson 1600Service Mesh Selection Criteria
Complexity-based waves
Wave 1 contains simple, low-risk applications (pilot/quick wins), while later waves tackle complex, mission-critical systems after lessons learned.
Lesson 2802Migration Wave Planning
Compliance and auditing
Fewer components = fewer CVEs to track
Lesson 987Scratch and Distroless ImagesLesson 2172AWS Cost and Usage Reports
Compliance and data sovereignty
Some regulations require data residency in specific locations, and certain providers may have better compliance certifications in different regions.
Lesson 2751What is Multicloud and Why Organizations Adopt It
Compliance as Code
is about *detection and validation*.
Lesson 2336Policy as Code vs. Compliance as Code
Compliance auditing
Capture evidence of network activity for regulatory requirements
Lesson 229VPC Traffic Mirroring
Compliance audits
(external auditors need read-only access)
Lesson 425Snapshot Copying and Sharing
Compliance benefits
Many regulations require private connectivity for sensitive workloads
Lesson 2211Private Connectivity Overview
Compliance Calculation
The system compares actual performance against your SLO targets.
Lesson 2123Measuring and Reporting SLO Compliance
Compliance checks
HIPAA, PCI-DSS, SOC2, or company-specific standards
Lesson 695IaC Security and Compliance BenefitsLesson 2855Device Trust and Endpoint Security
Compliance dashboards
Automated assessment against standards like PCI-DSS, ISO 27001
Lesson 2863Azure Security Center and Sentinel
Compliance documentation
Fixed IPs simplify audit trails
Lesson 266Static IP and Elastic IP Support
Compliance Inheritance Model
describes how certain compliance controls are automatically inherited from your cloud provider, while others remain squarely on your shoulders.
Lesson 2330Compliance Inheritance Model
Compliance logs
(security, audit): Often 1-7 years (legally mandated)
Lesson 656Log Retention and Storage Requirements
Compliance mandates
data residency, audit logging, retention policies
Lesson 2762Multicloud Governance and Operating Model
Compliance Mode
is iron-clad.
Lesson 167Object Lock and Retention
Compliance Monitoring
Pre-built compliance frameworks (PCI-DSS, HIPAA, ISO 27001) help you track your security posture against regulatory requirements.
Lesson 2864Google Security Command Center
Compliance perspective
Most frameworks require management event logging (who changed what configuration).
Lesson 2352Management vs Data Event Logging
Compliance reporting
built-in (retention proof, encryption verification)
Lesson 2422Cloud-Native Backup Services Overview
Compliance Requirements Translation
is the systematic process of converting these regulatory obligations into machine-readable policy definitions that tools like AWS Config, Azure Policy, or Open Policy Agent can enforce.
Lesson 2337Compliance Requirements Translation
Compliance requires network isolation
but some controlled access is needed
Lesson 216VPC Peering Fundamentals
Compliance Score
Pass rate across all evaluated resources
Lesson 2901Policy Reporting and Remediation
Compliance suffers
Regulations often require encryption; defaults ensure coverage
Lesson 2839Encryption by Default
Compliance Zones
PCI-DSS or HIPAA-regulated data in dedicated segments with stricter controls
Lesson 2390Network Segmentation Fundamentals
Compliance-aware policies
that retain data appropriately
Lesson 2980Storage Lifecycle Optimization
Compliance-friendly
Satisfies data residency and privacy controls
Lesson 2397Private Link and Endpoint Services
Component isolation
Tests individual pieces separately
Lesson 2491Chaos Engineering vs Traditional Testing
Composability
Combine small modules into larger infrastructure patterns (remember infrastructure composability from your earlier lessons)
Lesson 711Code Organization and Module Structure
Composite indexes matter
If you frequently filter by `user_id` AND `created_date`, create a single index on both columns together—it's more efficient than two separate indexes.
Lesson 448Index Design and Strategy
Comprehensive coverage
Catch environment-specific bugs early by testing all target configurations
Lesson 1660Matrix Build Pattern
Compress and minify
– Some runtimes support compressed formats or minified code that preserve functionality while reducing size.
Lesson 485Function Packaging and Deployment Size
Compress before transit
Network egress is often expensive
Lesson 2165Cost-Aware Architecture Patterns
Compress data
before sending across the internet
Lesson 199Internet Connectivity Costs
Compression
Enable gRPC compression for telemetry export to reduce network overhead.
Lesson 1643Observability Performance Impact
Compression and format
Gzip CSVs or Parquet for faster queries
Lesson 2172AWS Cost and Usage Reports
Compression and Minification
Use minifiers to strip whitespace and comments.
Lesson 2546Package Size Optimization
Compression matters
GitLab compresses artifacts automatically, but smaller is always faster.
Lesson 1765Cache Optimization and Artifacts
Compression settings
Whether to compress responses
Lesson 595Cache Behavior Configuration
Compromised credentials
Identifying when legitimate accounts behave suspiciously (impossible travel, unusual API patterns)
Lesson 2866Anomaly Detection and Behavioral Analysis
Compute abstraction
Use containers (Docker) or orchestration (Kubernetes) instead of provider-specific VMs
Lesson 2764Application Portability FundamentalsLesson 2766Infrastructure Abstraction Patterns
Compute Chaos
tests resource limits, **Application and State Chaos** targets the application layer itself.
Lesson 2497Application and State Chaos
Compute Engine
VM instances require the Ops Agent (formerly Logging Agent) installed on the instance.
Lesson 2054Google Cloud Logging (Operations)Lesson 2321GCP Cloud KMS Integration and HSM
Compute instances
Deploy separate container replicas or function instances for critical vs.
Lesson 2589Bulkhead Pattern for Isolation
Compute Integration
You configure an EC2 instance, VM, or container to reference a secret by name or ARN.
Lesson 2249Cross-Service Secrets Integration
Compute intensity
CPU-heavy tasks favor compute-optimized instances; data processing needs memory-optimized types
Lesson 110Compute Service Selection Criteria
Compute Optimized
instances provide high-performance processors at optimal cost.
Lesson 78Choosing Instance Types for Your WorkloadLesson 109Cross-Provider Compute Feature Comparison
Compute Optimized instances
break that balance intentionally—they pack in more powerful processors and higher CPU-to- memory ratios specifically for workloads that demand serious computational muscle.
Lesson 67Compute Optimized Instance Types
computed attributes
values you can't set directly but can reference later.
Lesson 740Resource Arguments and AttributesLesson 819Local Values and Computed Attributes
Conceptual Explanations
Why the platform makes certain decisions, architectural patterns, and interaction modes between teams.
Lesson 2943Platform Documentation and Onboarding
concurrency limits
to protect your account from runaway costs or resource exhaustion.
Lesson 473Concurrency and Scaling in FaaSLesson 478Function Concurrency Limits
Concurrency problems
(race conditions, deadlocks)
Lesson 1816CodeGuru: AI-Powered Code Review
Concurrent access
Multiple VMs can mount and use the same filesystem
Lesson 114File Storage Overview
Concurrent Connections
NLBs excel at maintaining millions of simultaneous long-lived connections.
Lesson 265NLB Performance Characteristics
Concurrent requests
Number of active HTTP connections right now
Lesson 1950Metric Types: Gauge
Condition keys
let you add an extra layer: "grant this permission *only if* certain conditions are true.
Lesson 366Condition Keys and ContextLesson 2241AWS Secrets Manager IAM Integration
Conditional access policies
Apply Azure security policies to cluster access
Lesson 1498AKS Integration with Azure Active DirectoryLesson 2933RBAC and Portal Access Control
Conditional branching
If Function A returns "premium," call Function X; otherwise, call Function Y
Lesson 2512Orchestrator Pattern with Step Functions
Conditional dependencies
Use `condition` to enable/disable dependencies via values
Lesson 1545Chart Dependencies
Conditional execution blocks
that branch based on the target environment
Lesson 2775CI/CD Pipeline Portability
Conditional Execution Pattern
lets you control which pipeline stages run based on runtime conditions like:
Lesson 1661Conditional Execution PatternLesson 1662Manual Approval Gates
Conditional forwarding
means: "If someone asks about domain X, forward that question to DNS server Y instead of answering it yourself.
Lesson 226Hybrid DNS and Conditional Forwarding
Conditional paths
Use parallel actions with different deployment targets based on branch or configuration.
Lesson 1845Parallel and Sequential Stage Execution
Conditional resource naming
Lesson 876Complex Function Nesting
Conditional rules
Use multiple conditions in a single rule block.
Lesson 2339OPA Policy Development
Conditional triggers
Start jobs based on previous job completion—success, failure, or any completion state
Lesson 2648Glue Job Triggers and Workflows
Conditionals
let you say "only render this if something is true," while **flow control** structures like loops let you repeat template blocks multiple times—making your charts flexible and reusable.
Lesson 1540Conditionals and Flow Control
Confidence
Spot unintended changes before they happen
Lesson 698Planning and Preview
Confidence building
before full deployment
Lesson 1665Canary Deployment Pattern
Config repo
Kubernetes manifests, Helm values, environment configs
Lesson 1866GitOps Repository Structure
Config then app
Ensure ConfigMaps and Secrets exist before deployments
Lesson 1939Dependency Management
Config-driven discovery
Look for `app.
Lesson 1908Git Generator Patterns
ConfigMap
is a Kubernetes resource that stores non-confidential configuration data as key-value pairs.
Lesson 1247ConfigMap Fundamentals and Use Cases
ConfigMaps
Application settings, feature flags, non-sensitive configuration files
Lesson 1260Kubernetes Secrets Overview
Configuration (formerly Galley)
Lesson 1577Istio Control Plane Components
Configuration → Data Sources
and click "Add data source.
Lesson 1994Data Sources in Grafana
Configuration accuracy
Are connection strings, API endpoints, and environment variables correct for the DR site?
Lesson 2908Application Recovery Testing
Configuration Analysis
Path analyzers examine your entire network topology—VPC configurations, subnet routing, security group rules, network ACLs, and firewall policies—to build a complete picture of possible paths.
Lesson 2188Network Path Analysis Tools
Configuration blob
A reference to the JSON file containing runtime settings (environment variables, exposed ports, default command)
Lesson 980Image Manifest and Metadata
Configuration changes
to DR systems (who enabled cross-region replication and when)
Lesson 2447Compliance and DR Documentation
Configuration data
Use Consul, etcd, or config maps loaded from external sources
Lesson 2773Configuration Management Portability
Configuration Drift Detection
Compare actual deployed configurations against your declared state.
Lesson 2776Portability Testing and Validation
Configuration errors
Incorrect certificate lifetimes or rotation thresholds
Lesson 1628Certificate Rotation and Expiry
Configuration externalization
is critical.
Lesson 2828Connection String and Configuration Updates
Configuration injection
Point to specific config files that change frequently
Lesson 1038Bind Mounts
Configuration loading errors
Start with restrictive defaults, not permissive ones
Lesson 2837Fail Secure Principles
Configuration management services
(AWS Systems Manager Parameter Store, Azure App Configuration, GCP Secret Manager)
Lesson 2828Connection String and Configuration Updates
Configuration Normalization
Convert user-friendly inputs into the exact format required by your infrastructure.
Lesson 1410Mutating Admission Webhooks
Configuration preparation
Generate config files or fetch secrets
Lesson 1149Init Containers
Configuration Provider
Tells clients the current primary address
Lesson 2687Redis High Availability with Sentinel
Configuration sync
Pull configuration updates from external sources
Lesson 2599Sidecar Pattern for Cross-Cutting Concerns
Configuration validation
EKS warns you about settings that conflict with AWS best practices
Lesson 1469EKS Add-ons Overview
Configuration-Driven Requests
Developers specify high-level requirements (CPU, memory, region) through a simple form or API, and the platform translates these into compliant infrastructure code behind the scenes.
Lesson 2926Self-Service Infrastructure Patterns
Configurations
are YAML or Python files that declare *what* you want to build—the complete specification of your infrastructure.
Lesson 936Deployment Manager Architecture and ComponentsLesson 1667Multi-Environment Promotion
Configure Instance URL
Define the Jenkins server's URL so it can generate correct links in notifications and webhooks.
Lesson 1772Installing and Configuring Jenkins
Configure notification channels
(SNS topics, email)
Lesson 2171AWS Cost Anomaly Detection
Configure route tables
to handle IPv6 traffic separately from IPv4
Lesson 184IPv6 Support in Virtual Networks
Configure sink(s)
– Specify where transformed data lands
Lesson 2651ADF Mapping Data Flows
Configure weighted routing
to send 5% of requests to v2, 95% to v1
Lesson 1606Canary Deployments with Service Mesh
Configures authentication
sets up Azure AD-based authentication using your current Azure login
Lesson 1497Connecting to AKS with kubectl
Conflict resolution
handles concurrent writes to the same data in different regions
Lesson 2435Active-Active Multi-Region
Conflicting directions
If a Step Scaling policy wants to add capacity while a Scheduled action wants to reduce it, the larger capacity request wins.
Lesson 305Multiple Scaling Policy Coordination
Conflicts
Two people might try to modify the same infrastructure simultaneously without knowing
Lesson 776Local State Storage
Connect
button to get `kubectl` connection commands that configure your local CLI access using Azure credentials.
Lesson 1492Creating an AKS Cluster via Azure Portal
Connection Count
How many active connections exist to your database.
Lesson 410Database Monitoring and MetricsLesson 2191NAT Gateway Monitoring
Connection details
(region, endpoint URLs, paths)
Lesson 1278SecretStore Resource
Connection draining
(also called **deregistration delay**) solves this problem by allowing in-flight requests to complete gracefully before the target is fully removed.
Lesson 241Connection Draining and DeregistrationLesson 252ALB Connection Handling and TimeoutsLesson 279Connection Draining and Graceful Shutdown
Connection established
only if both certificates are valid and trusted
Lesson 1618Mutual TLS (mTLS) Fundamentals
Connection establishment
Client sends an upgrade request; the gateway approves and opens a persistent connection
Lesson 543WebSocket APIs
Connection hours
– Some providers charge hourly for active virtual interfaces or circuits
Lesson 2224Private Connectivity Cost Management
Connection lifetime
Set reasonable timeouts to avoid stale connections
Lesson 2548Connection Pooling and Reuse
Connection management
The gateway tracks active connections and routes messages to the correct backend services
Lesson 543WebSocket APIs
Connection Monitor
(tracks connectivity and latency over time).
Lesson 2194Provider-Specific Network Insights
Connection persists
until either side closes it
Lesson 264NLB Connection Handling
Connection pool limits
per host
Lesson 1612Circuit Breaking Patterns
Connection pool settings
(max connections, timeouts)
Lesson 1603Virtual Services and Destination Rules
Connection pool sizing
– Over-provision connection limits to handle retry storms during partial outages
Lesson 2460Capacity Planning for High Availability
connection pooling
you've already learned, creating a multi-layered approach to performance optimization.
Lesson 453Caching Strategies for DatabasesLesson 2481Read Replica ScalingLesson 2530Serverless Database Concepts
Connection pools
Service A gets 10 database connections, Service B gets 10 separate ones
Lesson 2583Bulkhead Pattern for IsolationLesson 2589Bulkhead Pattern for Isolation
Connection refused
Port mismatch or app not listening
Lesson 1430Debugging Failed Probes
Connection Settings
determine how many simultaneous client connections your database accepts (`max_connections`) and connection timeout values.
Lesson 451Database Parameter Tuning
Connection String Changes
In some systems, connection strings or service discovery mechanisms automatically redirect clients to the new endpoint
Lesson 2483Automatic Failover Process
Connection strings
for applications to connect to databases or storage
Lesson 899Outputs for Template ResultsLesson 2828Connection String and Configuration Updates
Connection Timeout
How long to wait for an available connection before failing
Lesson 450Connection Pooling and Management
Connection Validation
Test borrowed connections to ensure they're still alive
Lesson 450Connection Pooling and ManagementLesson 2234Connection Pooling and Keep-Alive
Connection-Based Routing
Once a TCP connection is established, all packets in that session flow to the same backend target.
Lesson 235Network Load Balancers (Layer 4)
Connections
Credentials and endpoints for external data sources
Lesson 2645Glue Data Catalog Fundamentals
Connectivity
Define network settings—which Virtual Private Cloud (VPC), subnet groups, and whether the database should be publicly accessible
Lesson 402Creating and Launching RDS Instances
Connectivity Failures
Completely block traffic between specific components (e.
Lesson 2495Network Chaos Patterns
Connectivity provider
The telecom or partner who provisions the physical connection
Lesson 2215Azure ExpressRoute Fundamentals
Connectivity Tests
(similar to AWS Reachability Analyzer), **Performance Dashboard** (packet loss and latency metrics), and **Firewall Insights** (identifies shadowed or unused firewall rules).
Lesson 2194Provider-Specific Network Insights
Connects
to your specified data source using credentials and paths
Lesson 2646Glue Crawlers
Consecutive errors
threshold (e.
Lesson 1612Circuit Breaking Patterns
Conservative
`maxUnavailable: 1, maxSurge: 0` — slow but safe, one pod at a time
Lesson 1189DaemonSet Update Parameters
Conservative update
`maxSurge: 1`, `maxUnavailable: 0` (one-by-one replacement)
Lesson 1167Rolling Update Strategy
Considerations
Requires double the infrastructure temporarily, database migrations need careful planning, both environments must handle shared state correctly.
Lesson 1607Blue-Green Deployments
Consistency guarantee
Strong consistency—all replicas show the same data at the same time.
Lesson 2473State Replication and Consistency Models
Consistency trade-offs
emerge: synchronous replication between distant regions adds latency but prevents data loss; asynchronous is faster but risks losing recent writes during failover.
Lesson 2453Geographic Distribution and Multi-Region Design
Consistent
Predictable routing and network behavior
Lesson 2195Hybrid Cloud Connectivity Overview
Consistent enforcement
across AWS, Azure, GCP, and hybrid environments
Lesson 2335Introduction to Compliance as Code
Consistent low latency
is critical (cold starts matter)
Lesson 2530Serverless Database Concepts
Consistent naming conventions
across all projects
Lesson 833Repository Structure for Large Projects
Consistent network performance
Reduced latency and jitter compared to internet-based connections
Lesson 2212AWS Direct Connect Fundamentals
Consistent operations
The same `kubectl` commands work everywhere
Lesson 2765Container-Based Portability
Consistent Performance
Predictable latency and throughput, critical for real-time applications or large data transfers.
Lesson 2201AWS Direct Connect FundamentalsLesson 2230Network Placement Groups
Consistent Prefix
Reads never see out-of-order writes, but might be behind.
Lesson 437Cosmos DB Consistency Levels
Consistent Processes
Authentication, patching, backup schedules, incident response—these should work the same way whether a server is physical, virtual on-prem, or in the cloud.
Lesson 2815Hybrid Operations and Coexistence
Consistent results
Everyone queries the same pre-computed data
Lesson 1957Recording Rules
Consistent security
Enforce uniform network ACLs and flow logs across all accounts
Lesson 230Shared VPCs and Multi-Account Networking
Consistent standards
Company-wide security policies applied uniformly across all projects
Lesson 695IaC Security and Compliance Benefits
Consistent testing
If tests pass in your container locally, they'll behave the same way in your colleague's container and in CI/CD pipelines.
Lesson 970Developer Workflow Improvements
Consistent tooling
One set of skills, one config format, many destinations
Lesson 2772API Gateway Abstraction
Consistent traffic management
Load balancing, routing, and traffic splitting work identically across clouds
Lesson 2769Service Mesh for Portability
Consolidate related secrets
into structured formats (JSON) rather than storing many individual secrets
Lesson 2251Secrets Management Cost Optimization
Constraints and triggers
Different syntax and capabilities
Lesson 2823Heterogeneous Database Migration
ConstraintTemplate
as a policy blueprint or cookie cutter.
Lesson 1414Writing Constraint Templates
Consul KV
, **etcd**, or even git-backed configuration repositories that your deployment pipeline injects as environment variables at runtime.
Lesson 2773Configuration Management Portability
consume
a module, you reference it in your Bicep file using a special syntax that points to the registry, module path, and version.
Lesson 929Module RegistriesLesson 1848Pipeline Variables and Parameter Passing
Consumer defines expectations
The consumer team writes tests specifying API calls and expected responses
Lesson 2585Contract Testing and API Contracts
Consumer function
pulls messages from the queue and does the heavy processing
Lesson 2505Async Processing with Queues
Consumer groups
multiple consumers share topic partitions for parallel processing.
Lesson 2609Kafka Producers and Consumers
Consumer Health Monitoring
Track each consumer's error rates, processing times, and throughput.
Lesson 581Event-Driven Monitoring and Observability
Consumer throughput
Messages/second being processed
Lesson 2742Queue Depth and Capacity Planning
Consumer-driven contracts
flip the traditional approach: instead of the provider dictating the API, *consumers* specify what they need.
Lesson 2585Contract Testing and API Contracts
Consumption Zone (Gold/Production)
Lesson 2631Data Lake Zones and Organization
Consumption-Based Model
You typically pay based on usage — per user, per month, or by feature tier.
Lesson 15Software as a Service (SaaS) Overview
Contacts the registry
using the image name and tag (or digest)
Lesson 994Pulling Images from Registries
container
is a lightweight, standalone, executable package that bundles everything an application needs to run: the code itself, runtime environment, system tools, libraries, and settings.
Lesson 960What Are Containers?Lesson 974Image vs Container: Key Differences
Container images
Docker images tagged with specific versions
Lesson 1671What are Build Artifacts?
Container Insights
on your AKS cluster, Azure automatically deploys a containerized agent (similar to the DaemonSet pattern you know) that collects stdout/stderr logs, performance metrics, and cluster events, forwarding them to your Log Analytics workspace.
Lesson 2053Azure Monitor Logs
Container logs
stdout/stderr from your applications
Lesson 1500AKS Monitoring with Azure Monitor
Container Network Interface (CNI)
plugin to implement (like Calico, Flannel, or Cilium).
Lesson 1150Pod Networking Fundamentals
Container Network Model (CNM)
, which consists of three main building blocks:
Lesson 1041Docker Network Architecture
Container provisioning
– Creating the execution environment
Lesson 463Cold Starts and Warm Starts
Container registers itself
When a new container starts, the orchestrator tells the ALB's target group, "Hey, there's a new instance of this app running on port 32768"
Lesson 258ALB and Container Integration
Container restarts
Check the exit code with `kubectl describe pod <pod-name>`.
Lesson 1444Troubleshooting with Logs
Container Runtime Interface (CRI)
.
Lesson 1110Container Runtime Integration
Container runtimes
(like Docker-in-Docker)
Lesson 1394Privileged Containers
Container Scanning
inspects Docker images for vulnerabilities in base images and installed packages.
Lesson 1766Pipeline Security Scanning
Container spec patterns
used in multiple workloads
Lesson 1557Advanced Templating with Named Templates
Container Storage Interface (CSI)
is an open standard that defines how container orchestrators like Kubernetes expose block and file storage systems to containerized workloads.
Lesson 1317Container Storage Interface (CSI) Overview
Container-based
Each build runs in an isolated Docker environment
Lesson 1812CodeBuild: Managed Build Service Overview
Container-Optimized OS
Minimal, hardened OS with automatic security updates
Lesson 1488GKE Security: Private Clusters and Hardening
containerd
(pronounced "container-dee") is a lower-level runtime that Docker Engine itself uses under the hood.
Lesson 962Container Runtime BasicsLesson 1110Container Runtime Integration
Containerized workloads
(ECS, EKS, AKS, GKE) follow a **pay-per-time** model.
Lesson 2163Serverless vs Containers Cost Analysis
Content availability
at specific edges
Lesson 586CDN Request Flow and Routing
Content Delivery
If cached, content is served immediately.
Lesson 586CDN Request Flow and Routing
Content Delivery Network (CDN)
is a globally distributed network of servers that cache and serve your static content (images, CSS, JavaScript, videos) from locations physically closer to your users.
Lesson 582What is a CDN and Why Use OneLesson 2671CDN Caching Fundamentals Review
Content licensing
Streaming services often have different rights in different countries.
Lesson 603Geographic Restrictions
Content management systems
need to preserve uploaded images and files
Lesson 1287Storage Challenges in Containers
Content negotiation
Different response formats based on headers
Lesson 2571RESTful API Design for Microservices
Content type
`application/json` or `text/plain`
Lesson 563Message Attributes and Metadata
Content updates
– After using cache invalidation strategies, repopulate quickly
Lesson 2676Cache-Warming and Preloading
Content-aware routing
route by URL path, host headers, or HTTP methods
Lesson 263Layer 4 vs Layer 7 Load Balancing
Content-based changes
(not just timestamp changes)
Lesson 2674ETag and Conditional Requests
Content-Based Filtering
examines event attributes—like `event.
Lesson 2736Event Filtering and Routing
Context awareness
It considers factors like day of week, time of month, and business cycles
Lesson 2987Cost Anomaly Detection Systems
Context enrichment
Alerts include resource tags, account IDs, and service names to speed diagnosis
Lesson 2150Cost Anomaly Detection
Context objects
are special data structures that hold information about the workflow run, repository, environment variables, and secrets.
Lesson 1692Context and Expression Syntax
Context Propagation
Injecting trace IDs into HTTP headers or message queues adds microseconds per operation— negligible alone, but significant at scale.
Lesson 2071Instrumentation OverheadLesson 2076Spans, Traces, and Context PropagationLesson 2086OpenTelemetry in Kubernetes Environments
Context Switching
At minimum, organize your kubeconfig files carefully, use meaningful context names, and leverage tools that help visualize which cluster you're currently operating on.
Lesson 1513Multi-Cluster Management
Context-aware
Factors like device health, location, time, and risk score influence access decisions
Lesson 2393Zero Trust Network Access (ZTNA)
Contexts
Combine a cluster + user + optional namespace into a named profile
Lesson 1132Kubeconfig Files and Contexts
Contextual debugging
See that a slow database query had `db.
Lesson 2064Span Attributes and Tags
Contextual linking
Automatically associating infrastructure resources (from earlier Kubernetes visualization lessons) with their deployment history and runtime behavior
Lesson 2934Integrating CI/CD and Observability
Contextual links
and **drill-down** capabilities turn your visualizations into clickable gateways, letting users navigate from high-level overview metrics to detailed traces, logs, or related systems without leaving their investigation flow.
Lesson 2109Contextual Links and Drill-Down
Continue pattern
(optional): What subsequent lines look like (often indented or starting with whitespace)
Lesson 1441Multi-Line Log Handling
Continuous Authentication
Sessions are periodically re-validated using factors like device health, location, and behavioral biometrics.
Lesson 2402Continuous Verification and Monitoring
Continuous data collection
Agents or APIs pull CPU, memory, disk I/O, and network metrics across all resources
Lesson 2979Right-Sizing at Scale with Automation
Continuous Data Protection
solves this by continuously capturing changes as they occur, often at the byte or transaction level.
Lesson 2429Continuous Data Protection (CDP)
Continuous Data Replication (CDC)
DMS captures ongoing changes from the source database and applies them to the target in near real-time.
Lesson 2821Database Migration Service (DMS) Fundamentals
Continuous Delivery
means your code is *always* in a deployable state and automatically deployed to a **staging or pre-production environment**.
Lesson 1645What is Continuous Delivery and Deployment?
Continuous Deployment
takes it one step further: every change that passes all automated tests is **automatically deployed to production** without human intervention.
Lesson 1645What is Continuous Delivery and Deployment?
Continuous Evidence Collection
Instead of scrambling before audits, modern compliance as code generates evidence continuously, creating an always-ready audit trail.
Lesson 2363Compliance Reporting and Evidence
Continuous improvement
Plan-Do-Check-Act cycle for ongoing security enhancement
Lesson 2325ISO 27001 Information SecurityLesson 2412Mean Time to Recovery (MTTR)
Continuous improvement is mandatory
Ship incremental value regularly.
Lesson 2915Platform as Product Mindset
Continuous Integration (CI)
is a development practice where developers frequently merge their code changes into a shared repository—often several times a day.
Lesson 1644What is Continuous Integration?
Continuous Integration/Continuous Deployment
workflows.
Lesson 972Container Use Cases and Adoption
Continuous Integration/Continuous Deployment (CI/CD)
Connect directly to GitHub, Azure DevOps, or other repositories.
Lesson 101Azure App Service Overview
Continuous Learning
The model adapts as your baseline changes over time
Lesson 644Anomaly Detection AlarmsLesson 2952Building a FinOps Culture
Continuous Optimization Program
establishes the rhythms, accountability frameworks, and motivational structures that keep cost efficiency alive across your organization indefinitely.
Lesson 2989Continuous Optimization Programs
Continuous or near-continuous replication
instead of periodic backups
Lesson 2409Relationship Between RTO, RPO, and Cost
Continuous Reconciliation
The system constantly compares actual state with desired state and corrects any drift, creating self-healing infrastructure.
Lesson 1852What is GitOps?Lesson 1858Continuous ReconciliationLesson 1865Pull-Based vs Push-Based GitOpsLesson 1871Multi-Cluster GitOpsLesson 1877What is ArgoCD and GitOps CD
continuous replication
to keep source and target databases synchronized while your application remains operational.
Lesson 2821Database Migration Service (DMS) FundamentalsLesson 2822Homogeneous Database Migration
Continuous validation
Both sides test independently; contracts catch breaking changes before deployment
Lesson 2585Contract Testing and API Contracts
Continuous verification
challenges this by constantly evaluating whether access should remain granted.
Lesson 2848Continuous Verification and Contextual AccessLesson 2862AWS GuardDuty
Contour
(built on Envoy proxy) is designed for large-scale deployments.
Lesson 1230Ingress Controller Options
Contribution Guidelines
Document exactly how developers can contribute—coding standards, testing requirements, review processes.
Lesson 2944Inner Source and Contribution Models
Contributor
Can create and manage all resources but *cannot* grant permissions to others.
Lesson 387Azure Built-in Roles
Control access
Use Azure RBAC to determine who can view or deploy
Lesson 908Template Specs for Reusable Templates
Control caching
by adjusting `Cache-Control` or `Expires` headers without changing your origin server
Lesson 604Response Header Customization
Control costs
Prevent functions from running longer than expected
Lesson 476Function Timeout Configuration
Control data flow
between zones using firewalls, security groups, and network policies
Lesson 2841Security Boundaries and Trust Zones
Control IAM permissions
at the ring level for multiple keys at once
Lesson 2318GCP Cloud KMS Structure and Key Rings
Control network placement
Decide which parts of your VPC can host database instances
Lesson 405Subnet Groups and Network Placement
control plane health
, **node status**, and **overall cluster metrics**.
Lesson 1518Observability for Cluster OperationsLesson 1628Certificate Rotation and Expiry
Control Plane Metrics
track your API server request rates, etcd performance, scheduler queue depth, and authentication failures.
Lesson 1518Observability for Cluster Operations
Control plane operations
`CreateKey`, `RotateKey`, `DisableKey`, `ScheduleKeyDeletion` (for administrators)
Lesson 2289Key Policies and Access Control
Control plane security patches
– Critical vulnerabilities addressed quickly
Lesson 1505Managed Kubernetes Overview
Control plane upgrades
– Version updates with minimal disruption
Lesson 1505Managed Kubernetes Overview
Control vs convenience trade-off
Need full OS access?
Lesson 110Compute Service Selection Criteria
Control vs. Convenience Trade-off
Lesson 19Choosing the Right Service Model
Controller executors
Set to 0 or 1—keep builds off the controller
Lesson 1806Performance Tuning and Resource Management
Controller Manager
(`controllerManager`): Core controller activities
Lesson 1473EKS Logging and CloudWatch Integration
Convert syntax
but may produce verbose or non-idiomatic Bicep
Lesson 933Decompiling ARM to Bicep
Cookie Forwarding
works similarly.
Lesson 598Query String and Cookie Forwarding
Cookie name
Use the ALB-generated cookie or specify your own application cookie
Lesson 255Sticky Sessions (Session Affinity)
Cookie-based affinity
The load balancer inserts a cookie identifying the backend instance
Lesson 2467Sticky Sessions and Affinity
Cookie-based stickiness
The load balancer inserts a special cookie (`AWSALB` for ALBs) in the response, then reads it on subsequent requests to route to the same target.
Lesson 278Session Affinity and Sticky Sessions
Cookies
Check for `user_segment=beta-tester` cookie values
Lesson 1608A/B Testing and Experimentation
Cool tier
Infrequently accessed data on standard storage
Lesson 2980Storage Lifecycle Optimization
Cooldown interactions
Different policy types may have their own cooldown periods, but they all respect the group's overall cooldown to prevent thrashing.
Lesson 305Multiple Scaling Policy Coordination
cooldown period
is a configurable waiting time (typically 300 seconds/5 minutes by default) that prevents Auto Scaling from initiating another scaling action immediately after a previous one completes.
Lesson 293Cooldown PeriodsLesson 300Simple Scaling PoliciesLesson 303Cooldown Periods and WarmupLesson 327MIG Autoscaling Configuration
Cooldown period begins
, preventing further actions until it expires
Lesson 300Simple Scaling Policies
Cooldown periods
(now called `behavior` configuration) define minimum wait times between scaling actions
Lesson 1451HPA Scaling BehaviorLesson 2155Auto Scaling for Cost Efficiency
Cooldown timer starts
(e.
Lesson 293Cooldown Periods
Coordinates
the deployment sequence (all at once, rolling, blue-green)
Lesson 1813CodeDeploy: Deployment Automation Overview
Coordination
Passing data between functions without tight coupling
Lesson 2515Workflow Orchestration Fundamentals
Copies
the entire file from the read-only layer up to the writable layer
Lesson 979Copy-on-Write StrategyLesson 1032Docker Storage Architecture Overview
Cordoning
Mark a node as unschedulable so no new pods land there
Lesson 1509Node Image Upgrades
Core (SQL) API
Document-based queries using SQL-like syntax
Lesson 2534Azure Cosmos DB Serverless
CoreDNS
is Kubernetes' built-in DNS server that runs as a pod (usually in the `kube-system` namespace).
Lesson 1113CoreDNS for Service DiscoveryLesson 1206Service Discovery with DNSLesson 1469EKS Add-ons Overview
Correlate across instances
when a single request touches multiple ephemeral pods
Lesson 2046Cloud-Native Logging Overview
Correlate across services
Link logs by `trace_id` or `request_id`
Lesson 2047Structured Logging in Applications
Correlation Filters
Fast, optimized property matching
Lesson 561Azure Service Bus Topics
Correlation IDs
Each request message includes a unique identifier (correlation ID).
Lesson 2579Request-Reply over Message Queues
Corrupted blocks
from network transmission errors
Lesson 2444Data Consistency Validation
CORS management
Insert `Access-Control-Allow-Origin: *` for public APIs without modifying backend code.
Lesson 604Response Header Customization
Cortex multi-tenancy
works similarly: it allows multiple teams, business units, or even external customers to use the same horizontally scalable Prometheus infrastructure while keeping their metrics completely isolated from each other.
Lesson 1985Cortex Multi-Tenancy
Cost Analysis
provides interactive charts and filters to examine your spending patterns by subscription, resource group, service, region, or custom tags.
Lesson 2173Azure Cost Management and Billing
Cost and Usage Reports
to correlate spending with actual usage
Lesson 2986Idle Resource Detection and Cleanup
Cost anomaly tools
Services like AWS Cost Explorer or Azure Advisor automatically highlight underutilized resources.
Lesson 2160Idle Resource Detection
Cost baseline
documenting current spend to compare against cloud projections
Lesson 2797Migration Assessment Framework
Cost centers
(accounting codes like "CC-12345" for Marketing)
Lesson 2965Cost Centers and Business Units
Cost components
on-demand rates, reservation discounts, support fees
Lesson 2962Cloud Billing Data Structure
Cost constraints
Spot instances for fault-tolerant batch jobs; reserved instances for stable production workloads
Lesson 110Compute Service Selection Criteria
Cost controls
(resource limits, tagging requirements)
Lesson 2918Self-Service vs. Full Autonomy
Cost estimation
Frequent failures (low MTBF) increase operational costs
Lesson 2413Mean Time Between Failures (MTBF)
Cost Explorer
tools to estimate monthly savings from downsizing.
Lesson 2152Right-Sizing ResourcesLesson 2153Reserved Instances and Savings Plans
Cost governance
budget limits, tagging requirements, approval workflows
Lesson 2762Multicloud Governance and Operating Model
Cost Guard
Fire when `BudgetThreshold-80% AND UnusualSpend` both alarm, preventing false positives from expected seasonal costs.
Lesson 645Composite Alarms
Cost impact
Will this provision expensive resources unnecessarily?
Lesson 715Code Review and Peer ValidationLesson 2680CDN Cache Analytics and Hit Rates
Cost Management
Each provider has different pricing models, billing cycles, and cost optimization strategies.
Lesson 2756Multicloud Challenges: Complexity and Management Overhead
Cost Management APIs
provide programmatic access to the same cost data, enabling custom integrations, dashboards, and automation scripts.
Lesson 2176Azure Cost Exports and APIs
Cost model
You pay for each read and write request—no minimum commitment.
Lesson 2532DynamoDB Capacity ModesLesson 2642Introduction to Serverless ETL
Cost multiplier
Running in three regions roughly triples infrastructure costs, though you can use patterns like pilot light (covered earlier) to reduce standby costs.
Lesson 2453Geographic Distribution and Multi-Region Design
Cost optimization strategies include
Lesson 2224Private Connectivity Cost Management
Cost overruns
– especially in pay-per-request cloud models
Lesson 2744Rate Limiting Fundamentals
Cost per Active User
Monthly spend divided by monthly active users (MAU).
Lesson 2971Unit Economics and Metrics
Cost per Data Unit
Spending per TB stored, processed, or transferred.
Lesson 2971Unit Economics and Metrics
Cost per operation
at various scales
Lesson 2554Performance Testing and Benchmarking
Cost perspective
Data events can increase logging costs 100x or more.
Lesson 2352Management vs Data Event Logging
Cost policies
resource sizing limits, tagging requirements
Lesson 2900Policy Libraries and Reusability
Cost tracking
Identify which department or application is generating cloud bills (e.
Lesson 63VM Tags and Resource OrganizationLesson 905Tags and Resource Metadata
Cost tracking by dimension
Project, environment, cost center, application
Lesson 2141Tagging Strategy for Cost Allocation
Cost validation
Verify cost estimates stay within acceptable thresholds
Lesson 2887CI/CD Integration for IaC Tests
Cost-Benefit Analysis
Lower MTTR requires investment in better backups, automation, and failover systems.
Lesson 2412Mean Time to Recovery (MTTR)
Cost-benefit analytics
showing savings from each lifecycle transition
Lesson 2980Storage Lifecycle Optimization
Cost-effective
Pay only for data scanned, not for idle compute or storage duplication
Lesson 2640Query Engines for Data Lakes
Cost-effective analytics
Organizations wanting powerful analytics without committing to always-on warehouse infrastructure
Lesson 2656Serverless Query Engine Overview
CostCenter
`Finance-001`, `Engineering-002`
Lesson 2143Azure Cost Management Tags
Count occurrences
of specific error messages
Lesson 667Log-Based Metrics and Alerting
Count your resources
How many VMs, databases, or load balancers will this subnet hold?
Lesson 177Subnet Sizing and Planning
Count-based retention
preserves the last N builds per branch or service.
Lesson 1678Artifact Retention and Cleanup
counters
and **gauges** helps you choose the right metric type and interpret your data correctly.
Lesson 627Metric Types: Counters and GaugesLesson 1950Metric Types: Gauge
Coverage gaps
Which workloads lack RI protection?
Lesson 2976Reserved Instance Portfolio Management
Coverage rates
show how much of your compute uses reserved instances or savings plans versus on-demand.
Lesson 2988Optimization Metrics and KPIs
Covered Entity
) and your cloud provider (the **Business Associate**) share legal responsibility.
Lesson 2327HIPAA for Healthcare Data
CP systems
(like traditional relational databases with synchronous replication) prioritize consistency over availability.
Lesson 2466Stateful Services: Challenges and Trade-offs
CPU
Limit CPU time or assign shares (e.
Lesson 964Resource Limits with cgroups
CPU cores
Processing power for queries and transactions
Lesson 399Database Instance Classes
CPU limit
on a container (e.
Lesson 1340CPU Throttling Behavior
CPU limits
set a ceiling on how much CPU a container can actually use.
Lesson 1334Setting CPU Limits
CPU quota system
kicks in and forces the container to pause execution for brief periods
Lesson 1340CPU Throttling Behavior
CPU requests and limits
(aggregate total)
Lesson 1337Resource Quota Basics
CPU units
, which represent compute power.
Lesson 1330CPU Resource Units
CPU-intensive workloads
(batch processing, scientific modeling, gaming servers) → **Compute Optimized** instances provide high-performance processors at optimal cost.
Lesson 78Choosing Instance Types for Your WorkloadLesson 1508Node Pool Management
CPU(cores)
"450m" means 450 millicores (0.
Lesson 1448kubectl top Command
CPU%
Percentage of the node's total CPU capacity being used
Lesson 1448kubectl top Command
CQL (Cassandra Query Language)
, these managed services let you migrate without rewriting code.
Lesson 443Keyspaces and Cassandra-Compatible Services
CQRS
separates reads from writes, **saga patterns** handle distributed transactions, and **event replay** lets you rebuild state or fix errors.
Lesson 2738Event-Driven State Machines
crash-consistent
by default — they capture data as if the system suddenly lost power.
Lesson 131Volume SnapshotsLesson 2421Application-Consistent vs. Crash-Consistent Backups
Crash-consistent backups
capture storage at a single point in time—like pulling the power plug on a running server.
Lesson 2421Application-Consistent vs. Crash-Consistent Backups
Crawl, Walk, Run
that describe how sophisticated an organization is at implementing FinOps practices.
Lesson 2955FinOps Maturity Model
Crawlers
Automated scanners that infer schemas from your data sources and populate the Data Catalog without manual intervention.
Lesson 2643AWS Glue Overview
CRD schema
– Defines what parameters your policy accepts
Lesson 1414Writing Constraint Templates
CRDs before CRs
Install custom resource definitions before resources that use them
Lesson 1939Dependency Management
Create a change set
You submit your updated template to CloudFormation, which analyzes the differences
Lesson 851Stack Updates and Change SetsLesson 878Stack Updates and Change Sets
Create a monitor
targeting specific cost allocation tags, accounts, or services
Lesson 2171AWS Cost Anomaly Detection
Create a new key
with fresh cryptographic material
Lesson 2311AWS KMS Key Rotation and Aliasing
Create a role
with the permissions your resource needs (e.
Lesson 353IAM Roles for Resources
Create Admin User
Set up your administrator credentials rather than using the temporary unlock password.
Lesson 1772Installing and Configuring Jenkins
Create an AppRole
with policies defining what secrets it can access
Lesson 2258AppRole Authentication for Applications
Create child spans
that link back to the parent trace, even though they execute later
Lesson 2072Tracing in Async and Event-Driven Systems
Create individual administrative users
with only the permissions they need (remember the Principle of Least Privilege from lesson 334).
Lesson 339Root Account and Administrative Access
Create individual IAM users
for each person (even yourself)
Lesson 377AWS IAM Users and Root Account
Create new infrastructure
from scratch (compute instances, networks, databases)
Lesson 753When to Use Resources vs Data Sources
Create vs Approve
One team member creates IAM policies or firewall rules, another reviews and approves them before activation.
Lesson 2835Separation of Duties
Creates a destruction plan
showing exactly what will be deleted
Lesson 780terraform destroy Workflow
Creates a standby replica
in a different availability zone (a separate data center with independent power, networking, and infrastructure)
Lesson 415Multi-AZ Deployments Fundamentals
Creates or updates
tables in the Glue Data Catalog
Lesson 2646Glue Crawlers
Creating a secret
involves specifying a name, choosing an encryption key (default AWS-managed or your own CMK), and providing the secret value as key-value pairs or plaintext.
Lesson 2239AWS Secrets Manager Fundamentals
Creation Schedules
Define when snapshots are taken (hourly, daily, weekly).
Lesson 132Snapshot Lifecycle Management
Creation/Last modified dates
Track policy history
Lesson 375Policy Documentation and Governance
Credential Domains
filter when credentials appear based on hostnames or URLs.
Lesson 1804Credential Management at Scale
Credential Management at Scale
is about structuring credential access through folders, domains, and external secret managers.
Lesson 1804Credential Management at Scale
Credential retrieval
Commands to get secrets or passwords
Lesson 1544NOTES.txt and User Instructions
Credits and incentives
Migration credits, professional services hours, or training allowances
Lesson 2166Discount Negotiation and EDP
Critical (9.0–10.0)
Immediate threat, often remotely exploitable with severe impact
Lesson 1075Vulnerability Severity and Prioritization
Critical (P0/P1)
Service-impacting issues requiring immediate response.
Lesson 649Alert Severity and Prioritization
Critical customer-facing endpoints
Lesson 493Provisioned Concurrency
Critical exception
Never commit your `terraform.
Lesson 782Terraform Workflow Best Practices
Critical issue
when you delete or scale down a StatefulSet, the PVCs are *not* automatically deleted.
Lesson 1190StatefulSet and DaemonSet Troubleshooting
Critical limitation
Multi-attach volumes don't automatically handle file system locking or data consistency.
Lesson 135Multi-Attach Volumes
Critical path services
only after full confidence
Lesson 1575Service Mesh Adoption Strategies
Critical rule
The pod template labels **must match** the selector, or Kubernetes will reject your Deployment.
Lesson 1164Deployment Selectors and LabelsLesson 1471EKS Cluster UpgradesLesson 1546Subcharts and Values Overrides
Critical services
Lower `periodSeconds: 5` for faster failure detection
Lesson 1426Probe Timing ParametersLesson 2122SLOs for Different Service Tiers
Critical systems
(APIs, payment services): 10–30s intervals for quick anomaly detection
Lesson 1988Scrape Interval Optimization
Critical tier systems
(RTO < 1 hour): Monthly or quarterly
Lesson 2415DR Testing and Validation Frequency
Cron patterns
provide time-based scheduling using familiar syntax like `0 2 * * *` (run daily at 2 AM) or `*/15 * * * *` (every 15 minutes).
Lesson 2616Job Scheduling and Orchestration
Cron Schedules
run builds at specific times, regardless of code changes:
Lesson 1789Triggers and Automated Execution
CronJob
in Kubernetes creates Jobs on a repeating schedule, just like the classic Unix cron utility.
Lesson 1196CronJob Resource Fundamentals
CronJob History and Retention
(`successfulJobsHistoryLimit`) to balance observability with resource usage.
Lesson 1202Job and CronJob Best Practices
Cross-Account Access
With proper IAM policies and resource-based permissions, services in Account A can retrieve secrets stored in Account B's secrets manager.
Lesson 2249Cross-Service Secrets Integration
Cross-Account Backup
goes further by storing backups in a separate AWS/Azure/GCP account entirely—often a dedicated "backup account" managed by different IAM credentials and policies.
Lesson 2426Cross-Region and Cross-Account Backup
Cross-account DR
(your disaster recovery account can restore from production snapshots)
Lesson 425Snapshot Copying and Sharing
Cross-Account Log Collection
Configure each account to write audit logs to a centralized storage bucket or log repository in a dedicated "logging" or "security" account.
Lesson 2354Centralized Audit Log Aggregation
Cross-Account Pipelines
require IAM cross-account roles.
Lesson 1846Cross-Region and Cross-Account Pipelines
Cross-account roles
are IAM roles that allow identities in one cloud account to temporarily assume permissions in another account.
Lesson 354Cross-Account Roles
Cross-account sharing
Are RIs applied where they deliver maximum value?
Lesson 2976Reserved Instance Portfolio Management
Cross-Cloud Connectivity
Establishing secure, performant connections between clouds requires VPNs, direct interconnects (AWS Direct Connect, Azure ExpressRoute, GCP Cloud Interconnect), or third-party networking solutions.
Lesson 2778Multicloud Networking Challenges
Cross-cluster resource propagation
Deploy a single manifest that gets distributed to selected clusters
Lesson 1514Cluster Federation Basics
Cross-database joins
Combine operational data (RDS) with analytical data (S3/data lake)
Lesson 2668Query Federation and External Data
Cross-functional
, involving engineers, operations, and sometimes business stakeholders
Lesson 2499GameDays and Chaos Testing Practices
Cross-referencing CVE databases
Each package version is matched against known vulnerability databases (like the National Vulnerability Database)
Lesson 1073Image Scanning Fundamentals
Cross-Region Backup
copies your backup data from your primary region (e.
Lesson 2426Cross-Region and Cross-Account Backup
Cross-region controls
Block replication, snapshots, or backups to non-compliant regions
Lesson 2332Geographic and Regional Compliance
Cross-Region Pipelines
use S3 bucket replication to automatically copy artifacts to buckets in target regions.
Lesson 1846Cross-Region and Cross-Account PipelinesLesson 1847Pipeline Artifacts and Artifact Stores
Cross-region reach
Access VPCs in any AWS region from one connection
Lesson 2214Direct Connect Gateway
Cross-region read replicas
take this concept further by placing those copies in entirely different geographic regions—not just different availability zones within the same region.
Lesson 421Cross-Region Read Replicas
Cross-service testing
validates that services still work together after changes.
Lesson 1669Microservices Pipeline Orchestration
Cross-zone
distribution spreads traffic evenly across targets in *all* availability zones within a single region.
Lesson 280Cross-Zone and Cross-Region Load Balancing
Cross-zone load balancing
allows each NLB node to distribute traffic evenly across **all healthy targets in all enabled availability zones**, regardless of where the traffic entered.
Lesson 270Cross-Zone Load Balancing for NLB
Cryptographic isolation
from the operating system
Lesson 2283Key Hierarchy and Root of Trust
Cryptographic Signing
takes this further by using digital signatures.
Lesson 2357Audit Log Integrity and Validation
Cryptomining
Recognizing unusual compute resource consumption patterns
Lesson 2866Anomaly Detection and Behavioral Analysis
CSI driver
is a vendor-provided piece of software that implements the CSI specification.
Lesson 2771Storage Abstraction with CSI
CSI drivers
small pieces of software that translate between Kubernetes' storage requests and a specific storage backend.
Lesson 1317Container Storage Interface (CSI) OverviewLesson 1324Volume Metrics and Monitoring
CSIDriver
resource (registers the driver)
Lesson 1319Installing and Deploying CSI Drivers
CSRF protection
to prevent malicious requests
Lesson 1781Jenkins User Management and Security
CUBIC
work well for most scenarios, while **Reno** is conservative but predictable.
Lesson 2228TCP Performance Optimization
Current build progress
Real-time indicator when builds are active
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Current SLO compliance
Is availability above 99.
Lesson 2124SLO-Based Deployment Gating
Custom 404 pages
with helpful navigation
Lesson 1229Default Backend Configuration
Custom accelerators
Purpose-built chips (like AI processors) optimized for particular workloads
Lesson 70Accelerated Computing Instance Types
Custom analytics
Import into data warehouses (Redshift, Athena, BigQuery) for SQL-based exploration
Lesson 2172AWS Cost and Usage Reports
Custom application
TCP/UDP on your chosen port
Lesson 203Security Group Rules and Syntax
Custom Attributes
Any metadata your application adds
Lesson 1608A/B Testing and Experimentation
Custom Authorizers
(Lambda authorizers) give you ultimate flexibility.
Lesson 2539Serverless API Authentication
Custom business logic
Enforce organization-specific requirements that don't fit standard Kubernetes patterns
Lesson 1409Validating Admission WebhooksLesson 2064Span Attributes and Tags
Custom caching logic
Cache authenticated user content for 5 minutes but public content for 1 hour
Lesson 621Edge Caching with Functions
Custom controllers
interpreting application-specific status conditions
Lesson 1914Resource Health Customization
Custom daemons
with non-standard signal handlers
Lesson 1016STOPSIGNAL: Graceful Shutdown
Custom dashboards
for compliance reporting
Lesson 2355Audit Log Analysis and Search
Custom Diff Strategies
Use annotations or ArgoCD configuration to apply different comparison rules per resource type.
Lesson 1901Diff Customization
Custom environments
You need specific hardware (GPUs, ARM processors), operating systems, or software pre-installed that GitHub-hosted runners don't provide
Lesson 1690Self-hosted Runners Overview
Custom external metrics adapters
for Datadog, Prometheus, etc.
Lesson 1453External Metrics and HPA
Custom headers
let you inject additional HTTP headers into origin requests, enabling authentication, routing logic, or contextual data your application needs.
Lesson 599Custom Headers and Origin Requests
custom images
with your specific software stack pre-configured for faster deployments.
Lesson 54Operating System Images and AMIsLesson 1812CodeBuild: Managed Build Service Overview
Custom inputs
Free-form text for ad-hoc filtering
Lesson 2107Dashboard Variables and Filters
Custom key names
You can specify your own key:
Lesson 1262Creating Secrets from Files
Custom load balancing
where your application handles distribution logic
Lesson 1210Headless Services
Custom metric scaling
lets you publish application-specific measurements to your cloud provider's monitoring service, then create scaling policies that respond to those custom signals.
Lesson 306Custom Metric Scaling
Custom policies
tailored to your application's specific security needs
Lesson 2364What is a Web Application Firewall (WAF)
Custom reports
Save frequently-used views (like "production database costs" or "compute spending by team") for quick access.
Lesson 2139Cost Explorer and Billing DashboardsLesson 2169AWS Cost Explorer Advanced Features
Custom Resource Definition (CRD)
extends the API with new object types.
Lesson 1881ArgoCD Application Resource
Custom Resource Definitions (CRDs)
let you define your own resource types that the Kubernetes API Server will treat as first-class citizens.
Lesson 1128Custom Resource Definitions (CRDs)Lesson 1580Istio Configuration Resources Overview
Custom Resource Providers
let you add your own dishes to that menu by teaching Azure Resource Manager how to interact with external systems, custom APIs, or specialized logic.
Lesson 910Custom Resource Providers
Custom Resource Types
You can build your own resource types (called "private extensions") for internal tools or workflows that CloudFormation doesn't natively support.
Lesson 892CloudFormation Registry and Extensions
Custom Resources
let you fill these gaps by invoking your own Lambda function as part of the CloudFormation lifecycle.
Lesson 886Custom Resources
Custom roles
Define your own with specific permissions
Lesson 1890ArgoCD RBAC and User Management
Custom rules
let you define precise conditions using match statements—checking IP addresses, HTTP headers, request body content, geographic location, or even regex patterns.
Lesson 2369AWS WAF Rules and Rule Groups
custom runtimes
for less common languages, though you'll manage dependencies yourself.
Lesson 471Function Runtime EnvironmentsLesson 484Custom Runtimes and Layers
Custom Script Extension
Runs your own PowerShell or Bash scripts
Lesson 100Azure VM Extensions and Custom Script
Custom scripts
that parse plan output and send alerts to Slack or PagerDuty
Lesson 842Drift Detection and Remediation
Custom software
Pre-installed tools, licensed software, or corporate compliance tooling
Lesson 1720Self-Hosted Runners
Customer Gateway
– A physical device or software in your data center (your VPN router/firewall)
Lesson 2198Site-to-Site VPN FundamentalsLesson 2199VPN Gateway Configuration
Customer portal
Business-critical → RTO: 2 hours, RPO: 15 min
Lesson 2410Business Impact Analysis (BIA)
Customer satisfaction
improvements from better performance
Lesson 37Measuring Cloud Business Value: KPIs and Metrics
Customer-Managed Keys
You create and control your own encryption keys using the provider's key management service.
Lesson 130Volume Encryption
CustomResourceDefinitions (CRDs)
that make policy management Kubernetes-native:
Lesson 1413OPA Gatekeeper Architecture
cutover
is the moment you flip the switch from the old system to the new one.
Lesson 2813Cutover Planning and Rollback StrategiesLesson 2822Homogeneous Database Migration

D

DaemonSet pods
running on each node that handle the mount operations
Lesson 2276Secrets Store CSI Driver
DaemonSets
, ensuring one logging agent pod per node.
Lesson 1438Fluentd and Fluent BitLesson 2033ELK/EFK on Kubernetes
DaemonSets for Collectors
Lesson 2033ELK/EFK on Kubernetes
DAG (Directed Acyclic Graph)
Complex branching and joining of streams for enrichment, filtering, and transformation
Lesson 2602Streaming Architecture Patterns
Daily backups (Son)
Keep for 1–2 weeks
Lesson 2420Backup Retention Policies
Daily cycles
Traffic peaks during business hours, drops at night
Lesson 302Predictive Scaling Fundamentals
Dashboard as Code
means defining your entire dashboard configuration in structured files (typically JSON or YAML) that live in version control alongside your application code.
Lesson 2111Dashboard as Code and Version Control
Dashboard variables
solve this by introducing placeholders that users can change on-the-fly, instantly updating all panels that reference them.
Lesson 2107Dashboard Variables and Filters
Data Access Logs
track reads and writes to user data.
Lesson 2360Google Cloud Audit Logs Types
Data analysis
that can be rerun if interrupted
Lesson 2154Spot Instances and Preemptible VMs
Data at Rest
Configure cloud policies that enforce encryption on storage services (block storage, object storage, databases).
Lesson 2839Encryption by Default
Data breaches
Exposed credentials lead to stolen customer data
Lesson 2237Introduction to Secrets Management in Cloud
Data Catalog
A centralized metadata repository that automatically discovers and catalogs your data assets across S3, RDS, Redshift, and other sources.
Lesson 2643AWS Glue Overview
Data changes predictably
(weather forecasts, stock prices, dashboards)
Lesson 2703Time-Based Cache Invalidation (TTL)
Data classification
Tag and separate data by residency requirements
Lesson 2332Geographic and Regional Compliance
Data coming IN
(ingress) is typically **free** across all major cloud providers.
Lesson 199Internet Connectivity Costs
Data Consistency Checks
After failover completes, validate that data integrity is maintained—no corruption, no orphaned records, no application state mismatches.
Lesson 2488Failover Testing and Validation
Data dependencies
What databases or file shares does an application access?
Lesson 2798Application Discovery and Dependencies
Data divergence check
Have writes occurred on both nodes?
Lesson 2484Manual Failover Procedures
Data Encryption Keys (DEK)
Protected by KEKs.
Lesson 2283Key Hierarchy and Root of Trust
data flow
between jobs and steps, turning your workflow into a coordinated pipeline.
Lesson 1711Workflow Output and Job OutputsLesson 2620Azure Data Factory Pipelines
Data Flow Activity
Executes visual transformations on data at scale
Lesson 2650ADF Pipeline Activities and Control Flow
Data format conversion
Change date/time formats or number representations
Lesson 537Request and Response Transformation
Data going OUT
(egress) is where costs accumulate.
Lesson 199Internet Connectivity Costs
Data in Transit
Enforce TLS/SSL for all network communication.
Lesson 2839Encryption by Default
Data integrity
You always know the object hasn't been tampered with
Lesson 145Object Immutability Concepts
Data Integrity Validation
is the systematic verification that your backed-up data hasn't been corrupted, is complete, and can be successfully restored.
Lesson 2907Data Integrity Validation
Data isolation
Tenant A cannot access Tenant B's metrics
Lesson 1985Cortex Multi-Tenancy
Data Key Caching Pattern
stores DEKs in memory for a limited time or number of operations.
Lesson 2305Data Key Caching Pattern
data lake
is a storage architecture that holds vast amounts of raw data in its native format until it's needed.
Lesson 2627Data Lake Concepts and ArchitectureLesson 2628Data Warehouse vs Data Lake
Data lake integration
Export to S3, Azure Blob Storage, or GCS for warehousing
Lesson 2151Custom Cost Reports and Export
Data lineage
tracking backup creation, encryption, and storage locations
Lesson 2447Compliance and DR Documentation
Data Locality
Some regulations require data to be processed within specific geographic boundaries.
Lesson 421Cross-Region Read ReplicasLesson 1351Pod Affinity Fundamentals
Data loss
When queues overflow, messages get dropped unless dead letter queues are configured
Lesson 2740Understanding Backpressure in Distributed Systems
Data Minimization
Only collect what you need.
Lesson 2328GDPR Data Protection Requirements
Data movements
Bulk downloads, unusual file sharing, or data exfiltration patterns
Lesson 2858Behavioral Analytics and Anomaly Detection
Data persistence
Data survives container restarts
Lesson 1151Pod Storage and Volumes Basics
Data pipelines
Start ETL jobs when data files arrive
Lesson 168Event Notifications
Data plane operations
`Encrypt`, `Decrypt`, `GenerateDataKey` (for application use)
Lesson 2289Key Policies and Access Control
Data portability
Encrypted data can move between regions (via replication, backups, or user migration) without re-encryption, since the same key exists in both locations.
Lesson 2292Multi-Region Keys
Data Processing Agreements (DPAs)
that clearly define:
Lesson 2328GDPR Data Protection Requirements
Data processing pipelines
Transform uploaded files, process streaming data, or resize images on demand
Lesson 470FaaS Use Cases and Anti-Patterns
Data protection
Multiple copies guard against data loss
Lesson 2475Database Replication Fundamentals
Data residency
defines where data must be stored geographically.
Lesson 2332Geographic and Regional Compliance
Data residency compliance
Keep encrypted data in-region while maintaining key management flexibility
Lesson 2312AWS KMS Multi-Region Keys
Data sharing
Multiple containers in the same Pod can access the same files
Lesson 1151Pod Storage and Volumes Basics
Data source type
– combines provider and resource type (e.
Lesson 748Data Source Block Syntax
data sources
let you query and fetch information about existing infrastructure—things you didn't create with your current Terraform configuration and don't want to manage.
Lesson 747Data Sources OverviewLesson 834State File Partitioning
Data sovereignty
Keeping sensitive data within specific geographic boundaries
Lesson 21Private Cloud Deployment ModelLesson 160Cross-Region Replication Basics
Data structures
Memcached stores only strings/binary blobs; Redis supports complex types (lists, hashes, sorted sets)
Lesson 2689Memcached Fundamentals
Data synchronization is critical
Must replicate state continuously
Lesson 2445DR for Stateful vs Stateless Apps
Data transfer costs
(especially egress)
Lesson 2799TCO Analysis for Migration
Data transfer out (egress)
– Per-GB charges when data leaves the cloud through the private connection
Lesson 2224Private Connectivity Cost Management
Data Transformations
Handle complex ETL operations including aggregations, joins, windowing (though less common in pure batch), and custom business logic.
Lesson 2621Google Cloud Dataflow Batch
Data validation
Checking data quality after ETL jobs complete
Lesson 2656Serverless Query Engine Overview
Data warehouses
use **schema-on-write**: data is transformed and structured *before* storage.
Lesson 2628Data Warehouse vs Data Lake
Data warehousing
systems that scan billions of rows
Lesson 69Storage Optimized Instance Types
Database abstraction
Standard SQL or ORM layers instead of proprietary features
Lesson 2764Application Portability Fundamentals
Database Admins
– Database creation and management rights
Lesson 349Groups Fundamentals
Database Backend
By default, Grafana uses SQLite.
Lesson 1993Installing and Configuring Grafana
Database changes
– A record is updated
Lesson 462Event-Driven Execution Model
Database connections
Connect your local SQL client to a cluster database
Lesson 1142kubectl port-forward for Local AccessLesson 1667Multi-Environment Promotion
Database containers
that require specific shutdown signals to flush data safely
Lesson 1016STOPSIGNAL: Graceful Shutdown
Database events
When a record changes in DynamoDB, invoke a function to update search indexes or send notifications.
Lesson 2501Event-Driven Invocation Pattern
Database Integration
When creating an RDS instance or managed database, you can specify a secret from Secrets Manager to auto-generate and store the master password.
Lesson 2249Cross-Service Secrets Integration
Database limits
Remember that connection pooling **multiplies** across all concurrent function instances
Lesson 2548Connection Pooling and Reuse
Database Load
A simple metric showing how many active sessions are running.
Lesson 412Performance Insights
Database migrations
Run schema updates before the app starts
Lesson 1149Init ContainersLesson 1663Rollback and Recovery Patterns
Database multi-tenancy
Using schemas or row-level security to isolate customer data within a single database instance rather than separate database servers
Lesson 2164Multi-Tenancy and Resource Sharing
Database offloading
Reducing load on expensive database queries
Lesson 2682In-Memory Caching Fundamentals
Database operators
(like PostgreSQL Operator): checking if the database cluster is fully initialized
Lesson 1914Resource Health Customization
Database passwords
and connection strings
Lesson 704State File Security Concerns
Database per Service Pattern
means each microservice owns and manages its own private data store.
Lesson 2561Database per Service PatternLesson 2562Shared Database Anti-Pattern
Database queries
with embedded passwords
Lesson 664Security and Sensitive Data in Logs
Database Query Cache
Cached query results or materialized views
Lesson 2708Multi-Layer Caching Strategies
Database read replicas
– Maintain extra replicas so promoting one to primary doesn't eliminate all redundancy
Lesson 2460Capacity Planning for High Availability
Database replicas
Spread primary and replicas across nodes so a node failure doesn't take down your entire database
Lesson 1352Pod Anti-Affinity Basics
Database replication
across VPCs
Lesson 2229MTU and Jumbo Frames
Database Security Group Rule
Allow port 3306 from `web-tier-security-group` (not specific IPs)
Lesson 205Security Group Chaining and References
Database workloads
(SQL, NoSQL) requiring fast, consistent performance
Lesson 125Block Storage vs Other Storage Types
Datadog, New Relic
Vendor-specific integrations
Lesson 1635Distributed Tracing Integration
Datastore
are fully managed, serverless NoSQL databases from Google Cloud.
Lesson 440Google Cloud Firestore and Datastore
Datastore mode
for traditional server architectures or when migrating legacy Datastore applications.
Lesson 440Google Cloud Firestore and Datastore
Date stamps
`2024-01-15` (time-based snapshots)
Lesson 1064Image Naming and Tagging Conventions
Date versioning
`api-gateway-access-v2-2024`
Lesson 375Policy Documentation and Governance
Date/Time
Most common pattern (`year`, `month`, `day`, `hour`)
Lesson 2633Data Partitioning Strategies
Date/time fields
(date, year-month) for time-series data
Lesson 2622Batch Data Partitioning
Date/time functions
`CURRENT_DATE()`, `DATE_DIFF()`, `TIMESTAMP_TRUNC()`
Lesson 2666BigQuery Standard SQL and Functions
Day 0-30
Objects stay in hot storage (frequent access)
Lesson 159Storage Class Transitions
Day 31-90
Transition to cool storage (occasional access, lower cost)
Lesson 159Storage Class Transitions
Day 91+
Transition to archive storage (rare access, cheapest)
Lesson 159Storage Class Transitions
Day/night patterns
Does traffic always spike at 9 AM?
Lesson 2104Time Series and Temporal Context
Days 1-7
Keep in hot storage for active debugging
Lesson 2055Log Retention and Storage Classes
Days 8-90
Move to cool storage for recent investigations
Lesson 2055Log Retention and Storage Classes
Days 91-365
Archive to cold storage for compliance
Lesson 2055Log Retention and Storage Classes
DB instance
is the actual database server running in the cloud.
Lesson 397RDS Architecture and Components
DDoS cost protection
if a DDoS attack causes your AWS resources to scale up (increased EC2 instances, CloudFront data transfer, etc.
Lesson 2382AWS Shield Advanced
DDoS mitigation
through rate limiting and throttling (as you learned earlier)
Lesson 284Load Balancer Security Best Practices
DDoS Protection
Many CDNs absorb malicious traffic before it reaches your infrastructure.
Lesson 582What is a CDN and Why Use One
DDoS Response Team
during an active attack.
Lesson 2382AWS Shield Advanced
Deactivation
Temporarily disable suspicious keys
Lesson 343Access Keys and Credential Management
Dead Letter Queue
is a special holding area for messages that cannot be successfully processed after multiple delivery attempts.
Lesson 553Dead Letter QueuesLesson 2714Dead Letter Queues
dead letter queue (DLQ)
is a separate queue where failed function invocations are sent after all retry attempts are exhausted.
Lesson 500Dead Letter QueuesLesson 576Dead Letter QueuesLesson 2743Dead Letter Queues for Failed Messages
Dead Peer Detection (DPD)
intervals to detect failed connections
Lesson 2199VPN Gateway Configuration
Dead-letter queues
(which you already know) work alongside **auto-forwarding**, **message deferral** (retrieve specific messages later), and **time-to-live** settings for fine-grained message lifecycle control.
Lesson 560Azure Service Bus QueuesLesson 2551Asynchronous Processing Patterns
Deadline propagation
means each service in a call chain inherits and respects the remaining time budget from its caller.
Lesson 2591Timeout and Deadline Propagation
Debug connectivity issues
"Why can't my application reach the database?
Lesson 222VPC Flow Logs
Debug file permissions
`kubectl exec my-pod -- ls -la /app`
Lesson 1140kubectl exec: Executing Commands in Containers
Debug issues
Track down failed requests or slow responses
Lesson 257ALB Access Logs and Monitoring
Debug issues faster
Trace problems through the actual call chain
Lesson 1639Service Dependency Mapping
Debug logs
dumping entire objects with sensitive fields
Lesson 664Security and Sensitive Data in Logs
Debug mode
– Preview data at each transformation step before full execution
Lesson 2651ADF Mapping Data Flows
Debugging authorization
issues with specific headers or JWT claims
Lesson 1637Access Logging in Service Mesh
Debugging dashboards
let developers drill into traces, logs, and metrics for root-cause analysis
Lesson 2100Dashboard Purpose and Audience
Debugging Needs
Adding upstream service names, retry counts, or circuit breaker states helps diagnose failures faster.
Lesson 1638Log Formats and Customization
Debugging strategy
Run `kubectl describe pvc <name>` to see detailed events explaining why binding failed.
Lesson 1302Troubleshooting PV and PVC Issues
Debugging Tools
Use distributed tracing to visualize the complete journey of an event across services.
Lesson 581Event-Driven Monitoring and Observability
Decentralized Data
Each service typically owns its database, avoiding shared state that creates tight coupling.
Lesson 2555What Are Microservices?
Declarative Application Setup
means defining your ArgoCD Applications as Kubernetes resources (YAML manifests) stored in Git, just like any other Kubernetes object.
Lesson 1888Declarative Application Setup
Declarative Configuration
Your entire system's desired state is described declaratively in Git (YAML, JSON, HCL, etc.
Lesson 1852What is GitOps?Lesson 1862GitOps and Kubernetes
Declarative IaC
lets you define your desired end state, and the tool figures out how to get there.
Lesson 685Declarative vs Imperative IaC
Declarative Infrastructure
Instead of writing step-by-step scripts ("create this, then that"), you declare the desired end state in JSON templates.
Lesson 893Introduction to Azure Resource Manager (ARM)
Declarative management
Everything is defined in Git as YAML manifests
Lesson 1919Introduction to Flux and GitOps Philosophy
Declarative Pipeline syntax
, you use the `parallel` directive inside a `stage` to define multiple sub-stages that execute at the same time.
Lesson 1792Parallel Stage Execution
Declarative Rules
You define *what* must be true (e.
Lesson 2888Policy as Code Fundamentals
Declarative specifications solve this
Lesson 1855Declarative Infrastructure
Declarative workflows
You define *what* should happen (via pipeline configuration files stored *in* the repo itself), not manual steps someone must remember.
Lesson 1647Version Control as the Source of Truth
Decoupled architectures
Publishers don't know who's listening
Lesson 551Queue vs Topic Pattern
Decoupled Storage and Compute
Processing engines (Spark, query services, ML frameworks) connect to the data lake when needed, rather than being tightly coupled like traditional database systems.
Lesson 2627Data Lake Concepts and Architecture
Decoupling microservices
Services subscribe to topics they care about without knowing who publishes to them.
Lesson 557AWS SNS Topics and Subscriptions
Decryption happens automatically
when authorized applications read the data
Lesson 408Encryption at Rest
Dedicated
Higher setup fees, monthly port charges, but can be cheaper at high volumes
Lesson 2197VPN vs Dedicated Connections
Dedicated Connection
A physical Ethernet port dedicated exclusively to you (1 Gbps, 10 Gbps, or 100 Gbps)
Lesson 2212AWS Direct Connect Fundamentals
Dedicated Connections
(like AWS Direct Connect, Azure ExpressRoute, or GCP Cloud Interconnect) are private physical circuits leased from telecom providers.
Lesson 2197VPN vs Dedicated Connections
Dedicated CPU cores
(or shares of cores)
Lesson 51What is a Virtual Machine?
Dedicated hardware
AWS Dedicated Hosts vs Azure Dedicated Hosts vs GCP Sole-Tenant Nodes
Lesson 109Cross-Provider Compute Feature Comparison
Dedicated Hosts
provide physical server isolation, important for regulatory compliance or licensing requirements.
Lesson 94AWS EC2 Launch Types and Tenancy
Dedicated Instances
and **Dedicated Hosts** provide physical server isolation, important for regulatory compliance or licensing requirements.
Lesson 94AWS EC2 Launch Types and Tenancy
Dedicated Interconnect
and **Partner Interconnect**.
Lesson 2205Google Cloud Interconnect Options
Dedicated nodes
`kubectl taint nodes prod-db-01 dedicated=database:NoSchedule`
Lesson 1362Applying Taints to Nodes
Dedicated Secrets Managers
Tools like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault act as fortified vaults.
Lesson 1654CI/CD Security and Secrets Management
Dedicated SQL pools
– Provisioned compute for traditional data warehouse workloads (think: fast BI dashboards, scheduled reports)
Lesson 2635Azure Synapse Analytics
Dedicated tenancy
gives you physical hardware that only runs your instances.
Lesson 94AWS EC2 Launch Types and Tenancy
deduplication
to prevent the same message from being processed multiple times.
Lesson 556AWS SQS FIFO QueuesLesson 1070Image Manifest and Layers
Deep layer inspection
examines files added in each `COPY` or `ADD` instruction
Lesson 1083Malware and Secret Scanning
Deep packet inspection
to identify attack patterns
Lesson 2388Anycast and Traffic Scrubbing
Default Access
Grafana starts on port `3000` with default credentials `admin/admin`.
Lesson 1993Installing and Configuring Grafana
Default behavior
catches everything else:
Lesson 595Cache Behavior Configuration
Default Deny
(Gate 3): If there's no explicit deny *and* no explicit allow, the request is **denied by default**.
Lesson 338Policy Evaluation Logic
Default deny all
at the Network ACL level
Lesson 2396Network ACLs for Subnet Isolation
Default deny pattern
Start by denying everything, then explicitly allow what passes:
Lesson 2339OPA Policy Development
Default encryption
Your baseline—enable everywhere
Lesson 2303Object Storage Encryption Options
Default port
RDP listens on port **3389** (your cloud security group must allow this)
Lesson 58Windows VMs and RDP Access
Default requests/limits
– Applied when pods don't specify them
Lesson 1338LimitRange Objects
Default to stateless
Question every stateful design decision—is it truly necessary?
Lesson 2474Designing for Stateless-First Architecture
DefaultValue
(optional): Value used if none provided
Lesson 897Parameters in ARM Templates
Defense-in-depth
means deploying multiple protection layers that work together, each catching different attack types at the most efficient point.
Lesson 2379DDoS Protection LayersLesson 2396Network ACLs for Subnet Isolation
Define cost centers
in your organization (e.
Lesson 2145Cost Centers and Business Units
Define expected state
based on compliance requirements (PCI DSS, HIPAA, etc.
Lesson 2346Compliance Testing and Validation
Define or select
a built-in or custom policy definition
Lesson 2343Azure Policy for Compliance Automation
Define permissions
(Role/ClusterRole) → **Assign them** (RoleBinding/ClusterRoleBinding).
Lesson 1375RBAC API Objects Overview
Define restart policies
Set `restart: unless-stopped` for services that should survive reboots.
Lesson 1059Compose Best Practices and Limitations
Define source(s)
– Connect to datasets from your linked services
Lesson 2651ADF Mapping Data Flows
Define the test condition
What makes it compliant (encryption enabled)
Lesson 2337Compliance Requirements Translation
Defining compliance requirements
in plain language (e.
Lesson 2886Compliance Testing with Open Policy Agent
Definition of "good"
Response code 2xx or 3xx AND latency < 500ms
Lesson 2116Defining SLI Specifications
Degraded state operations
– Systems running with reduced capacity still meet SLAs
Lesson 2460Capacity Planning for High Availability
Degraded user experience
Slower response times
Lesson 1340CPU Throttling Behavior
Delayed jobs
wait a specified time period before starting automatically, giving teams a window to cancel problematic deployments.
Lesson 1753Manual and Delayed Jobs
Delays
Inject latency to simulate slow networks or overloaded services.
Lesson 1610Fault Injection for Resilience Testing
Delegated administration
Managers can create users, but those users cannot touch security or compliance controls
Lesson 369Policy Boundaries and Guardrails
Delete old rotations
to free disk space
Lesson 1436Log Rotation and Storage
Delete old versions
you no longer need (but keep critical baselines)
Lesson 373Policy Versioning and Change Management
DELETE operation
removes an object from a bucket permanently.
Lesson 153Basic Object Operations
Delete unused secret versions
– Old versions still incur storage costs
Lesson 2251Secrets Management Cost Optimization
DELETE_COMPLETE
Stack fully removed
Lesson 877Stack Creation and Lifecycle
DELETE_IN_PROGRESS
Tearing down resources
Lesson 877Stack Creation and Lifecycle
Delete/Destroy
Remove secrets or specific versions
Lesson 2245GCP Secret Manager Fundamentals
Deletes
any resources in the resource group that aren't in the template
Lesson 901Template Deployment ModesLesson 912Deployment Modes: Complete vs Incremental
Deleting old manual snapshots
Automated backups expire automatically, but manual snapshots persist until you delete them.
Lesson 426Backup Storage and Costs
DeletionPolicy: Retain
survive stack deletion (like keeping photos before demolishing a house).
Lesson 877Stack Creation and Lifecycle
Delimiter splitting
Split CSV-style logs on commas or pipes
Lesson 660Log Parsing and Enrichment
Delivery methods
Email, SMS, Lambda functions, or HTTP endpoints
Lesson 1849Pipeline Notifications and EventBridge
Delta detection
System compares new scan results with previous ones
Lesson 1085Continuous Vulnerability Monitoring
Demonstrations
Show API behavior in demos without needing infrastructure running
Lesson 545Mock Integrations and Testing
denies
traffic from a certain IP range, that traffic is blocked immediately—even if rule #200 would have allowed it.
Lesson 207NACL Rule Ordering and EvaluationLesson 363Allow vs Deny Effects
Deny all inbound traffic
(you must explicitly allow what you need)
Lesson 202Security Group Fundamentals
Deny always overrides Allow
, no matter where it appears.
Lesson 363Allow vs Deny Effects
deny by default
if no policy grants access to a path, access is blocked.
Lesson 2264Vault Policies and Access ControlLesson 2395Segmentation with Security Groups
Deny-by-default
Block everything unless explicitly approved
Lesson 1486GKE Binary Authorization
Departments
(teams within units, like "Mobile Team" or "Data Science")
Lesson 2965Cost Centers and Business Units
Dependencies and relationships
– Ensures connections between resources remain intact
Lesson 702State Reconciliation
Dependencies are respected
(you can't test what hasn't been built)
Lesson 1657Linear Pipeline Pattern
dependency chain
Stack B depends on Stack A, so Stack A must be applied first.
Lesson 835Dependency Management Between StacksLesson 916Outputs and Cross-Template Communication
Dependency issues
Work around circular dependencies temporarily
Lesson 781Targeting Specific Resources
Dependency Scanning
examines third-party libraries and packages your project uses, checking against known vulnerability databases (like CVE lists).
Lesson 1766Pipeline Security Scanning
Dependency-aware triggering
means downstream service pipelines automatically kick off when upstream dependencies change.
Lesson 1669Microservices Pipeline Orchestration
Dependency-based waves
Group applications with tight dependencies together, ensuring supporting services migrate before dependent applications.
Lesson 2802Migration Wave Planning
DependsOn Carefully
Explicit dependencies prevent race conditions but can slow deployments.
Lesson 919ARM Template Best Practices and Validation
Deploy dark
Push code to production with features turned off
Lesson 1666Feature Flag Integration
Deploy Kong or Ambassador
on your Kubernetes cluster (AWS EKS, GKE, AKS, or on-premises)
Lesson 2772API Gateway Abstraction
Deploy pods
that use the annotated Kubernetes service account
Lesson 1481GKE Workload Identity
Deploy the new version
alongside your existing version (both running simultaneously)
Lesson 1606Canary Deployments with Service MeshLesson 1665Canary Deployment Pattern
Deploy to `dev` stage
Your team tests new features internally
Lesson 532API Gateway Stages and Deployment
Deploy to `prod` stage
Only after approval, customers access it
Lesson 532API Gateway Stages and Deployment
Deploy to `test` stage
QA validates behavior with realistic data
Lesson 532API Gateway Stages and Deployment
Deploy to test cluster
with realistic values
Lesson 1548Chart Testing and Validation
Deployment blocking
Configure pipeline to fail and prevent merges when tests fail
Lesson 2887CI/CD Integration for IaC Tests
Deployment configuration
How fast to roll out (all-at-once, one-at-a-time, etc.
Lesson 1832CodeDeploy Application and Deployment Groups
Deployment Engine
ARM processes your infrastructure requests and orchestrates resource creation in the correct order, handling dependencies automatically.
Lesson 893Introduction to Azure Resource Manager (ARM)
Deployment Group Layer
Within each application, you define one or more deployment groups representing different environments or configurations.
Lesson 1832CodeDeploy Application and Deployment Groups
Deployment Groups
, which define *where* your code will be deployed—the actual EC2 instances, Lambda functions, or ECS services that will receive your updates.
Lesson 1832CodeDeploy Application and Deployment Groups
Deployment Manager
is Google's native IaC solution—it's tightly integrated with GCP, requires no installation (built into the cloud console and CLI), and manages resources through Google's APIs directly.
Lesson 946Deployment Manager vs Terraform on GCP
Deployment package size
– Larger packages take longer to download and initialize
Lesson 2543Cold Start Fundamentals
Deployment pipelines
Current version, rollout status, recent changes
Lesson 2932Kubernetes and Cloud Resource Visualization
Deployment scripts
let you embed PowerShell or Bash scripts directly into your ARM template, and Azure will execute them during deployment using temporary Azure Container Instances.
Lesson 909Deployment Scripts in ARM Templates
Deployment speed
(hours to deploy new features vs.
Lesson 37Measuring Cloud Business Value: KPIs and Metrics
Deployments
, ensuring the right number of pod replicas are running and orchestrating rolling updates.
Lesson 1106Built-in Controllers OverviewLesson 1900Health AssessmentLesson 2033ELK/EFK on Kubernetes
Deprovisioning
When users leave, automated workflows immediately disable accounts, revoke cloud resource access, remove group memberships, and trigger security key rotation—all without manual coordination across dozens of systems.
Lesson 2857Identity Governance and Lifecycle
deregistration delay
) solves this problem by allowing in-flight requests to complete gracefully before the target is fully removed.
Lesson 241Connection Draining and DeregistrationLesson 279Connection Draining and Graceful Shutdown
Deregistration on shutdown
When the container stops, it's automatically removed from the target group
Lesson 258ALB and Container Integration
Description field
What this policy does and why it exists
Lesson 375Policy Documentation and Governance
Design
Pure queue with pull-based consumption.
Lesson 2725Provider-Specific Queue Services
designing for failure
and **high availability** — immutable infrastructure makes recovery faster because you're always deploying known-good configurations.
Lesson 46Immutable Infrastructure PrinciplesLesson 49Observability and Monitoring Architecture
Desired
3 nodes (initial capacity)
Lesson 1465Creating Managed Node Groups
Desired = 5 waiters
(your typical weeknight sweet spot)
Lesson 292Minimum, Maximum, and Desired Capacity
Desired replica count
How many Pods you want (e.
Lesson 1155ReplicaSet Purpose and Architecture
Desired State Configuration (DSC)
Ensures configuration consistency
Lesson 100Azure VM Extensions and Custom Script
Destination CIDR blocks
Where traffic is headed (like `10.
Lesson 219Transit Gateway Route Tables
Destination clusters
Which Kubernetes clusters/namespaces can apps deploy to?
Lesson 1887ArgoCD Projects for Multi-Tenancy
Destination service
Provides service discovery and routing policies to proxies
Lesson 1591Linkerd Overview and Architecture
DestinationRule
defines traffic policies for specific services, the **Gateway** resource is your mesh's front door—it configures how external traffic enters your service mesh in the first place.
Lesson 1583Gateway Resource for Ingress
DestinationRules
you specify traffic weights in the VirtualService routing rules.
Lesson 1605Traffic Splitting and Weighted RoutingLesson 1614Load Balancing Algorithms
Destroyed
Key permanently deleted (typically cannot decrypt data afterward)
Lesson 2280Introduction to Key Management SystemsLesson 2320GCP Cloud KMS Key Rotation and Versions
Detailed usage data
Granular metrics down to the resource level
Lesson 2178GCP Billing Exports to BigQuery
Detect a problem
Monitoring alerts show increased errors after a recent deployment
Lesson 1873Rollback and Recovery
Detect anomalies
Identify unusual traffic patterns that might indicate security threats
Lesson 213Network Security Logging and Monitoring
Detect Drift
If desired and actual states differ, drift is detected
Lesson 1869GitOps Reconciliation Loop
Detection granularity
determines how you segment monitoring: by service, account, cost center, tag combination, or resource type.
Lesson 2969Cost Anomaly Detection
Detection mode
Logs threats but doesn't block (testing phase)
Lesson 2370Azure WAF Overview
Detection Mode (Monitor)
The WAF logs suspicious traffic but allows it through.
Lesson 2367WAF Rule Types and Modes
Detects partitions
based on directory structure patterns
Lesson 2646Glue Crawlers
Determine criticality tiers
Group systems into categories like "mission-critical," "business-critical," "important," and "non- critical.
Lesson 2410Business Impact Analysis (BIA)
Determines the correct order
for deletion based on dependencies (reverse of creation order)
Lesson 780terraform destroy Workflow
Deterministic
Predefined inputs produce expected outputs
Lesson 2491Chaos Engineering vs Traditional Testing
Deterministic sampling
Use trace IDs to ensure consistent decisions across services
Lesson 2083Sampling Strategies in OpenTelemetry
Dev deployment
happens on every commit or merge
Lesson 1651Environment Promotion Strategies
Dev environment
Developers test integrated changes.
Lesson 1667Multi-Environment Promotion
Developer Advocates
Drive adoption, gather feedback, create documentation
Lesson 2937Platform Team Structure and Responsibilities
Developer experience
Local testing, debugging with standard IDE tools
Lesson 2529Temporal and Alternative OrchestratorsLesson 2913Platform vs. Product Teams
Developer sandboxes
Developers can create resources but never modify IAM or billing settings
Lesson 369Policy Boundaries and Guardrails
Developer Satisfaction
captures the qualitative experience through surveys and feedback.
Lesson 2916Developer Experience Goals
Developer-friendly interfaces
Portals, CLIs, or APIs that abstract complexity
Lesson 2914Internal Developer Platform (IDP) Fundamentals
Developers are users
Treat them like paying customers.
Lesson 2915Platform as Product Mindset
Development
Developers push newly built images to the registry after tagging them (e.
Lesson 988Container Registry FundamentalsLesson 1672Artifact Lifecycle
Development and test environments
where flexibility matters more than specialization
Lesson 66General Purpose Instance Types
Development and testing
environments
Lesson 2532DynamoDB Capacity Modes
Development environment
Your team member clones the code, starts the container, and it works immediately—no hunting for the right library versions.
Lesson 965Container Portability BenefitsLesson 1672Artifact Lifecycle
Development environments
Preserve your IDE state, debugger breakpoints, and loaded data between work sessions
Lesson 88VM HibernationLesson 1059Compose Best Practices and LimitationsLesson 2160Idle Resource Detection
Development milestones
preserving a "known good" state
Lesson 424Manual Snapshots and Retention
Development or testing environments
Where interruptions are acceptable
Lesson 1168Recreate Strategy
Development speed
trumps fine-tuned performance optimization
Lesson 2530Serverless Database Concepts
Development/testing
Start with burstable or small general-purpose instances
Lesson 399Database Instance ClassesLesson 425Snapshot Copying and Sharing
Device ID
Events from the same IoT device maintain order
Lesson 578Event Ordering and Partitioning
Device management
for GPUs or specialized hardware
Lesson 1394Privileged Containers
Device Registration
– Is this device enrolled in your management system?
Lesson 2855Device Trust and Endpoint Security
Device-specific caching
Store separate cached versions for mobile vs desktop by adding device type to the cache key
Lesson 621Edge Caching with Functions
DHCP Options Set
is a configuration bundle that automatically provides these network settings to every instance in your VPC.
Lesson 227DHCP Options Sets
Diagnostic Logs
Automatic streaming to Log Analytics or Storage
Lesson 2691Azure Cache for Redis
Diagnostic settings
on individual resources (VMs, databases, storage accounts) route their logs to your workspace
Lesson 676Azure Log Analytics WorkspacesLesson 2053Azure Monitor LogsLesson 2359Azure Monitor and Activity Logs
Different Control Planes
Each cloud provider has its own console, CLI, and APIs.
Lesson 2756Multicloud Challenges: Complexity and Management Overhead
Different environments
(Linux, Windows, macOS)
Lesson 1798Distributed Builds and Agent Architecture
Different lifecycles
Your app might deploy 10 times a day, but infrastructure configs change weekly.
Lesson 1866GitOps Repository Structure
Different Network Models
AWS uses VPCs with route tables and security groups, Azure has VNets with network security groups, and GCP has VPC networks with firewall rules.
Lesson 2778Multicloud Networking Challenges
Different performance tiers
(fast SSD vs.
Lesson 1303StorageClass Fundamentals
Differential Backup
saves all changes since the *last full backup*.
Lesson 2419Full, Incremental, and Differential Backups
Digests are immutable
they always reference the exact same image content.
Lesson 995Image Manifest and Digest
Dimension filtering
Slice data by user, application, or host to isolate problem sources
Lesson 456Performance Insights and Diagnostics Tools
Dimensional filtering
Slice costs by dimensions like region (`us-east-1`), service (`EC2`, `S3`), environment tag (`production`, `development`), or cost center.
Lesson 2139Cost Explorer and Billing Dashboards
Direct
Agent runs as a service, master controls it
Lesson 1779Jenkins Build Agents and Executors
Direct application export
Applications send logs directly to a logging backend
Lesson 2049Kubernetes Logging Architecture
Direct Attachment
Block storage volumes typically attach to a single VM at a time, acting like a dedicated external hard drive plugged into your instance.
Lesson 113Block Storage Overview
Direct attachment to VMs
– acts like a local hard drive
Lesson 125Block Storage vs Other Storage Types
Direct compute access
– analytics engines read directly without copying
Lesson 2630Object Storage as Data Lake Foundation
Direct Connect (AWS)
, **ExpressRoute (Azure)**, and **Cloud Interconnect (GCP)** are dedicated private network connections between your on-premises datacenter and cloud provider.
Lesson 2811Network Optimization for Migration
Direct Connect Gateway
is a globally available resource that acts as a central hub for your Direct Connect connection.
Lesson 2214Direct Connect Gateway
Direct data lake access
Query data in place using formats like Parquet, ORC, JSON, or CSV without loading it into a separate database first.
Lesson 2656Serverless Query Engine Overview
Direct integration
with external stores without intermediate Kubernetes Secrets
Lesson 2276Secrets Store CSI Driver
Direct peering
with cloud provider edge networks
Lesson 2209SD-WAN Integration with Cloud
Direct shipping
Applications send logs directly to a logging backend
Lesson 2046Cloud-Native Logging Overview
Direct SQL queries
on raw files with warehouse-speed performance
Lesson 2629Data Lakehouse Architecture
Directly connect
if your facility is in or near a Direct Connect location
Lesson 2212AWS Direct Connect Fundamentals
Directories
Create an Application for each subdirectory matching a pattern
Lesson 1908Git Generator Patterns
Directory structure separation
Keep shared modules in one place, with environment-specific folders that reference them with different variable values
Lesson 712Environment Separation Strategies
Disable
a version to block access without deleting
Lesson 2246GCP Secret Manager IAM and Versioning
Disable or delete accounts
when people leave your organization
Lesson 346Creating and Managing User Identities
Disable unnecessary features
by default (unused APIs, protocols, or services)
Lesson 2844Secure by Default Configuration
Disaster Recovery (DR)
is a structured approach to quickly restore critical systems, applications, and data after a catastrophic event.
Lesson 2405What is Disaster Recovery (DR)?
Discard the plaintext DEK
when done
Lesson 2296Envelope Encryption Pattern
Discount opportunities
Workloads eligible for Committed Use Discounts
Lesson 2180GCP Recommender and Cost Insights
Discover unexpected side effects
that your blast radius didn't account for
Lesson 2494Chaos Experiments in Non-Production
Discovery
Search across all data assets using keywords, tags, or business terms
Lesson 2637Data Catalog and Metadata ManagementLesson 2645Glue Data Catalog Fundamentals
Discovery scans
using automated tools to catalog infrastructure
Lesson 2797Migration Assessment Framework
Disk fencing
Disable a node's ability to write to shared storage
Lesson 2485Split-Brain Prevention
Disk I/O activity
per device
Lesson 411Enhanced Monitoring
Disk I/O saturation
when writing blocks and handling queries simultaneously
Lesson 1977Challenges of Running Prometheus at Scale
Disk size
Boot disk capacity per node (minimum 100GB, typically).
Lesson 1479GKE Node Pools and Machine Types
Disk space available
Free storage that fluctuates
Lesson 1950Metric Types: Gauge
Disk type
Standard persistent disk or SSD persistent disk.
Lesson 1479GKE Node Pools and Machine Types
Disk usage
How efficiently layers are stored
Lesson 1033Docker Storage Drivers
Disk usage monitoring
Track which jobs consume the most space
Lesson 1780Workspace Management and Build Artifacts
Display important information
after provisioning (like a server's public IP or a database endpoint)
Lesson 764Introduction to Outputs
Display name
human-readable label
Lesson 393GCP Service Accounts
Distance
AZs are typically separated by miles (but close enough for synchronous replication)
Lesson 2454Availability Zones and Data Center Distribution
Distribute requests randomly
across any available instance using simple load balancing
Lesson 2462Stateless Services and Horizontal Scaling
distributed cache
is a high-speed, in-memory data store replicated across multiple nodes.
Lesson 2469Distributed Caching for Stateful DataLesson 2506Circuit Breaker for Functions
Distributed cloud
takes the resources you'd find in centralized cloud regions (like those you learned about in Regions and Availability Zones) and spreads them across many smaller locations closer to end users or devices.
Lesson 25Edge and Distributed Cloud
Distributed computing
tasks with checkpointing
Lesson 104GCP Preemptible and Spot VMs
Distributed file systems
like Hadoop HDFS
Lesson 69Storage Optimized Instance Types
Distributed filesystems
GlusterFS, Ceph, Convoy
Lesson 1040Volume Drivers and Plugins
Distributed rate limiting
uses a **shared state store**—typically Redis—to maintain a single source of truth for request counts.
Lesson 2747Distributed Rate Limiting
Distributed state
Use shared storage (Redis, DynamoDB) so all consumers see the same deduplication tracking
Lesson 2734Event Deduplication Strategies
Distributed Systems Drivers
(Ceph CSI, Longhorn, Portworx)
Lesson 1327CSI Driver Selection and Comparison
Distributed Traces
Because proxies see both sides of service-to-service calls, they can inject trace context and forward span data to tracing backends like Jaeger or Zippo, giving you end-to-end request visibility across multiple hops.
Lesson 1570Service Mesh Observability BenefitsLesson 1589Istio Telemetry Architecture
Distributed tracing
creates a complete picture of how requests move through your system by tracking them across all services involved.
Lesson 2060What is Distributed Tracing
Distributes
your application to the target instances or services
Lesson 1813CodeDeploy: Deployment Automation Overview
Distribution
Efficient delivery of image layers across networks
Lesson 1060What is a Container Registry
distributors
(receive metrics), **ingesters** (buffer and write), **queriers** (execute PromQL), and **compactors** (optimize storage).
Lesson 1986Mimir for Large-Scale MetricsLesson 2034Loki Architecture and Design Philosophy
Diverse Authentication Models
AWS uses IAM roles and policies, Azure uses Active Directory integration, and GCP uses service accounts.
Lesson 2756Multicloud Challenges: Complexity and Management Overhead
DLQ retention
Longer than main queue (e.
Lesson 2743Dead Letter Queues for Failed Messages
DMZ (Demilitarized Zone)
Internet-facing services like load balancers and web servers
Lesson 2841Security Boundaries and Trust Zones
DMZ/Perimeter Zone
Internet-facing services with heavy scrutiny
Lesson 2840Network Segmentation Architecture
DNS (CoreDNS or kube-dns)
Provides internal service discovery.
Lesson 1112Add-on Components and Extensions
DNS amplification
Exploit open DNS servers to magnify attack traffic 50-100x
Lesson 2378DDoS Attack Types and Vectors
DNS and Service Discovery
Each cloud has its own DNS services.
Lesson 2778Multicloud Networking Challenges
DNS fails
Service name typo or CoreDNS problem
Lesson 1218Service Debugging and Troubleshooting
DNS failures
Test with `kubectl run busybox --image=busybox --rm -it -- nslookup kubernetes.
Lesson 1519Troubleshooting Common Cluster Issues
DNS logs
(domain name queries).
Lesson 2862AWS GuardDuty
DNS query floods
Overwhelm DNS services with lookup requests
Lesson 2378DDoS Attack Types and Vectors
DNS Resolution
When you type a URL, your DNS query is answered by the CDN's intelligent DNS system, which analyzes your location, network conditions, and server health.
Lesson 586CDN Request Flow and Routing
DNS server address
(often third IP) - For name resolution services
Lesson 179Reserved IP Addresses in Subnets
DNS Update
The DNS record pointing to the database endpoint is updated to route traffic to the newly promoted primary
Lesson 2483Automatic Failover Process
DNS-based
AWS Route 53, Kubernetes CoreDNS (simple but limited health checking)
Lesson 2575Service Discovery Patterns
DNS-based or API-based lookup
Applications query the registry via DNS or API calls to get current service locations.
Lesson 2784Multicloud Service Discovery
DNS-compatible naming conventions
Lesson 146Bucket Naming and Namespaces
Docker Container
Run Grafana in a container using `docker run -d -p 3000:3000 grafana/grafana`.
Lesson 1993Installing and Configuring Grafana
Docker Content Trust (DCT)
is a security feature that uses digital signatures to verify both the publisher of an image and the integrity of its content.
Lesson 1077Content Trust and Notary
Docker Engine
is the most familiar runtime.
Lesson 962Container Runtime Basics
Docker executor
runs each job inside a fresh Docker container, giving you a clean, isolated workspace every time.
Lesson 1733Docker Executor and Images
Docker Hub mirrors
Configured in Docker daemon settings
Lesson 997Registry Mirroring and Caching
Docker image
to use, and GitLab spins up a container from that image to execute your job's scripts.
Lesson 1733Docker Executor and Images
Docker images
Your containerized applications (as you've been working with in GCR)
Lesson 1095Artifact Registry Multi-Format Support
Docker login
Stores credentials locally using `docker login` command
Lesson 992Registry Authentication and Authorization
Docker Plugin
Build and run containers in your jobs
Lesson 1775Jenkins Plugins and Extensibility
Docker volumes
are storage mechanisms that exist *outside* the container's filesystem but can be mounted *into* containers.
Lesson 1035Introduction to Docker Volumes
Document gaps
Every test reveals weaknesses—missing runbook steps, incorrect DNS configurations, or slow database restores.
Lesson 2442DR Testing Scenarios
Document security controls
mapped to Annex A requirements
Lesson 2325ISO 27001 Information Security
Document standards
Maintain a tag dictionary with allowed values
Lesson 2141Tagging Strategy for Cost Allocation
Document the impact
What fails if this component goes down?
Lesson 2450Single Points of Failure Identification
Document thoroughly
Include the compliance requirement being satisfied, expected inputs, and usage examples.
Lesson 2347Policy Libraries and Reusability
Document your logic
Write down *why* each group exists
Lesson 350Creating and Organizing Groups
Document your plan
Keep a spreadsheet showing which subnets use which CIDR blocks
Lesson 177Subnet Sizing and Planning
Document your rules
Note why each rule exists
Lesson 212Least Privilege Network Access
Document your tagging strategy
for your team
Lesson 92VM Tagging and Organization
Documentation accuracy
Are runbooks current and complete?
Lesson 2902DR Testing Fundamentals and Objectives
Documentation hub
Centralized technical docs, runbooks, and guides
Lesson 2924Introduction to Developer Portals
Documented
The code itself is the documentation
Lesson 684What is Infrastructure as Code?
Documented standards
in a root-level README
Lesson 833Repository Structure for Large Projects
Documenting interfaces
for module users
Lesson 803Module Output Values
Does not
make any changes to actual infrastructure
Lesson 778terraform refresh Command
Domain Events
represent meaningful business occurrences in your application.
Lesson 569Event Types and Naming Conventions
Domain name
– The domain suffix for hostnames (e.
Lesson 227DHCP Options Sets
Domain name servers
– Which DNS resolvers instances should query (e.
Lesson 227DHCP Options Sets
Domain-Driven Design Basics
(lesson 2559) or implementing proper service communication patterns.
Lesson 2562Shared Database Anti-Pattern
Domain-specific flows
Game levels completed, reports generated, videos transcoded
Lesson 638Custom Metrics and Instrumentation
domain-specific language (DSL)
created by Microsoft specifically for deploying Azure resources.
Lesson 920Introduction to BicepLesson 921Bicep vs ARM Templates
Don't
use it for regular services—those should expose metrics endpoints and be scraped normally.
Lesson 1959Pushgateway for Short-Lived Jobs
Don't accidentally expose secrets
or sensitive data in configuration files
Lesson 715Code Review and Peer Validation
Don't change
field types or meanings
Lesson 570Event Schema Design
Don't log sensitive data
like passwords or tokens, even in structured format.
Lesson 1437Structured Logging Best Practices
Don't over-index
Each index consumes storage and CPU during writes.
Lesson 448Index Design and Strategy
Download
the appropriate package for your OS from HashiCorp's official site
Lesson 724Installing Terraform and Provider Basics
Download artifacts
from completed runs
Lesson 1724GitHub Actions APIs and Webhooks
Download your code
– Retrieve your deployment package
Lesson 2543Cold Start Fundamentals
Downloading
a service account key (JSON file) for external applications
Lesson 393GCP Service Accounts
Downloads the image manifest
to discover which layers are needed
Lesson 994Pulling Images from Registries
Downside
Your application will be completely unavailable during the transition — no pods are serving traffic between the old terminating and new starting.
Lesson 1168Recreate Strategy
Downstream protection
Prevents your functions from overwhelming databases, APIs, or third-party services with too many simultaneous connections
Lesson 478Function Concurrency Limits
Downstream testing projects
that validate integrations
Lesson 1759Multi-Project Pipelines
DR
is about the *entire process* of getting your business operations running again after a disaster— whether that's a data center fire, cyberattack, natural disaster, or major infrastructure failure.
Lesson 2405What is Disaster Recovery (DR)?
Draining
Gracefully evict existing pods, which move to healthy nodes
Lesson 1509Node Image Upgrades
Draining timeout
how long to wait (0–3600 seconds)
Lesson 279Connection Draining and Graceful Shutdown
drift detection
to ensure your configuration matches reality, then manage that resource just like any other IaC- managed infrastructure.
Lesson 706Import Existing ResourcesLesson 1853GitOps vs Traditional Operations
Drop it
Simplest approach, acceptable for non-critical metrics
Lesson 2606Watermarks and Late Data
DRY principle
Define test logic once, apply it across all matrix dimensions
Lesson 1660Matrix Build PatternLesson 1716Workflow Templates and Reusable Workflows
Dry-run mode
Some meshes let you log policy violations without enforcing them
Lesson 1629Security Policies Best Practices
Dual VPN gateways
in your cloud VPC (ideally in different availability zones)
Lesson 2200High Availability VPN Connections
Dual-circuit, same location
Two circuits to one cloud PoP on different routers—protects against device failure.
Lesson 2220Private Connectivity Redundancy
Dual-write temporarily
Write to both monolith and new service databases during transition
Lesson 2569Microservices Migration Strategies
Duplicate alerts
from different monitoring systems
Lesson 651Alarm Best Practices and Anti-Patterns
Durable Execution
Step Functions (AWS), Durable Functions (Azure), and Cloud Workflows (Google) persist workflow state automatically.
Lesson 2525Long-Running Workflows
Durable Functions
is an extension of Azure Functions that adds **state management** and **orchestration** capabilities.
Lesson 512Azure Functions: Durable Functions
Duration-based
You set how long (e.
Lesson 278Session Affinity and Sticky Sessions
During development
Developers catch issues locally before committing
Lesson 722IaC Security Scanning
During launch
After an instance starts but *before* it receives traffic
Lesson 318ASG Lifecycle Hooks
During termination
After Auto Scaling decides to remove an instance but *before* it shuts down
Lesson 318ASG Lifecycle Hooks
Dynamic mappings with parameters
Lesson 876Complex Function Nesting
Dynamic routing
As Pods scale up or down, the Service automatically adjusts
Lesson 1205Service Selectors and Labels
Dynamic routing protocols
(like BGP) to automatically failover between tunnels
Lesson 2200High Availability VPN Connections
Dynamic updates
Some platforms can update mounted secret files without restarting containers, enabling rotation without downtime.
Lesson 2271Volume-Mounted Secrets
Dynamic values
Let CloudFormation determine resource identifiers instead of guessing
Lesson 863Intrinsic Function Ref
DynamicFrames
(Glue's enhanced data structure) and **PySpark** (the Python API for Apache Spark).
Lesson 2647Glue ETL Script Development

E

Each hop's IP address
(which router handled your traffic)
Lesson 2227Network Path Analysis and Traceroute
Early detection
Catch issues before they become outages
Lesson 639Introduction to Alarms and Alerting
Early issue detection
with minimal user impact
Lesson 1665Canary Deployment Pattern
Earning Credits
When your instance uses *less* than its baseline CPU (say, 20% for a t3.
Lesson 77Burstable Instance Types and Credits
Easier backups and snapshots
of specific data
Lesson 61Root and Additional Storage Volumes
Easier disaster recovery
Shift workloads to a different cloud when needed
Lesson 2765Container-Based Portability
Easier troubleshooting
Single set of logs to examine
Lesson 1577Istio Control Plane Components
Easy updates
– Change the group's policy once to update access for all members simultaneously
Lesson 349Groups Fundamentals
EBS Snapshot Copy
involves creating point-in-time snapshots of EBS volumes and copying them to other regions.
Lesson 2439Storage Replication Strategies
EC2 actions
Stop, terminate, or reboot instances
Lesson 670CloudWatch Alarms and Actions
EC2 checks
for basic infrastructure monitoring.
Lesson 294Health Check Types
EC2/On-premises
Install agents on your servers; CodeDeploy pushes updates
Lesson 1813CodeDeploy: Deployment Automation Overview
Economy Tier
(`slow-hdd`): Low-cost HDDs for backups, logs, archives, and cold data.
Lesson 1314Multiple StorageClasses Strategy
Ecosystem growth
Third-party tools target one standard instead of many
Lesson 1598Service Mesh Interface (SMI) Standard
ECR and ACR fundamentals
, ACR Tasks takes your registry beyond simple storage by embedding intelligent automation directly into the registry service itself.
Lesson 1091ACR Tasks and Automated Builds
ECS
Update container task definitions with rolling or blue-green strategies
Lesson 1813CodeDeploy: Deployment Automation OverviewLesson 1837CodeDeploy for Lambda and ECS
ECS and Fargate
Automatic sidecar injection and task definition integration
Lesson 1595AWS App Mesh Overview
ECS Tasks
use the `awslogs` log driver in your task definition.
Lesson 2052AWS CloudWatch Logs Integration
Edge caching
means storing copies of that content at CDN Points of Presence (PoPs) around the world, so users get responses from nearby locations instead of traveling all the way to the origin every time.
Lesson 584Origin Servers and Edge Caching
Edge cases
Boundary conditions and unusual but valid inputs
Lesson 2899Policy Testing and Validation
Edge Location
The servers within a PoP that actually cache and serve content
Lesson 583CDN Architecture and Points of Presence
Edge routers
Separate customer-premises equipment (CPE)
Lesson 2220Private Connectivity Redundancy
edit
Similar to admin but without RBAC modification privileges.
Lesson 1385Default ClusterRolesLesson 2002Dashboard Sharing and Permissions
Education and enablement
(training teams on cost-aware architecture)
Lesson 2954Shared Responsibility Model
Educational institutions
collaborating on research projects
Lesson 24Community Cloud Model
Efficient Auto-Scaling
Because startup is so fast, automated scaling systems can respond to load changes in near real- time, maintaining performance without over-provisioning resources.
Lesson 967Fast Startup and Scaling
Efficient parallelization
Run all combinations simultaneously rather than sequentially
Lesson 1660Matrix Build Pattern
Efficient pulls
You only download new layers
Lesson 1070Image Manifest and Layers
Efficient Resource Use
Parallel processing maximizes throughput
Lesson 2720Competing Consumers Pattern
Efficient storage
Common layers (like an OS base) are stored once
Lesson 976Union Filesystem Mechanics
Efficient updates
kube-proxy and other consumers only watch affected slices
Lesson 1212EndpointSlices
Effort
Can this be solved with better documentation versus major tooling changes?
Lesson 2946Feedback Loops and User Research
Egress Bandwidth
Cloud providers often throttle outbound traffic.
Lesson 2789Network Performance and Latency Considerations
egress charges
are fees cloud providers impose when data leaves their network.
Lesson 2159Network Data Transfer CostsLesson 2786Data Transfer Costs and Optimization
Egress settings
control where your function's outbound traffic goes:
Lesson 516Google Cloud Functions: VPC Connectivity and Networking
Egress-Only Internet Gateway
is a special gateway designed specifically for IPv6 traffic.
Lesson 198Egress-Only Internet Gateway
EKS
managed node groups let you trigger image updates that perform rolling replacements.
Lesson 1509Node Image UpgradesLesson 1512Add-Ons and ExtensionsLesson 1595AWS App Mesh Overview
EKS Clusters
require a logging agent like Fluent Bit (which you've learned) deployed as a DaemonSet.
Lesson 2052AWS CloudWatch Logs Integration
EKS removes this burden
by providing a fully managed, highly available control plane.
Lesson 1460Introduction to Amazon EKS
Elastic compute
Moving to autoscaling groups instead of fixed VM counts
Lesson 2793Replatform Strategy
Elastic IP (EIP)
is a static, public IPv4 address that you can allocate to your cloud account and assign to resources like virtual machines.
Lesson 190Elastic IP Addresses
Elastic IP address
(the NAT Gateway's public-facing IP)
Lesson 193NAT Gateway Deployment
Elastic IP addresses
or reserved public IPs
Lesson 85VM Termination and Deletion
Elastic IP attachment
You bring your own Elastic IPs (one per AZ), giving you complete control over the exact addresses
Lesson 266Static IP and Elastic IP Support
Elastic Network Interface (ENI)
to bridge your function into the VPC.
Lesson 490Function Network Configuration
ElastiCache for Memcached
A simpler, multithreaded engine optimized for straightforward key-value caching with horizontal scaling across multiple nodes.
Lesson 2690AWS ElastiCache Overview
ElastiCache for Redis
Supports advanced data structures (sets, sorted sets, hashes), pub/sub messaging, persistence, and clustering — ideal when you need Redis-specific features or multi-AZ replication.
Lesson 2690AWS ElastiCache Overview
elasticity
(the ability to scale up and down) with the **pay-as-you-go pricing model** you learned earlier, the cost benefits become clear:
Lesson 32Elasticity and Cost Benefits of Auto-ScalingLesson 34Business Agility: Time-to-Market Advantages
Elasticity and Auto-Scaling
from earlier lessons?
Lesson 36Risk Reduction Through Cloud Migration
ELB checks
when your instances serve traffic through a load balancer.
Lesson 294Health Check Types
Eliminate operational overhead
no patching, no server management
Lesson 442DocumentDB and MongoDB-Compatible Services
Eliminate wasted work
Return early when possible.
Lesson 2547Execution Duration Optimization
Eliminates Persistent Threats
Attackers who compromise a system and install backdoors lose access when that instance is replaced.
Lesson 2838Immutable Infrastructure for Security
Email
Send alerts to an email address or distribution list
Lesson 646Alarm Actions and Notifications
Email lists
Simple distribution lists where alerts arrive as messages.
Lesson 647Notification Channels
Embedded binaries and libraries
Lesson 1073Image Scanning Fundamentals
Embedded feedback widgets
in your developer portal (like Backstage) for in-context suggestions
Lesson 2946Feedback Loops and User Research
Embedded metrics
showing adoption milestones and time-saved
Lesson 2943Platform Documentation and Onboarding
Embedded secrets
Hardcoded passwords or API keys in your code
Lesson 722IaC Security Scanning
enable
it when creating or modifying your database instance and choose your preferred granularity interval.
Lesson 411Enhanced MonitoringLesson 2246GCP Secret Manager IAM and Versioning
Enable cluster autoscaler
on node pools to scale down during off-hours.
Lesson 1504AKS Cost Management and Cluster Sizing
Enable CORS
by adding `Access-Control-Allow-Origin` headers for cross-domain requests
Lesson 604Response Header Customization
Enable cost allocation
in your cloud billing dashboard
Lesson 2145Cost Centers and Business Units
Enable Drill-Down
Surface high-level summaries first, but allow users to click through to granular details—from total cloud spend → service costs → team allocations → individual resources.
Lesson 2970Cost Dashboard Design
Enable dual-stack mode
resources get both an IPv4 and IPv6 address simultaneously
Lesson 184IPv6 Support in Virtual Networks
Enable gzip/Brotli
for specific file types (`.
Lesson 601Compression and Content Optimization
Enable high availability
Spread your database across multiple availability zones (different data centers) by including subnets from each zone
Lesson 405Subnet Groups and Network Placement
Enable logging and monitoring
from creation
Lesson 2844Secure by Default Configuration
Enable MFA
for accounts that generate access keys
Lesson 348Access Keys and Programmatic Access
Enable node auto-provisioning
Creates optimally-sized node pools for workload requirements
Lesson 1489GKE Cost Optimization and Bin Packing
Enable parallelism
Multiple team members can test simultaneously in their own environments
Lesson 2883Ephemeral Test Environments
Enable permissive mode
Services accept both plaintext AND mTLS
Lesson 1622mTLS Migration Strategies
Enable Rollback Protection
Use deployment rollback configuration to automatically revert failed updates.
Lesson 919ARM Template Best Practices and Validation
Enable routing
Direct traffic between different parts of your infrastructure
Lesson 175Subnet Fundamentals
Enable versioning
Configure S3 versioning or Azure blob snapshots so you can recover from accidental deletions or corruption.
Lesson 797Remote State Best Practices
Enable Workload Identity
on your GKE cluster (at creation or update)
Lesson 1481GKE Workload Identity
Enable writes
on the target database
Lesson 2826Database Cutover Planning
enabled
(which is the default for ALBs), your load balancer distributes traffic evenly across **all healthy targets** in **all enabled zones**, regardless of which zone received the incoming request.
Lesson 259Cross-Zone Load Balancing for ALBsLesson 2288Key Versioning and Backward CompatibilityLesson 2320GCP Cloud KMS Key Rotation and Versions
Enables version control
by storing configurations as code
Lesson 935Introduction to Google Cloud Deployment Manager
Enabling autonomy
self-service within guardrails, not gates
Lesson 2935Golden Paths and Paved Roads
Enabling composition
between modules (one module's output becomes another's input)
Lesson 803Module Output Values
Enabling real-time responses
for applications like autonomous vehicles or factory automation
Lesson 25Edge and Distributed Cloud
Encapsulate logic
Group related resources (like a VPC with subnets, security groups, and routing tables) into a single, coherent unit
Lesson 798What Are Terraform Modules
Encoding best practices
into reusable templates, pipelines, and automation
Lesson 2935Golden Paths and Paved Roads
Encoding Functions
convert between formats: `jsonencode()`, `jsondecode()`, `yamlencode()`, `base64encode()`, and `base64decode()` bridge Terraform and external systems that require specific data formats.
Lesson 824Terraform Functions for Data Transformation
Encrypt
data as a service (the `transit` engine)
Lesson 2260Vault Secrets Engines Concepts
Encrypt everything
Always enable encryption at rest and in transit.
Lesson 797Remote State Best Practices
Encrypt only the DEK
using the recipient's public key (asymmetric encryption)
Lesson 2307Hybrid Encryption for Large Data
Encrypt state at rest
(on disk or in storage buckets)
Lesson 704State File Security Concerns
Encrypt state in transit
(when transferring between tools)
Lesson 704State File Security Concerns
Encrypt the DEK itself
with your master key (KEK) via KMS
Lesson 2296Envelope Encryption Pattern
Encrypt traffic
All service-to-service communication is encrypted by default
Lesson 1618Mutual TLS (mTLS) Fundamentals
Encrypt your actual data
with this DEK (happens locally, very fast)
Lesson 2296Envelope Encryption Pattern
Encrypt your large dataset
with the DEK using fast symmetric encryption (AES-256)
Lesson 2307Hybrid Encryption for Large Data
Encrypted communication
proceeds with verified identities
Lesson 1618Mutual TLS (mTLS) Fundamentals
Encrypted in Git
Best for audit trails and disaster recovery
Lesson 1870Handling Secrets in GitOps
Encrypted parameter stores
Cloud providers offer encrypted storage that your IaC can reference by name, not value
Lesson 714Secrets Management in IaC
Encrypted traffic
between hosts by default (in Swarm)
Lesson 1045Overlay Networks for Multi-Host
Encryption algorithms
(AES-256, AES-128)
Lesson 2199VPN Gateway Configuration
encryption context
additional authenticated data that must match during decryption—to ensure keys are only used in their intended context (e.
Lesson 2289Key Policies and Access ControlLesson 2308Encryption in Multi-Region Architectures
Encryption overhead
Manually configuring TLS for every connection is error-prone
Lesson 1617Service Mesh Security Overview
Encryption settings
IPsec parameters (must match on both sides)
Lesson 2779Cross-Cloud VPN Connections
EncryptionConfiguration
file on the Kubernetes API server that specifies:
Lesson 1268Secret Encryption at Rest
Encrypts the data locally
using that DEK (typically with symmetric encryption like AES-256)
Lesson 2297Client-Side Encryption
Encrypts the key
if it's a DEK (wrapped by a KEK)
Lesson 2284Key Generation and Randomness
End Users
Request content from their nearest edge location
Lesson 583CDN Architecture and Points of Presence
End-to-end validation
confirming deployed infrastructure meets requirements
Lesson 2875Introduction to Infrastructure Testing
Endpoint
A virtual network interface that connects a sandbox to a network.
Lesson 1041Docker Network Architecture
Endpoint Controller
maintains service endpoint lists.
Lesson 1105Controller Manager: Maintaining Desired State
Endpoint Protection
– Is antivirus/EDR running and up-to-date?
Lesson 2855Device Trust and Endpoint Security
Endpoint Services
are the receiving end: they expose a service (like an API, database, or application) so others can connect via Private Link.
Lesson 2397Private Link and Endpoint ServicesLesson 2483Automatic Failover Process
Endpoints controller
continuously watches:
Lesson 1211Endpoints Objects
EndpointSlices
solve this scalability problem by breaking endpoints into smaller, manageable chunks.
Lesson 1212EndpointSlices
Enforce different access policies
per zone (public internet, internal services, databases, admin consoles)
Lesson 2841Security Boundaries and Trust Zones
Enforce MFA
to add an extra security layer beyond passwords
Lesson 346Creating and Managing User Identities
Enforce performance standards
Functions that exceed reasonable limits signal optimization needs
Lesson 476Function Timeout Configuration
Enforce registry allowlists
(only permitting images from approved registries)
Lesson 1078Admission Controllers for Image Policy
Enforce security boundaries
Keep databases in private subnets, away from direct internet access
Lesson 405Subnet Groups and Network Placement
Enforce strong authentication
(require MFA, deny password-only access)
Lesson 2844Secure by Default Configuration
Enforce with policy
Use cloud-native tools (AWS Organizations policies, Azure Policy, GCP Organization Policies) to require tags at resource creation
Lesson 2141Tagging Strategy for Cost Allocation
Enforcement points
Gates that prevent violations from being deployed
Lesson 2335Introduction to Compliance as Code
Enforcement policies
Compliance-heavy environments requiring guaranteed encryption
Lesson 2303Object Storage Encryption Options
Enforces Auditable Changes
All modifications flow through your CI/CD pipeline and image-building process, creating an audit trail.
Lesson 2838Immutable Infrastructure for Security
Enforces container immutability
principles
Lesson 1392Read-Only Root Filesystem
Enforces intentions
(authorization policies) without touching your app code
Lesson 1594Consul Connect and Sidecar Proxies
Enforcing compliance
Guarantee certain ports can never reach specific subnets
Lesson 2396Network ACLs for Subnet Isolation
Engine Selection
Choose from your supported database engines (MySQL, PostgreSQL, SQL Server, etc.
Lesson 402Creating and Launching RDS Instances
Engineering
owns resource efficiency and architectural decisions
Lesson 2948What is FinOps?
Enhance security
by adding headers like `Strict-Transport-Security` (forces HTTPS) or `X-Content-Type-Options` (prevents MIME sniffing)
Lesson 604Response Header Customization
Enhanced Monitoring
goes a layer deeper by collecting detailed *operating system-level* metrics directly from the instance running your database.
Lesson 411Enhanced Monitoring
Enhanced scanning
(Inspector v2): Provides continuous monitoring, deeper analysis, and covers more languages and package managers
Lesson 1089ECR Image Scanning with Inspector
Enhanced security and compliance
Banking, healthcare, and government often have strict regulations about where data lives
Lesson 21Private Cloud Deployment Model
Enriched logs are intelligence
Filters transform timestamps into searchable dates, IPs into maps, and messy strings into structured fields ready for analysis.
Lesson 2023Logstash Filter Plugins
Enrichment
means adding extra information that wasn't in the original log—like the server's hostname, geographic region, environment name, or even looking up a user's email from their ID.
Lesson 660Log Parsing and EnrichmentLesson 665Log Aggregation Pipelines
Enrichment pipelines
Combine API cost data with your resource tagging metadata (from lesson 2963) to calculate unit economics per customer, team, or feature.
Lesson 2973Cost Allocation APIs and Automation
Ensure compliance
from launch rather than scrambling during audits
Lesson 2836Security by Design
Ensure compliance across jurisdictions
Different clouds may have different compliance certifications.
Lesson 2755Multicloud Benefits: Geographic and Regulatory Coverage
Ensure consistency
Every test starts from a known, clean state
Lesson 2883Ephemeral Test Environments
Ensure fair resource distribution
across all users
Lesson 282Rate Limiting and Throttling at Load Balancer
Ensure fair usage
across all clients
Lesson 2385Rate Limiting and Throttling
Ensures consistency
by creating resources in the correct order with proper dependencies
Lesson 935Introduction to Google Cloud Deployment Manager
Enterprise
Redis Enterprise features including active geo-replication and advanced modules
Lesson 2691Azure Cache for Redis
Enterprise Agreement
or **Management Groups** can roll up subscription costs.
Lesson 2147Multi-Account Cost Consolidation
Enterprise Applications
ERP, CRM systems requiring structured, reliable storage
Lesson 113Block Storage Overview
Enterprise Discount Program
is a contractual agreement between your organization and a cloud provider that offers reduced rates in exchange for a spending commitment over a defined period (typically 1-3 years).
Lesson 2166Discount Negotiation and EDP
Enterprise Security
Built-in integration with Azure's security tools, including Azure Policy for governance, Microsoft Defender for container security, and Azure Private Link for network isolation.
Lesson 1490Introduction to Azure Kubernetes Service (AKS)
Enterprise support
AWS-backed SLA and support options
Lesson 1460Introduction to Amazon EKS
Enterprise tier
Unlimited requests, 1,000 requests/second
Lesson 540API Keys and Usage Plans
ENV
Runtime variables; persist in containers; used for application configuration
Lesson 1006ARG: Build-Time Variables
envelope encryption
(remember: your data encryption key wrapped by a key encryption key from KMS).
Lesson 2302Storage Volume EncryptionLesson 2304Encryption Key Rotation Strategies
Environment branches
work better when you need explicit promotion gates, manual approvals, or regulatory separation between environments.
Lesson 1867Branching Strategies for GitOps
Environment cloning
Spin up development or staging environments with production-like data
Lesson 427Restoring from Backups
Environment Deployment
Each environment pulls the artifact using the appropriate tag
Lesson 1676Artifact Promotion Patterns
Environment deployments
(dev and staging at once)
Lesson 1792Parallel Stage Execution
Environment Isolation
Production, staging, and development networks completely separated
Lesson 2390Network Segmentation Fundamentals
Environment Management
You can use the same Chart across environments by supplying different configuration values—no need to maintain separate YAML files for each environment.
Lesson 1520What is Helm and Why Use It?
Environment names
(dev, staging, prod)
Lesson 853Parameters for Template Reusability
Environment Promotion
After merging to the dev branch, automation detects successful deployments and can automatically promote by opening PRs to staging and production branches based on your defined strategy
Lesson 1876GitOps Workflow Automation
Environment Splitting
Promote a replica to create an independent database for testing, development, or to split a monolithic application into separate services.
Lesson 420Promoting Read Replicas
Environment targeting
Is the correct environment being modified?
Lesson 715Code Review and Peer Validation
Environment tiers
Dev pipelines write to `dev` repositories; production can only read from `prod-releases`
Lesson 1680Artifact Repository Access Control
Envoy proxy
The recommended production-grade option, offering advanced load balancing, retries, and observability features
Lesson 1594Consul Connect and Sidecar Proxies
Ephemeral infrastructure
means containers and VMs come and go.
Lesson 2004Why Centralized Logging
Ephemeral volumes
(also called instance storage or local storage) are physically attached to the host machine running your VM.
Lesson 121Ephemeral vs Persistent Volumes in Cloud
Equal split
Divide costs equally among all consuming teams (simple, but often unfair)
Lesson 2149Shared Services Cost Allocation
Equality
Alert on specific values (HTTP 500 errors > 0)
Lesson 641Threshold-Based Alarms
error budget
is the inverse of your SLO—it's the maximum amount of unreliability you're allowed before breaking your service level promise.
Lesson 2118The Concept of Error BudgetsLesson 2129Incident Severity Levels
error budget policies
your team defined and makes them actionable rather than advisory.
Lesson 2124SLO-Based Deployment GatingLesson 2125Iterating and Refining SLOs Over Time
Error budget remaining
Do we have at least 20% of our monthly error budget left?
Lesson 2124SLO-Based Deployment Gating
Error Budget Tracking
Calculate remaining error budget as a percentage: `(Observed Reliability - SLO Target) / (100% - SLO Target)`.
Lesson 2123Measuring and Reporting SLO Compliance
Error counts
across your application
Lesson 1949Metric Types: Counter
Error messages
from the task itself (Lambda timeout?
Lesson 2526Workflow Monitoring and Debugging
Error percentage
threshold (e.
Lesson 1612Circuit Breaking Patterns
ErrorEquals
which errors to retry (e.
Lesson 2520Error Handling in State Machines
Escalation path
Who to contact if steps fail
Lesson 2130Runbooks and Playbooks
Escalation paths
When to involve leadership
Lesson 2120Error Budget Policies and Decision Making
escape hatches
so users can move down when they outgrow simpler abstractions, but defaults guide them to appropriate levels.
Lesson 2920Abstraction Levels and User PersonasLesson 2940Golden Paths and Paved RoadsLesson 2945Platform Abstractions and Escape Hatches
Establish naming conventions
early (e.
Lesson 92VM Tagging and Organization
Estimate the blast radius
How many users or services are affected?
Lesson 2450Single Points of Failure Identification
ETag
(Entity Tag) is a unique identifier—typically a hash or version string—that represents a specific version of a resource.
Lesson 2674ETag and Conditional Requests
Etcd encryption at rest
Encrypts sensitive data (Secrets, ConfigMaps) stored in etcd
Lesson 1517Cluster Security Hardening
ETL Jobs
Python or Scala scripts (often auto-generated) that transform your data.
Lesson 2643AWS Glue Overview
ETL pipelines
Nightly database extracts, transformation, and loading
Lesson 2614Batch Processing Fundamentals
Evaluate
resources continuously; Azure marks compliant/non-compliant status
Lesson 2343Azure Policy for Compliance Automation
Evaluate configurations
against security benchmarks (like CIS standards)
Lesson 2868Vulnerability Scanning and Management
Evaluation frequency
How often to check (1, 5, 15 minutes)
Lesson 675Azure Monitor Metrics and Alerts
Even distribution
Prevent hot spots and overloaded targets
Lesson 280Cross-Zone and Cross-Region Load Balancing
event
is any action or occurrence that signals your function to execute.
Lesson 462Event-Driven Execution ModelLesson 466Function Lifecycle and Context
Event Broadcasting
Notifies other components (like the scheduler and controllers) about cluster changes through watch mechanisms
Lesson 1116Kubernetes API Server OverviewLesson 2685Redis Pub/Sub and Messaging
Event Deduplication Strategies
ensure compensations aren't applied twice if messages are replayed.
Lesson 2735Compensating Transactions
Event handlers
subscribe to these events and update specialized read models (CQRS read side)
Lesson 2728Combining Event Sourcing and CQRS
Event Hub/Event Grid triggers
Process streaming events
Lesson 511Azure Functions: Bindings and Triggers
Event ID
Unique identifier for tracking
Lesson 570Event Schema Design
Event Sourcing
takes a different approach: instead of storing the current value, you store *every event* that led to that state.
Lesson 573Event Sourcing FundamentalsLesson 2738Event-Driven State Machines
Event Stream
Events flow from the command side to one or more read models through message queues or topics you learned earlier.
Lesson 574CQRS Pattern with Events
Event Time
is the timestamp when the event actually happened in the real world (when the user clicked, when the sensor read the temperature, when the transaction occurred).
Lesson 2604Event Time vs Processing TimeLesson 2605Windowing Concepts
Event transformation
Deploy intermediate processors that translate between schema versions, isolating producers from consumers.
Lesson 2732Event Schema Evolution
Event-Based Cache Invalidation
takes a surgical approach: when the source data changes, an event notification immediately triggers removal or update of affected cache entries.
Lesson 2704Event-Based Cache Invalidation
Event-based triggers
React to blob storage events
Lesson 2620Azure Data Factory Pipelines
Event-driven communication
flips this: services publish events to a message broker when something happens, and interested services subscribe to those events.
Lesson 2578Event-Driven Communication
Event-driven integration
Other systems can subscribe to your event stream and react to changes in real-time.
Lesson 573Event Sourcing Fundamentals
Event-Driven Invocation Pattern
is a serverless architecture approach where functions execute automatically when specific events occur, rather than being continuously running or manually triggered.
Lesson 2501Event-Driven Invocation PatternLesson 2503Fan-Out/Fan-In Pattern
Event-driven processing
Trigger automation when budgets exceed thresholds or anomalies are detected (tying back to your budget management and alerts from lesson 2972).
Lesson 2973Cost Allocation APIs and Automation
Event-driven workflows
Trigger actions when specific items change (e.
Lesson 434DynamoDB Streams and Change Data Capture
Event-driven, sporadic workloads
are FaaS's sweet spot.
Lesson 470FaaS Use Cases and Anti-Patterns
Eventarc
acts as a routing layer, delivering events from over 60 Google Cloud sources to your functions.
Lesson 515Google Cloud Functions: Event-Driven Architecture
EventBridge integration
transform CloudTrail from a passive recorder into an intelligent compliance and security engine.
Lesson 2358AWS CloudTrail Deep Dive
EventBridge rules
that match event patterns and route them to targets like Lambda functions, Step Functions, SNS topics, or even other pipelines.
Lesson 1849Pipeline Notifications and EventBridge
Eventual
Lowest latency, highest availability.
Lesson 437Cosmos DB Consistency Levels
Eventually disable or delete
the old key after migration
Lesson 2311AWS KMS Key Rotation and Aliasing
Every deployment starts fresh
from a known, tested baseline
Lesson 691Immutable Infrastructure Principle
Every hour
`0 * * * *` (at minute 0)
Lesson 1197CronJob Schedule Syntax and Timezone
Every Sunday at midnight
`0 0 * * 0`
Lesson 1197CronJob Schedule Syntax and Timezone
Evidence of implementation
proves you *actually do* what your policies claim.
Lesson 2333Compliance Documentation and Evidence
Evolves with feedback
continuous improvement based on developer experience
Lesson 2935Golden Paths and Paved Roads
Exact
Matches only if the URL path is *exactly* the specified path
Lesson 1223Basic Ingress Rules and PathsLesson 1228Path Types and Matching
exactly
what was approved and scanned earlier—no substitutions, no modifications.
Lesson 1076Image Signing and VerificationLesson 2264Vault Policies and Access Control
Exactly-once processing
Each message handled by one consumer only
Lesson 551Queue vs Topic PatternLesson 2711Queue Types and Semantics
Examine logs
VPN gateway logs, flow logs, and firewall rules
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Example analogy
A restaurant tracks "cost per meal served"—ingredients, labor, utilities divided by meals.
Lesson 2953Unit Economics in Cloud
Example pattern
Return HTTP 200 for healthy, 503 for unhealthy.
Lesson 1427Designing Effective Health Check Endpoints
Example thinking
Instead of reading the same configuration file three times during execution, read it once and store the result in memory.
Lesson 495Execution Duration Optimization
Example use case
A table partitioned by `UserId` with sort key `OrderDate` could have an LSI with sort key `OrderStatus` to quickly find all orders for a user by status.
Lesson 433DynamoDB Secondary Indexes: GSI and LSILesson 1355Inter-Pod Affinity Patterns
Exception process
How to override policies in emergencies
Lesson 2120Error Budget Policies and Decision Making
Excessive permissions
Resources with broader access than necessary
Lesson 722IaC Security Scanning
Exclude health check requests
from web server logs
Lesson 663Log Sampling and Filtering
Exclude unnecessary files
– Test files, documentation, `.
Lesson 485Function Packaging and Deployment Size
Exclusion criteria
Health checks, non-production traffic
Lesson 2116Defining SLI Specifications
Exec form
`RUN ["apt-get", "update"]` (direct execution, no shell)
Lesson 1002RUN: Executing CommandsLesson 1008CMD: Default Container Command
Execute a task
(invoke a Lambda function, call an API, run a batch job)
Lesson 2516Step Functions and State Machines
Execute coordinated cutover
Update production configurations during maintenance window
Lesson 2828Connection String and Configuration Updates
Execute initialization code
– Run code outside your handler function
Lesson 2543Cold Start Fundamentals
Execute or delete
You either apply the change set (making the changes real) or delete it (abandoning the update)
Lesson 851Stack Updates and Change Sets
Execute Pipeline
Call child pipelines
Lesson 2620Azure Data Factory Pipelines
Execute shell
(Linux/Mac) or **Execute Windows batch command**: Run custom scripts
Lesson 1776Build Steps and Post-Build Actions
Execute the change set
if everything looks correct, or discard it if not
Lesson 878Stack Updates and Change Sets
Execute Windows batch command
Run custom scripts
Lesson 1776Build Steps and Post-Build Actions
Executes
your build commands defined in a `buildspec.
Lesson 1812CodeBuild: Managed Build Service Overview
Executes API calls
to create new resources, modify existing ones, or delete obsolete infrastructure
Lesson 699Apply and Provisioning
Executing the import
through the console or CLI
Lesson 891Stack Import Operations
Execution environment
Edge functions are more constrained (limited CPU time, memory, and available APIs) to maintain fast startup
Lesson 612Introduction to Edge Functions
Execution flow
Defining sequences, parallel branches, and conditional logic
Lesson 2515Workflow Orchestration Fundamentals
Execution location
Edge functions run at CDN PoPs worldwide; regional functions run in one or a few selected regions
Lesson 612Introduction to Edge Functions
Execution logs
(or debug logs) show the step-by-step journey of a request through the gateway—transformations, backend calls, authorization checks.
Lesson 535API Gateway Monitoring and LogsLesson 2623Batch Job Monitoring and Logging
Execution order
(which resources Terraform can create in parallel)
Lesson 829Terraform Graph and Visualization
Execution policies
Control behavior for missed runs, concurrent executions, and success/failure history
Lesson 1196CronJob Resource Fundamentals
Execution Time Limits
set the maximum duration a function can run before being forcibly terminated.
Lesson 469Function Timeouts and Limits
Executive dashboards
provide high-level health and SLO compliance at a glance
Lesson 2100Dashboard Purpose and Audience
Executives
want traffic lights: green/yellow/red status indicators, SLO burn rates, and business KPIs.
Lesson 2100Dashboard Purpose and AudienceLesson 2818Migration Progress Tracking and Reporting
Exemptions and overrides
Special cases that should bypass normal rules
Lesson 2899Policy Testing and Validation
Existing connections
remain open so active requests can finish
Lesson 241Connection Draining and Deregistration
Existing multi-platform expertise
or capacity to hire/train
Lesson 2763Evaluating When Multicloud is the Right Strategy
Existing skills
(what your team knows)
Lesson 398Supported Database Engines
Expand geographic reach
If your primary cloud lacks presence in emerging markets, add a second provider with data centers there to reduce latency and meet local requirements.
Lesson 2755Multicloud Benefits: Geographic and Regulatory Coverage
Expand scope
gradually—test bigger blast radius or combine failure modes
Lesson 2500Measuring and Improving Resilience
Expanding capacity
when the root volume fills up
Lesson 61Root and Additional Storage Volumes
Expected Range
Creates a dynamic "band" of expected values (often visualized as upper/lower bounds)
Lesson 644Anomaly Detection Alarms
Expensive aggregations or joins
that take seconds to compute
Lesson 2694Database Query Result Caching
Expiration policies
Auto-flag policies untouched for 6+ months
Lesson 375Policy Documentation and Governance
Expire
(delete) non-current versions after a set period (remove versions older than 90 days)
Lesson 157Versioning Lifecycle and MFA Delete
Expires
after a defined duration (e.
Lesson 1401Service Account Token Projection
Explicit Allow
(Gate 2): If no explicit deny exists, the system looks for an explicit `Allow`.
Lesson 338Policy Evaluation Logic
Explicit Deny
(Gate 1): First, the system checks *all* policies for an explicit `Deny`.
Lesson 338Policy Evaluation Logic
Explicit deny rules
Unlike security groups, ACLs support explicit DENY rules, processed in order by rule number
Lesson 2396Network ACLs for Subnet Isolation
Exploitability
Is there a known exploit in the wild?
Lesson 1075Vulnerability Severity and Prioritization
Exploratory
Discovers unknown failure modes in complex systems
Lesson 2491Chaos Engineering vs Traditional Testing
Exponential Back-off
Instead of retrying instantly, wait progressively longer between attempts.
Lesson 2749Back-off and Retry Strategies
Export and Batching
Sending traces to a collector uses network I/O and can block application threads if not handled asynchronously.
Lesson 2071Instrumentation Overhead
Export data
to BigQuery for advanced analysis
Lesson 2177Google Cloud Cost Management
Exports
enable automated delivery of detailed cost data to storage accounts for custom reporting, integration with BI tools, or long-term archival.
Lesson 2173Azure Cost Management and Billing
Exports API
Manage export configurations via code
Lesson 2176Azure Cost Exports and APIs
Exposes
these metrics through the Kubernetes API Server via the **Metrics API**
Lesson 1445Metrics Server Architecture
Exposing resource attributes
created inside the module
Lesson 803Module Output Values
Exposure
Is the vulnerable component actually used in your running containers?
Lesson 1075Vulnerability Severity and Prioritization
Express Workflows
prioritize high throughput and low cost for short-duration tasks (up to 5 minutes).
Lesson 2517AWS Step Functions Overview
ExpressRoute (Azure)
, and **Cloud Interconnect (GCP)** are dedicated private network connections between your on- premises datacenter and cloud provider.
Lesson 2811Network Optimization for Migration
ExpressRoute circuit
is the fundamental resource that represents your dedicated connection.
Lesson 2203Azure ExpressRoute Fundamentals
ExpressRoute Gateway
acts as the entry point for your Azure virtual network when connecting via ExpressRoute.
Lesson 2217ExpressRoute Gateway and FastPath
Extensibility
Add-ons can extend existing permission sets without modifying core ClusterRoles
Lesson 1386Aggregated ClusterRolesLesson 1770Introduction to Jenkins and CI/CD Automation
External
Customer notifications, regulatory reporting timelines, PR statements
Lesson 2870Incident Response Planning
External access
Resources shared with accounts, users, or services outside your organization
Lesson 372Access Analyzer for Policy Review
External Caches
like Redis or DynamoDB provide shared, distributed caching across all function instances.
Lesson 2549Caching Strategies in Functions
External Configuration Files
Read a JSON, YAML, or other config file that defines which jobs to run, which environments to target, or which tests to execute.
Lesson 1723Dynamic Workflow Generation
External configuration stores
act as a vendor-neutral layer between your application and cloud-specific configuration services.
Lesson 2773Configuration Management Portability
External databases
store permanent data
Lesson 42Stateless Application Design
External dependencies
Can the application reach third-party APIs, payment gateways, or external services?
Lesson 2908Application Recovery Testing
External integrations
Jump from Grafana to Jaeger traces, CloudWatch Logs, or GitHub commits
Lesson 2109Contextual Links and Drill-DownLesson 2798Application Discovery and Dependencies
External metrics
let HPA pull data from any monitoring system or cloud service that exposes metrics, making scaling decisions based on real business and operational signals rather than just pod-level resource usage.
Lesson 1453External Metrics and HPA
External Metrics API
connects your cluster to external data sources through adapters.
Lesson 1453External Metrics and HPA
External names
Public domain names are forwarded to public DNS servers on the internet (if your subnet has internet connectivity via an Internet Gateway or NAT Gateway)
Lesson 223DNS Resolution in VPCs
External policies
Ingress from outside the cluster
Lesson 1246NetworkPolicy Best Practices
External Secrets Operator
acts as a **bridge** between Kubernetes and your external secret vault.
Lesson 1275External Secrets OverviewLesson 1941Secrets Management in FluxLesson 2278Container Registry Authentication
External Secrets Operator (ESO)
is a Kubernetes operator that acts as a synchronization bridge.
Lesson 2274External Secrets Operator Pattern
External service failures
A downstream API is temporarily unavailable
Lesson 553Dead Letter Queues
External stores
Best for dynamic secrets and fine-grained access control
Lesson 1870Handling Secrets in GitOps
External tables
let you create table-like abstractions over file collections:
Lesson 2667Azure Synapse Serverless SQL Pool
Externalize configurations
Move hard-coded values to environment variables or config services
Lesson 2828Connection String and Configuration Updates
ExternalName Service
is a special type of Kubernetes Service that doesn't route traffic to Pods like ClusterIP, NodePort, or LoadBalancer Services do.
Lesson 1209ExternalName Services
ExternalSecret
resource that automatically fetches secrets from external stores and syncs them into Kubernetes Secrets.
Lesson 1280ExternalSecret Resource
Extract context from headers
when consuming messages
Lesson 2072Tracing in Async and Event-Driven Systems
Extract the control
Identify what must be protected (buckets with customer data)
Lesson 2337Compliance Requirements Translation
Extreme performance
Millions of requests per second with microsecond latency
Lesson 261What is a Network Load Balancer (NLB)?
Extreme Performance Needs
Applications handling millions of requests per second with strict latency requirements (financial trading platforms, video streaming origins) benefit from NLB's ability to handle massive concurrent connections with microsecond-level latency.
Lesson 271NLB Use Cases and Patterns

F

F-Pattern and Z-Pattern
Users scan left-to-right, top-to-bottom.
Lesson 2101Information Hierarchy and Layout
Fail-fast insight
Quickly identify which specific combinations break
Lesson 1660Matrix Build Pattern
Fail/Succeed
states terminate execution
Lesson 2517AWS Step Functions Overview
Failback
is the process of migrating workloads, data, and traffic back to your primary region once it's been repaired and validated.
Lesson 2443Failback Procedures
Failed decrypt attempts
(potential breach indicators)
Lesson 2290Audit Logging for Key Usage
Failed resolution attempts
(NXDOMAIN responses)
Lesson 2186DNS Query Logging and Analysis
Failover procedures
Automated or manual steps to switch to standby systems
Lesson 2405What is Disaster Recovery (DR)?
Failover risks
Potential for split-brain scenarios
Lesson 2445DR for Stateful vs Stateless Apps
Failover scenarios
– When one availability zone or region goes down, surviving infrastructure must handle 100% of the traffic
Lesson 2460Capacity Planning for High Availability
Failure
At least one job failed (red X )
Lesson 1694Workflow Status and Logs
Failure Detection
Health checks identify that the primary is unresponsive (covered in earlier lessons on detection mechanisms)
Lesson 2483Automatic Failover ProcessLesson 2623Batch Job Monitoring and Logging
Failure handling
Built-in retry logic and dead-letter queues for poison messages
Lesson 2511Stream Processing PatternLesson 2720Competing Consumers Pattern
Failure Isolation
When one microservice fails, others continue functioning—users might lose one feature but keep access to the rest
Lesson 41Loose Coupling and Service IndependenceLesson 1786Stages and Steps OrganizationLesson 2561Database per Service Pattern
Failure policy
What happens if the webhook is unreachable (`Ignore` or `Fail`)
Lesson 1411Webhook Configuration and Registration
Failure thresholds
How many consecutive failures trigger unhealthy status
Lesson 329MIG Health Checks and Autohealing
Failure tolerance count
"Stop if 3 deployments fail"
Lesson 884StackSet Deployment Strategies
Failure tolerance percentage
"Stop if 10% of deployments fail"
Lesson 884StackSet Deployment Strategies
Failures are caught early
(a failed build never reaches deployment)
Lesson 1657Linear Pipeline Pattern
Fair resource allocation
in multi-tenant environments
Lesson 1334Setting CPU Limits
Fall back to regional
– If local capacity is exhausted, try other zones in the same region
Lesson 1615Locality-Aware Load Balancing
Fallback Logic
Design each component with a degraded-mode response.
Lesson 2458Graceful Degradation Patterns
False alarms
Scaling events that weren't actually needed
Lesson 312Scaling Policy Monitoring
False positives
legitimate traffic blocked by overly aggressive rules
Lesson 2374WAF Logging and MonitoringLesson 2376WAF Tuning and False Positive Management
Fan-In
As each worker function completes, it writes its result to a shared location (like object storage or a database).
Lesson 499Fan-Out/Fan-In PatternLesson 2503Fan-Out/Fan-In PatternLesson 2602Streaming Architecture Patterns
Fan-Out
A coordinator function receives a large dataset or task list and splits it into smaller chunks.
Lesson 499Fan-Out/Fan-In PatternLesson 2503Fan-Out/Fan-In PatternLesson 2602Streaming Architecture Patterns
Fan-out architecture
Publish one message to SNS, which then delivers it to multiple SQS queues for parallel processing by different systems.
Lesson 557AWS SNS Topics and Subscriptions
Fan-out notifications
Multiple systems reacting to the same event
Lesson 551Queue vs Topic Pattern
fan-out pattern
combines SNS and SQS to solve a common problem: delivering the same message to multiple processing pipelines at once.
Lesson 559SQS-SNS Fan-Out PatternLesson 1845Parallel and Sequential Stage Execution
Fan-out/Fan-in
Start multiple functions in parallel, wait for all to complete, then aggregate results (like processing 100 orders simultaneously, then generating a summary report)
Lesson 512Azure Functions: Durable FunctionsLesson 2523Azure Durable Functions
Fan-Out/Fan-In pattern
is a serverless architecture technique where you distribute a single large task across multiple concurrent function invocations (fan-out), then aggregate all their results back into a single output (fan-in).
Lesson 499Fan-Out/Fan-In PatternLesson 1659Fan-Out/Fan-In Pattern
Fargate for EKS
bills based on vCPU and memory requested by your pods (not the whole node).
Lesson 1474EKS Pricing and Cost Considerations
Fargate profile
tells EKS which pods to run on Fargate based on:
Lesson 1466AWS Fargate for EKS
Fast burns
A catastrophic failure might consume 10% of your monthly error budget in 10 minutes
Lesson 2121Multi-Window and Multi-Burn-Rate Alerting
Fast container creation
No need to copy entire images when starting containers
Lesson 979Copy-on-Write Strategy
Fast failover
– Since data isn't tied to one server, failed instances don't cause data loss.
Lesson 2469Distributed Caching for Stateful Data
Fast feedback first
Run Terraform validation and linting immediately on every commit
Lesson 2887CI/CD Integration for IaC Tests
Fast recovery preparation
Create working copies before risky operations
Lesson 1321Volume Cloning
Fast starts
No need to copy gigabytes; just mount existing layers
Lesson 976Union Filesystem Mechanics
Faster
minimal processing overhead
Lesson 263Layer 4 vs Layer 7 Load Balancing
Faster builds
– smaller context uploads in seconds instead of minutes
Lesson 1023Using .dockerignoreLesson 1719Caching Dependencies and Build Artifacts
Faster dashboards
Queries execute in milliseconds instead of seconds
Lesson 1957Recording Rules
Faster deployments
Update function logic without re-uploading heavy libraries
Lesson 507AWS Lambda: Layers and Dependencies
Faster execution
More CPU power means your code runs faster, reducing execution time
Lesson 2545Function Memory and CPU Optimization
Faster pipelines
Jobs run immediately when dependencies are satisfied
Lesson 1760Pipeline DAG and Needs
Faster pulls
Local network speeds vs.
Lesson 1097Registry Mirroring and Caching
Faster queries
(less data to read)
Lesson 2622Batch Data Partitioning
Faster recovery
since new instances start serving traffic immediately
Lesson 2462Stateless Services and Horizontal Scaling
Faster response
Engineers get notified immediately, not hours later
Lesson 639Introduction to Alarms and Alerting
Faster response times
Content served from geographically closer locations
Lesson 584Origin Servers and Edge Caching
Faster startup
Single process initialization
Lesson 1577Istio Control Plane Components
Fastest
to execute, lowest initial risk, but you miss cloud-native benefits like auto-scaling or managed backups.
Lesson 2819Database Migration Strategies Overview
Fastly
focuses on real-time content purging and programmable edge logic through VCL (Varnish Configuration Language).
Lesson 594Popular CDN Providers Overview
FastPath
is a feature that bypasses the ExpressRoute gateway for the data plane while keeping the control plane intact.
Lesson 2217ExpressRoute Gateway and FastPath
Feature Comparison
reveals capabilities: Does the backend support tail-based sampling?
Lesson 2099Trace Backend Selection Criteria
Feature gaps are acceptable
or outweighed by SaaS benefits (automatic updates, reliability, integrations)
Lesson 2795Repurchase Strategy
Feature Prioritization
Classify services by criticality.
Lesson 2458Graceful Degradation Patterns
Feature support
Some drivers don't support all Docker capabilities
Lesson 1033Docker Storage Drivers
Features
Multi-AZ deployments double your infrastructure cost but provide automatic failover.
Lesson 458Cost vs Performance Trade-offsLesson 1327CSI Driver Selection and Comparison
Features needed
(compliance, analytics, extensions)
Lesson 398Supported Database Engines
Federated Control Planes
Some solutions provide a "super control plane" that coordinates multiple clusters, letting you deploy workloads and policies once that propagate everywhere.
Lesson 1513Multi-Cluster Management
Federation
is Prometheus's built-in mechanism for one Prometheus server to scrape and store metrics from another Prometheus server.
Lesson 1961Federation for Multi-Cluster MonitoringLesson 1979Prometheus Federation Basics
Federation support
to connect external identity systems
Lesson 376AWS IAM Service Overview
feedback loop
high utilization triggers more replicas, which lowers utilization, which eventually stabilizes the replica count.
Lesson 1449Horizontal Pod Autoscaler (HPA) FundamentalsLesson 1655Pipeline Observability and FeedbackLesson 2124SLO-Based Deployment Gating
Fencing
forcibly prevents a node from accessing shared resources when it's suspected of being split- brained.
Lesson 2485Split-Brain Prevention
fetch
a resource type, select a **metric**, apply **filters**, then **group** and **aggregate** the data.
Lesson 682GCP Monitoring Query LanguageLesson 1858Continuous Reconciliation
Fetch dynamic information
like AMI IDs, availability zones, or DNS records
Lesson 753When to Use Resources vs Data Sources
Fetches
your source code from repositories like CodeCommit, GitHub, or S3
Lesson 1812CodeBuild: Managed Build Service Overview
Fetches cluster details
retrieves the API server endpoint and cluster CA certificate
Lesson 1497Connecting to AKS with kubectl
Fewer origin requests
→ Lower server load, faster responses
Lesson 587TTL and Cache Control Headers
Fewer rollouts
– one rollout instead of many
Lesson 1171Pausing and Resuming Rollouts
Field filters
Click field values to instantly filter (include/exclude)
Lesson 2029Kibana Index Patterns and Discover
Field mapping
Rename fields (`customer_name` → `name`)
Lesson 537Request and Response Transformation
Field matching
is straightforward:
Lesson 2030Kibana Query Language (KQL)
Field-based indexing
Only specific structured fields are indexed (faster, smaller, but limited scope)
Lesson 2011Log Indexing Fundamentals
Field-based rules
Sample based on HTTP status codes, user IDs, or custom labels
Lesson 1443Log Sampling and Filtering
Field-specific queries
Filter by user, resource, action, or IP
Lesson 2355Audit Log Analysis and Search
Fields
Which details to capture (method, path, status code, user agent, duration, etc.
Lesson 1637Access Logging in Service Mesh
FIFO (First-In-First-Out) queue
is a specialized SQS queue type that preserves the exact order messages are sent and guarantees that each message is processed exactly once.
Lesson 556AWS SQS FIFO Queues
FIFO Queues
Exactly-once processing, strict ordering, 300 msg/sec (3,000 with batching)
Lesson 2725Provider-Specific Queue Services
File
Pre-configured filesystem, multi-VM sharing, slightly lower performance, managed by cloud provider
Lesson 114File Storage OverviewLesson 123Comparing Storage Types: When to Use WhatLesson 140Object Storage vs. Block vs. File
File additions/modifications
what changed at each step
Lesson 986Inspecting Image Layers
File buffers
Durable, survive restarts
Lesson 2024Fluentd Architecture and Design
File formats
Typically CSV or Parquet for compatibility with analytics tools
Lesson 2151Custom Cost Reports and ExportLesson 2631Data Lake Zones and Organization
File parameters
let users upload configuration files or scripts:
Lesson 1788Parameters and User Input
File paths changed
(rebuild frontend only if `src/ui/` changed)
Lesson 1661Conditional Execution Pattern
File uploads
– A new image appears in storage
Lesson 462Event-Driven Execution Model
File-level access
You work with complete files, not raw blocks
Lesson 114File Storage Overview
File-level versioning
Store schema metadata in file headers (Avro, Parquet support this natively)
Lesson 2638Schema Evolution and Versioning
Filebeat
(part of the Elastic Stack) is a lightweight shipper specifically designed for forwarding log files.
Lesson 658Log Collection Agents
Filesystem Functions
access local data: `file()` reads file contents, `templatefile()` renders templates with variables, and `fileexists()` checks for file presence before reading.
Lesson 824Terraform Functions for Data Transformation
Filesystem-specific
Options like `discard` for SSD trim support
Lesson 1315StorageClass Mount Options
Filter by name
removes unwanted fields or series.
Lesson 1999Transformations and Data Processing
Filter early
before joins to reduce data shuffled
Lesson 2662Athena Performance Optimization
Filter efficiently
Search by exact log level, event type, or any field
Lesson 654Structured vs Unstructured LogsLesson 2047Structured Logging in Applications
Filter out expected errors
that are handled gracefully
Lesson 663Log Sampling and Filtering
Filter plugins
are the processing stations that clean, parse, and enrich the data
Lesson 2021Logstash Architecture and PipelinesLesson 2024Fluentd Architecture and Design
Filtering and correlation
Attach a `user_tier=premium` baggage item to filter logs or traces for premium customers across all services, even those that don't directly know about user tiers.
Lesson 2084Baggage and Cross-Cutting Concerns
Filtering at Source
Configure agents to drop noisy, low-value logs *before* processing them.
Lesson 1442Logging Performance and Overhead
Finally invoke your handler
– Execute your actual business logic
Lesson 2543Cold Start Fundamentals
Finance
PCI-DSS governs payment card information; SOX controls financial reporting
Lesson 2322Introduction to Compliance in CloudLesson 2948What is FinOps?
Financial institutions
with strict security and audit needs
Lesson 24Community Cloud Model
Financial modeling
Complex calculations that benefit from parallel processing
Lesson 70Accelerated Computing Instance Types
Finding generation
It creates "findings" for any policy that grants access beyond your defined trust boundary
Lesson 372Access Analyzer for Policy Review
Fine-grained access control
means granting permissions at the file, folder, or even column level rather than blanket access.
Lesson 2639Data Lake Security and Access Control
Fine-grained authorization
using policies
Lesson 376AWS IAM Service Overview
Fine-grained security
and audit trails
Lesson 2629Data Lakehouse Architecture
FinOps
(Financial Operations) is an operational framework and cultural practice that brings financial accountability to the variable spending model of cloud computing.
Lesson 2948What is FinOps?
FIPS 140-2 Level 3
or higher certification
Lesson 2283Key Hierarchy and Root of Trust
FIPS 140-2/3 Certification
Production HSMs meet rigorous federal standards for cryptographic security, providing validated protection levels (Level 2, 3, or 4).
Lesson 2285Key Storage and Hardware Security Modules
Firestore
and **Datastore** are fully managed, serverless NoSQL databases from Google Cloud.
Lesson 440Google Cloud Firestore and Datastore
Firestore Triggers
React to document changes in Firestore—creates, updates, or deletes.
Lesson 515Google Cloud Functions: Event-Driven Architecture
Firewall Insights
(identifies shadowed or unused firewall rules).
Lesson 2194Provider-Specific Network Insights
Firewall whitelisting
Partners can add your NLB's IPs to their allow-lists without worry
Lesson 266Static IP and Elastic IP Support
First request
hits the backend, response is stored in cache
Lesson 536API Gateway Caching
First Request (Cache Miss)
User requests content → Edge location checks its cache → Content not found → Edge fetches from origin → Edge stores copy and serves to user
Lesson 584Origin Servers and Edge Caching
First-class support
from the platform team
Lesson 2917Golden Paths and Paved Roads
Fix processing logic
, then replay messages from DLQ back to main queue
Lesson 2714Dead Letter Queues
Fixed budgets
Hard dollar amounts ("$50,000/month maximum")
Lesson 2972Budget Management and Alerts
Fixed percentage
Split costs evenly or by predetermined ratios (simple but often unfair).
Lesson 2967Shared Cost Allocation
Fixed window
Count requests in time blocks (simple but can allow bursts at boundaries)
Lesson 2592Rate Limiting and Throttling
Flaky tests
Tests that randomly fail destroy trust.
Lesson 1656CI/CD Best Practices and Anti-patterns
Flannel
(in basic mode) do **not** support NetworkPolicies.
Lesson 1244NetworkPolicy CNI Requirements
Flexible
when you need custom dependencies, specific language versions, or require persistent disk writes.
Lesson 105GCP App Engine Standard and Flexible
Flexible environment
runs your application in Docker containers on Compute Engine VMs, allowing custom runtimes and configurations.
Lesson 105GCP App Engine Standard and Flexible
Flexible Formatting
You control the file system.
Lesson 113Block Storage Overview
Flow logs
are the equivalent for your cloud network—they record traffic metadata about every connection passing through your network interfaces, subnets, or entire virtual networks.
Lesson 213Network Security Logging and Monitoring
Flux
(specifically Flux v2) is a CNCF project that embeds GitOps deeply into Kubernetes using custom resources.
Lesson 1863GitOps Tooling Landscape
Fn::Join
and **Fn::Split** are complementary intrinsic functions for string manipulation.
Lesson 866Fn::Join and Fn::Split
Fn::Split
are complementary intrinsic functions for string manipulation.
Lesson 866Fn::Join and Fn::Split
Focused plugin set
for edge collection
Lesson 2038Fluentd and Fluent Bit Overview
Folder
level (affects projects within that folder)
Lesson 2344GCP Organization Policy Service
Folders Plugin
combined with plugins like **Role-Based Authorization Strategy** enable this.
Lesson 1805Folder-Based Organization and RBAC
Follow-the-sun
Different engineers cover their local business hours across time zones.
Lesson 2127On-Call Rotation Structures
Follow-through Rate
Percentage of postmortem action items actually completed.
Lesson 2135Incident Metrics and Learning
For compliance checkpoints
Ensure regulatory requirements are met
Lesson 1662Manual Approval Gates
For gRPC
(which runs over HTTP/2):
Lesson 283HTTP/2 and gRPC Load Balancing
For low-RPO workloads
Schedule frequent snapshots (hourly or more).
Lesson 2423VM and Volume Backup Strategies
For stateless VMs
Focus on volume snapshots only; VM configuration can be redeployed via infrastructure-as-code.
Lesson 2423VM and Volume Backup Strategies
Forbid
when overlapping runs would cause conflicts (e.
Lesson 1198CronJob Concurrency Policies
ForEach Loop
Iterate over a collection (e.
Lesson 2650ADF Pipeline Activities and Control Flow
Forecast API
Retrieve cost projections
Lesson 2176Azure Cost Exports and APIs
Forecast-based budgets
Projected spending based on historical trends
Lesson 2972Budget Management and Alerts
Forecasted costs
Warn if AWS predicts you'll exceed your budget based on current trends
Lesson 2170AWS Budgets and Alerts
Forecasting
Use historical data to predict next month's bill and plan budgets accordingly.
Lesson 2139Cost Explorer and Billing DashboardsLesson 2169AWS Cost Explorer Advanced Features
Foreground deletion
Parent waits until all children are deleted first
Lesson 1125Owner References and Garbage Collection
Format
JSON, plain text, or custom templates
Lesson 1637Access Logging in Service Mesh
Format checks
Is the email address properly formatted?
Lesson 538Request Validation
Format Flexibility
Data lakes accept any data type—JSON logs, CSV files, images, videos, sensor data, Parquet files, database dumps—without transformation.
Lesson 2627Data Lake Concepts and Architecture
Format Standards
Teams often standardize on JSON with specific field names so logs feed cleanly into Elasticsearch, Splunk, or other analysis tools.
Lesson 1638Log Formats and Customization
Formatting (Creating a Filesystem)
Lesson 129Volume Initialization and Formatting
Forward
to backends like Loki, Elasticsearch, or cloud storage
Lesson 2040Fluent Bit for Kubernetes Logging
Forward compatibility
means old readers can handle new schemas (usually by ignoring unknown fields).
Lesson 2638Schema Evolution and VersioningLesson 2732Event Schema Evolution
Forward no cookies
to origin for static assets (CSS, images)
Lesson 2678Query String and Cookie Handling
Forward specific cookies
only – e.
Lesson 2678Query String and Cookie Handling
Forwarders
collect logs from sources (applications, servers, network devices) and ship them to indexers— similar to Fluentd or Promtail, but Splunk-specific.
Lesson 2042Splunk Cloud and Enterprise Logging
Forwarding
Processed logs are shipped to your chosen backend(s)
Lesson 1438Fluentd and Fluent Bit
Foundation first
Migrate shared infrastructure (DNS, identity providers, monitoring) before applications that depend on them
Lesson 2829Dependency Mapping and Migration Order
Four Golden Signals
(from Google's Site Reliability Engineering) cut through the noise by focusing on what truly indicates system health.
Lesson 626The Four Golden Signals
FPGA instances
Programmable chips you can customize for ultra-specific acceleration
Lesson 70Accelerated Computing Instance Types
Free Minutes
GitHub provides free compute minutes for public repositories and generous allowances for private ones, reducing infrastructure costs.
Lesson 1682What is GitHub Actions and Why Use It
Free tier
Most providers give you backup storage equal to your provisioned database storage at no extra charge.
Lesson 426Backup Storage and CostsLesson 539API Gateway Throttling and Rate LimitsLesson 540API Keys and Usage Plans
Freestyle project
(the simplest type) through the web UI:
Lesson 1773Jenkins Jobs and Build Triggers
Freestyle Projects
are the traditional, GUI-based approach.
Lesson 1774Freestyle Projects vs Pipeline Jobs
Fresher content
→ Users see updates faster
Lesson 587TTL and Cache Control Headers
From hours to minutes
What once required scheduling, manual configuration, and multiple handoffs now runs as an automated script.
Lesson 688IaC Benefits: Speed and Efficiency
From sources
Which pods, namespaces, or IP addresses can send traffic
Lesson 1237Ingress Rules Basics
FSGroupPolicy
in CSI drivers can be `ReadWriteOnceWithFSType`, `File`, or `None`
Lesson 1328CSI Security and Access Modes
Full autonomy
sounds appealing—developers can choose any tool, configure any setting, and deploy anywhere.
Lesson 2918Self-Service vs. Full Autonomy
Full Backup
copies all data from scratch.
Lesson 2419Full, Incremental, and Differential Backups
Full backups
Copy the entire `JENKINS_HOME` directory.
Lesson 1808Backup and Disaster Recovery
Full Control
You choose the operating system, install your software, and configure security exactly how you need it.
Lesson 13Infrastructure as a Service (IaaS) OverviewLesson 1805Folder-Based Organization and RBAC
Full failover tests
execute the complete DR procedure, shifting actual workloads to your recovery environment.
Lesson 2902DR Testing Fundamentals and Objectives
Full host access
Can read/write any file on the node
Lesson 1394Privileged Containers
Full OS images
(`ubuntu`, `debian`) provide familiar environments but are larger
Lesson 1001FROM: Base Image Selection
Full ownership
means "you build it, you run it.
Lesson 2565Microservices Team Organization
Full rollback
Restore exact previous state (release inventory)
Lesson 2735Compensating Transactions
Full URLs
Complete paths to specific objects
Lesson 600Cache Invalidation and Purging
Full-text indexing
Every word becomes searchable (great for free-text searches, but expensive)
Lesson 2011Log Indexing Fundamentals
Fully Managed Platform
Azure maintains the operating system, runtime frameworks (like .
Lesson 101Azure App Service Overview
Function 1
Receives uploaded image, validates format
Lesson 2504Function Chaining Pattern
Function 2
Resizes image to multiple dimensions
Lesson 2504Function Chaining Pattern
Function 3
Applies watermark and compression
Lesson 2504Function Chaining Pattern
Function 4
Stores processed images and updates database
Lesson 2504Function Chaining Pattern
Function A
processes initial data and produces output
Lesson 2504Function Chaining Pattern
Function B
receives Function A's output, transforms it further
Lesson 2504Function Chaining Pattern
Function C
takes Function B's result and completes the workflow
Lesson 2504Function Chaining Pattern
Function Concurrency Limits
, which cap how many instances can run simultaneously.
Lesson 479Reserved and Provisioned Concurrency
Function-based microservices
mean your User Service might be `createUser()`, `getUser()`, and `updateUser()` functions rather than a single always-running application.
Lesson 2567Microservices on Serverless
Functional checks
Can we execute a simple query?
Lesson 2482Failover Detection Mechanisms
Functional sharding
divides targets by their *function* or *type*.
Lesson 1980Horizontal Sharding Strategies
Functional Testing
Run your complete test suite against deployments on each cloud.
Lesson 2776Portability Testing and Validation
Functionality validation
Do all critical services operate correctly post-recovery?
Lesson 2902DR Testing Fundamentals and Objectives
Functions and operators
String concatenation, date math
Lesson 2823Heterogeneous Database Migration
Functions, triggers, and constraints
that use engine-specific syntax
Lesson 2808Heterogeneous Database Migration

G

Galley
(configuration validation).
Lesson 1577Istio Control Plane Components
Game streaming
Rendering game graphics in the cloud
Lesson 70Accelerated Computing Instance Types
GameDay
is a scheduled, controlled chaos testing event where teams intentionally break production-like systems to validate their resilience.
Lesson 2499GameDays and Chaos Testing Practices
Gaming Applications
Multiplayer games need consistent, predictable latency for real-time player interactions.
Lesson 271NLB Use Cases and Patterns
Gateway
(managed by cluster operators) defines listeners and infrastructure, while **HTTPRoute** resources (managed by application teams) define routing rules.
Lesson 1233Gateway API IntroductionLesson 1583Gateway Resource for Ingress
Gateway addresses
The public IPs where VPN endpoints terminate
Lesson 2779Cross-Cloud VPN Connections
Gathers technical requirements
– CPU, memory, storage, network bandwidth, OS versions
Lesson 2797Migration Assessment Framework
gauge
is a metric that represents a value at a specific moment—it can go up or down freely.
Lesson 627Metric Types: Counters and GaugesLesson 1950Metric Types: GaugeLesson 1958Alerting Rules
GCP Billing Accounts
can link multiple projects and sub-accounts
Lesson 2968Multi-Account Cost Aggregation
GCP Cloud Audit Logs
records Secret Manager operations
Lesson 2250Secrets Auditing and Compliance
GCP Cloud Logging
provides query filters and custom log-based metrics
Lesson 2355Audit Log Analysis and Search
GCP Functions
connects seamlessly with Pub/Sub, Cloud Storage, and Eventarc.
Lesson 517Cross-Provider Function Comparison
GCP Gen 2
has improved cold starts through Cloud Run's architecture.
Lesson 517Cross-Provider Function Comparison
GCP Interconnect
comes in two flavors: Dedicated Interconnect (direct physical connection) and Partner Interconnect (through supported service providers).
Lesson 2780Direct Connect vs ExpressRoute vs Interconnect
GCP MIGs
excel at rolling updates with built-in canary deployment support.
Lesson 330Cross-Provider Auto Scaling Comparison
GCP Network Intelligence Center
Offers connectivity tests between endpoints
Lesson 2188Network Path Analysis ToolsLesson 2232Network Load Testing Tools
GCP Organization Policy Service
, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
Lesson 2345Continuous Compliance Scanning
GCP VM Manager
Coordinates shutdown, snapshot promotion, and startup sequences
Lesson 2440Automated DR Orchestration
GCP's approach
leverages BigQuery for cost data analysis, offering unparalleled flexibility for custom queries and ML-based analysis.
Lesson 2181Cross-Provider Cost Tool Comparison
GCS
, enable object versioning on your bucket.
Lesson 794State Versioning and History
GDPR
, **HIPAA**, **PCI-DSS**, and **SOC 2** mandate specific log retention periods, encryption standards, and data handling practices.
Lesson 2014Log Security and ComplianceLesson 2329Cloud Provider Compliance CertificationsLesson 2330Compliance Inheritance ModelLesson 2353Audit Log Storage and Retention
General Purpose Instance Types
balance CPU, memory, and networking?
Lesson 67Compute Optimized Instance Types
General Purpose SSD
Balanced IOPS and cost, suitable for most workloads
Lesson 454Database Storage Performance
Generate a SecretID
(dynamic, time-limited credential)
Lesson 2258AppRole Authentication for Applications
Generate compliance reports
showing pass/fail evidence
Lesson 2346Compliance Testing and Validation
Generate contract file
Pact creates a JSON contract capturing these interactions
Lesson 2585Contract Testing and API Contracts
Generate reports
filtered by tag—now you see exactly what each department spent
Lesson 2145Cost Centers and Business Units
Generates
a unique username/password pair on-demand
Lesson 2262Dynamic Secrets Fundamentals
Generates key material
of the appropriate bit length (e.
Lesson 2284Key Generation and Randomness
Generates Kubernetes manifests
(YAML)
Lesson 1521Helm Architecture: Client and Library
Generation
KMS creates the key using cryptographically secure methods
Lesson 2280Introduction to Key Management Systems
Geo-blocking
means preventing access from specific countries or regions entirely.
Lesson 592Geographic Restrictions and Content BlockingLesson 2373Geo-Blocking and IP Reputation
Geo-Targeting
Serve different content based on the user's country or region—pricing in local currency, language variations, or region-specific promotions
Lesson 610Edge Computing Concepts and Use Cases
Geographic compliance
(EU data stays in EU)
Lesson 273Global Load Balancing and DNS-Based Routing
Geographic coverage
Some regions may be better served by one provider over another, enabling global performance optimization.
Lesson 2751What is Multicloud and Why Organizations Adopt It
Geographic diversity
Connections terminating in different metros or regions
Lesson 2220Private Connectivity Redundancy
Geographic expansion
– Prime new edge locations before announcing availability
Lesson 2676Cache-Warming and PreloadingLesson 2790Introduction to Cloud Migration
Geographic optimization
Deploy closer to end-users by pulling from the nearest cloud region
Lesson 1099Cross-Provider Registry Integration
Geographic patterns
unexpected traffic sources indicating reconnaissance
Lesson 2374WAF Logging and MonitoringLesson 2680CDN Cache Analytics and Hit Rates
Geographic proximity
Route users to nearest healthy instance (supports **geographic distribution** from lesson 2453)
Lesson 2457Load Distribution for Availability
Geographic regions
for location-based analysis
Lesson 2622Batch Data Partitioning
Geographic Routing
The DNS returns the IP address of the edge location nearest to you—not just geographically, but also considering network topology and server load.
Lesson 586CDN Request Flow and Routing
Geography
Route by `X-Region` header
Lesson 1608A/B Testing and Experimentation
Geolocation data
(from IP addresses)
Lesson 2010Log Parsing and Enrichment
Get deleted silently
(data loss)
Lesson 2714Dead Letter Queues
GET operation
retrieves an object's content from storage.
Lesson 153Basic Object Operations
Getting Started Guides
Oriented around Golden Paths, these guide new users through their first deployment in 15-30 minutes.
Lesson 2943Platform Documentation and Onboarding
Git commit SHAs
`abc123f` (traceable to source code)
Lesson 1064Image Naming and Tagging Conventions
Git Compatibility
CodeCommit speaks standard Git protocol.
Lesson 1811CodeCommit: Git Repository Service
Git Plugin
Source code checkout from Git repositories
Lesson 1775Jenkins Plugins and Extensibility
GitFlow
uses multiple long-lived branches: a `main` branch for production, a `develop` branch for integration, and separate feature branches that may exist for days or weeks.
Lesson 1668Trunk-Based vs GitFlow Patterns
GitHub
, **Bitbucket**, and **S3** (for pre-packaged code archives).
Lesson 1826Source Providers and IntegrationLesson 1840Source Stage Configuration
GitHub and Bitbucket
require OAuth or personal access tokens for authentication.
Lesson 1826Source Providers and Integration
GitHub Container Registry
allow anyone to pull (download) images without authentication.
Lesson 1062Public vs Private Registries
GitHub repository
hosting your module code
Lesson 805Publishing Modules to Terraform Registry
GitOps for GitOps
your application configurations live in Git, can be reviewed through pull requests, and ArgoCD can even manage its own applications (the "App of Apps" pattern).
Lesson 1891ArgoCD Application CRDLesson 1913App of Apps Pattern
GitOps operator
for Kubernetes that automates the deployment and management of applications by continuously synchronizing your cluster state with Git repositories.
Lesson 1919Introduction to Flux and GitOps Philosophy
GitOps tools
ArgoCD, Flux with multi-cluster support
Lesson 1514Cluster Federation Basics
GitOps workflow automation
uses CI/CD pipelines to generate manifests programmatically, automatically create pull requests, and orchestrate environment promotions from dev through production.
Lesson 1876GitOps Workflow Automation
GitRepository
Connects to Git repositories (GitHub, GitLab, Bitbucket, etc.
Lesson 1933Source Controller
GKE
, you can enable **node auto-upgrade** tied to release channels.
Lesson 1509Node Image UpgradesLesson 1512Add-Ons and Extensions
GKE audit logging
through Cloud Monitoring for forensics
Lesson 1488GKE Security: Private Clusters and Hardening
GKE Autopilot
(which you learned about earlier) automatically manages nodes and charges you *only for the resources your Pods request*, not for entire VMs.
Lesson 1489GKE Cost Optimization and Bin Packing
Global defaults
in the Istio installation configuration profile
Lesson 1588Istio Proxy Configuration
Global load balancers
(DNS-based or anycast) distribute traffic across all regions
Lesson 2435Active-Active Multi-Region
Global reach
– access to worldwide Regions and Availability Zones (concepts you learned earlier)
Lesson 20Public Cloud Deployment Model
Global Read Performance
Users in Europe can query a replica hosted in an EU region rather than waiting for data to travel from a US-based primary database.
Lesson 421Cross-Region Read ReplicasLesson 2486Cross-Region Replication
Global Secondary Index
can use *completely different* partition and sort keys from your base table.
Lesson 433DynamoDB Secondary Indexes: GSI and LSI
Global settings
define defaults that apply to all scrape jobs:
Lesson 1956Prometheus Configuration Basics
Global Tables
turn a single DynamoDB table into a multi-region, fully replicated database.
Lesson 435DynamoDB Global Tables for Multi-RegionLesson 2533DynamoDB Global Tables and Streams
Global tool configuration
Locations of Java, Git, Maven, etc.
Lesson 1772Installing and Configuring Jenkins
Glue Data Catalog
a centralized metadata repository.
Lesson 2619AWS Glue for ETL
Gold
Business-level aggregates and features
Lesson 2615Batch Processing Architectures
Golden Paths
and **Paved Roads** (covered in previous lessons), you create pre-approved, automated workflows.
Lesson 2918Self-Service vs. Full AutonomyLesson 2945Platform Abstractions and Escape Hatches
Golden Signals
are four essential metrics that, when monitored together, give you a complete picture of your system's health.
Lesson 2108Golden Signals and Key Metrics
Good encapsulation
Exposing 5-7 meaningful variables like `environment`, `app_name`, and `enable_monitoring` that abstract away the complexity.
Lesson 807Module Encapsulation and Abstraction
Google BigQuery
supports federated queries through external data sources like Cloud SQL, Cloud Spanner, or Google Sheets.
Lesson 2668Query Federation and External Data
Google Cloud Audit Logs
(Admin Activity and Data Access logs) record every interaction with Cloud KMS keys.
Lesson 2290Audit Logging for Key Usage
Google Cloud Billing API
Export billing data and query by labels or projects
Lesson 2973Cost Allocation APIs and Automation
Google Cloud Dataplex
automatically crawl your data sources (S3 buckets, database tables, BigQuery datasets) to extract **metadata**—information *about* your data.
Lesson 2637Data Catalog and Metadata Management
Google Cloud DNS
provides low-latency resolution with global anycast
Lesson 2782Cross-Cloud DNS Management
Google Cloud Logging
uses bucket retention combined with Cloud Storage lifecycle policies.
Lesson 2055Log Retention and Storage Classes
Google Cloud Operations
(formerly Stackdriver) integrates seamlessly across GCP services and offers sophisticated monitoring query language.
Lesson 683Cross-Provider Monitoring Comparison
Google Cloud Secret Manager
focuses on simplicity and version control, allowing you to store multiple versions of secrets and manage them through IAM policies.
Lesson 2238Cloud-Native Secrets Services Overview
Google Cloud Storage
Object versioning with lifecycle conditions based on age and version count
Lesson 2425Object Storage Versioning and LifecycleLesson 2630Object Storage as Data Lake Foundation
Google Cloud Storage (GCS)
supports Cloud KMS-managed encryption keys for bucket-level or object-level encryption.
Lesson 2321GCP Cloud KMS Integration and HSM
Google Container Registry (GCR)
as its container-specific storage solution, similar to how AWS has ECR and Azure has ACR.
Lesson 1094Google Container Registry (GCR) and Artifact Registry
Google Database Migration Service
Supports schema translation to Cloud SQL
Lesson 2824Schema Conversion Tools
Google Dataproc
emphasizes speed—clusters start in 90 seconds or less.
Lesson 2618Spark on Cloud Platforms
Google Kubernetes Engine (GKE)
GKE clusters automatically send container logs to Cloud Logging when you enable the logging agent.
Lesson 2054Google Cloud Logging (Operations)Lesson 2094Google Cloud Trace
Google Transfer Appliance
works similarly—a rackable storage device for massive datasets that bypasses network limitations entirely.
Lesson 2810Large-Scale Data Transfer Services
Google's network edge
, meaning attacks are detected and mitigated before they ever reach your applications or infrastructure.
Lesson 2384GCP Cloud Armor DDoS Protection
Governance and guardrails
(budget policies, approval workflows)
Lesson 2954Shared Responsibility Model
Governance Mode
provides flexible protection.
Lesson 167Object Lock and Retention
Governance Structures
define who owns what:
Lesson 2989Continuous Optimization Programs
Government
FedRAMP, ITAR, and other frameworks control federal data
Lesson 2322Introduction to Compliance in Cloud
Government agencies
needing to meet specific regulatory standards
Lesson 24Community Cloud Model
GPU instances
Contain one or more graphics cards for parallel processing
Lesson 70Accelerated Computing Instance Types
GPU workloads
(ML training) need specialized hardware
Lesson 1508Node Pool Management
GPU/specialized processing
(machine learning, video rendering) → **Accelerated Computing** instances deliver specialized hardware.
Lesson 78Choosing Instance Types for Your Workload
grace period
after an instance launches before health checks begin.
Lesson 329MIG Health Checks and AutohealingLesson 2606Watermarks and Late Data
Grace periods
Allow brief recovery windows before failover
Lesson 2456Failover Mechanisms and Automation
Graceful rollover
New encryptions use the latest version while old data remains decryptable with previous versions
Lesson 2316Azure Key Vault Key Management
Graceful termination
Selected pods receive a termination signal and respect their `terminationGracePeriodSeconds`.
Lesson 1371Pod Preemption BehaviorLesson 2470Stateful Set Patterns in Kubernetes
Gradual confidence building
before progressing to canary or blue-green deployments.
Lesson 1609Traffic Mirroring (Shadowing)
Gradual Expansion
Systematically cover remaining namespaces
Lesson 1601Service Mesh Adoption Patterns
Gradual rollout
observe real-world behavior before full deployment
Lesson 276Weighted Target Groups and Canary Deployments
Gradually increase traffic
to the new version if metrics look healthy (10%, 25%, 50%, 100%)
Lesson 1665Canary Deployment Pattern
Gradually shift traffic
if metrics are healthy (10% → 25% → 50% → 100%)
Lesson 1606Canary Deployments with Service Mesh
Grafana
complements Kiali by focusing on time-series metrics visualization.
Lesson 1634Service Mesh Dashboards
Grafana server
, a single binary (typically written in Go) that handles everything:
Lesson 1992Grafana Architecture and Components
Grants
provide programmatic, temporary access without modifying the key policy.
Lesson 2310AWS KMS Key Policies and Grants
Granular Control
Instead of all-or-nothing access, IAM lets you specify exactly what each identity can do.
Lesson 331What is IAM and Why It Matters
Granular Tagging and Attribution
Every resource should be tagged with metadata (team, project, environment, cost center).
Lesson 2961Cost Visibility Fundamentals
GraphQL Schema
You define types, queries, mutations, and subscriptions that describe your API's capabilities—just like defining a contract.
Lesson 2537Serverless GraphQL APIs
greater than
75°F" or "alert me when it's **less than** 60°F.
Lesson 643Comparison Operators and ThresholdsLesson 1349Node Affinity Operators
GreaterThan (>)
Alarm when metric exceeds threshold (e.
Lesson 643Comparison Operators and Thresholds
GreaterThanOrEqual (≥)
Alarm when metric reaches or exceeds threshold (e.
Lesson 643Comparison Operators and Thresholds
Green
Normal operating range (CPU < 70%, response time < 200ms)
Lesson 2106Threshold Indicators and Alerts
Green light
(explicit allow) → Proceed
Lesson 364Policy Evaluation Logic
Gremlin API
For graph databases — nodes, edges, and relationships
Lesson 436Azure Cosmos DB: Architecture and APIsLesson 2534Azure Cosmos DB Serverless
Ground floor
(lowest abstraction): Direct infrastructure access via IaC for maximum flexibility
Lesson 2920Abstraction Levels and User Personas
Group by
dimensions like resource group, service name, location, or any tag you've applied
Lesson 2174Azure Cost Analysis and Views
Group costs
by labels (similar to tags in AWS/Azure) you've applied to resources
Lesson 2177Google Cloud Cost Management
Group membership
Which users are in each group?
Lesson 360Auditing Group and Role Membership
Group related keys
by environment (prod-keyring, dev-keyring)
Lesson 2318GCP Cloud KMS Structure and Key Rings
Group runners
(scoped to project groups)
Lesson 1727GitLab CI/CD Architecture Overview
Group-level
Applied to all projects within a group
Lesson 1763Custom CI/CD Variables and Inheritance
Grouping
Organize by labels like instance ID or region
Lesson 682GCP Monitoring Query Language
Grouping and Proximity
Cluster related metrics together (all database metrics in one panel group, all API metrics in another).
Lesson 2101Information Hierarchy and Layout
Groups/Users
Map authentication identities to roles
Lesson 1890ArgoCD RBAC and User Management
Growing systems
where "normal" changes regularly
Lesson 644Anomaly Detection Alarms
GSI
when you need entirely different query dimensions.
Lesson 433DynamoDB Secondary Indexes: GSI and LSI
guardrails
that apply across multiple AWS accounts within an AWS Organization.
Lesson 370Service Control Policies (SCPs)Lesson 2925Service Catalog Fundamentals
Guardrails and policies
Built-in compliance, security baselines, and cost controls
Lesson 2914Internal Developer Platform (IDP) Fundamentals

H

Half-Open (Testing)
After a cooldown period, the breaker allows limited test requests.
Lesson 1612Circuit Breaking PatternsLesson 2581Circuit Breaker PatternLesson 2588Circuit Breaker Pattern
Handle errors
(retry logic, catch blocks, fallback states)
Lesson 2516Step Functions and State Machines
Handle orphaned spans gracefully
when context is missing or corrupted
Lesson 2072Tracing in Async and Event-Driven Systems
Handle volume spikes
as workloads auto-scale
Lesson 2046Cloud-Native Logging Overview
Handler execution
– Finally running your actual code
Lesson 463Cold Starts and Warm Starts
Handles
incoming HTTP/HTTPS traffic based on those rules
Lesson 1221Ingress Controller Architecture
Handles failures
Restarts failed containers based on restart policies
Lesson 1109Kubelet: The Node Agent
Handles mutual TLS (mTLS)
authentication and encryption transparently
Lesson 1594Consul Connect and Sidecar Proxies
Handles parallelism
where tasks don't depend on each other
Lesson 2626Workflow Orchestration Tools
Handling schema differences
when performing heterogeneous migrations
Lesson 2809Continuous Data Replication and CDC
HAProxy Ingress
brings decades of load balancing expertise to Kubernetes.
Lesson 1230Ingress Controller Options
Hard Stop
The kernel immediately kills the container process
Lesson 1335Setting Memory Limits
Hard-to-rotate credentials
Secrets hardcoded in applications can't be easily changed after exposure
Lesson 2237Introduction to Secrets Management in Cloud
Hardening
is the process of removing unnecessary features, closing ports, patching vulnerabilities, and configuring systems to minimize attack surface.
Lesson 2843Security Baseline and Hardening
Hardware events
Mouse movements, keyboard timings, disk seek times
Lesson 2284Key Generation and Randomness
Hardware security
Keys protected by HSMs (Hardware Security Modules)
Lesson 2280Introduction to Key Management Systems
Hardware Security Modules (HSMs)
become essential.
Lesson 2285Key Storage and Hardware Security Modules
Hardware token
A physical device that generates codes or must be inserted (like a USB security key)
Lesson 342Multi-Factor Authentication (MFA) Basics
Hardware-specific
`kubectl taint nodes ssd-node-01 disk-type=ssd:NoSchedule`
Lesson 1362Applying Taints to Nodes
Hash partitioning
Apply a hash function to the key (e.
Lesson 2607Stream Partitioning and Parallelism
Hash selects target
→ Connection forwarded to specific backend server
Lesson 264NLB Connection Handling
Hash-based
Apply a hash function to user IDs to distribute evenly
Lesson 455Partitioning and Sharding Strategies
Hashes
Objects with fields (`HSET user:123 name "Alice" age 30`) — perfect for storing user profiles or session data
Lesson 2684Redis Architecture and Data Structures
HashiCorp Configuration Language (HCL)
, a human-readable format that maps paths to **capabilities**—the actions allowed on those paths.
Lesson 2264Vault Policies and Access Control
Hashmod sharding
uses a mathematical hash function to distribute targets evenly across Prometheus instances.
Lesson 1980Horizontal Sharding Strategies
HEAD
Get metadata about an object without downloading it
Lesson 144HTTP-Based Access Model
Head-based sampling
makes the decision at the trace's start: "capture this trace or don't.
Lesson 1636Trace Sampling StrategiesLesson 2066Sampling StrategiesLesson 2083Sampling Strategies in OpenTelemetry
Header manipulation
Add authentication tokens or modify content types
Lesson 537Request and Response Transformation
Header normalization
Standardize `Accept-Encoding` or `User-Agent` values that don't affect content
Lesson 607Cache Key Normalization
Header-based
keeps URLs stable but adds complexity.
Lesson 548API Versioning Strategies
Headers
Require specific `X-API-Version` or `X-Tenant-ID` values
Lesson 1624Request-Level AuthorizationLesson 2375Custom Rules and Request Inspection
headless service
is a Kubernetes service with `ClusterIP: None`.
Lesson 1181Headless Services for StatefulSetsLesson 1210Headless Services
Health checking
The registry must continuously verify service availability across cloud boundaries using cross- cloud network paths you've established (VPNs, interconnects).
Lesson 2784Multicloud Service Discovery
Health checks adapt
ALB performs health checks on whatever port the container is actually using
Lesson 258ALB and Container Integration
Health checks run
→ Load balancer verifies the instance is healthy
Lesson 320ASG Integration with Elastic Load Balancing
Health metrics
Volume condition, errors, provisioning status
Lesson 1324Volume Metrics and Monitoring
Health monitoring
and automatic recovery
Lesson 96AWS Elastic Beanstalk Introduction
Health probes
How Azure determines if an instance is healthy
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
Health Signals
– Any active threats detected?
Lesson 2855Device Trust and Endpoint Security
Healthcare
HIPAA mandates how patient data is protected
Lesson 2322Introduction to Compliance in Cloud
Healthcare organizations
sharing HIPAA compliance requirements
Lesson 24Community Cloud Model
Heap size
Start with `-Xms2g -Xmx4g` for medium installations (scales with job count and plugin usage)
Lesson 1806Performance Tuning and Resource Management
Heartbeat/extend visibility
Long-running tasks can request timeout extensions while actively processing.
Lesson 2713Message Visibility and Acknowledgment
Helm chart
is Helm's packaging format—a collection of files organized in a specific directory structure that describes a complete set of Kubernetes resources needed to run an application, service, or tool inside a Kubernetes cluster.
Lesson 1522Charts: Helm's Packaging Format
Helm charts
Kubernetes package definitions for deploying applications
Lesson 1095Artifact Registry Multi-Format Support
Helm Controller
bridges GitOps with Helm, letting you declare chart installations as Kubernetes resources that Flux continuously reconciles.
Lesson 1927Helm Releases with FluxLesson 1932Flux Controller ArchitectureLesson 1935Helm Controller
Helm Diff
(a plugin) can show you what has changed, or you can use monitoring solutions that track resource modifications.
Lesson 1562Helm Release Monitoring and Drift Detection
helm-secrets
(manage encrypted values), and **helm-s3** (use S3 as a chart repository).
Lesson 1554Helm Plugins and ExtensionsLesson 1560Helm Secrets Management Integration
HelmRepository
Points to Helm chart repositories (public or private)
Lesson 1933Source Controller
Helper functions
Break complex logic into reusable functions:
Lesson 2339OPA Policy Development
Heredocs
let you write multi-line strings without escape characters, perfect for scripts or configuration files.
Lesson 732String Literals and String Interpolation
Heterogeneous migration
is the challenging cousin: moving data *and structure* between **different** database engines.
Lesson 2808Heterogeneous Database Migration
Heterogeneous support
Cross-engine migrations with automatic conversions
Lesson 2806Database Migration Service Fundamentals
Heuristic detection
identifies suspicious patterns even without exact signature matches
Lesson 1083Malware and Secret Scanning
Hibernation
is like putting your laptop to sleep with all your programs still open.
Lesson 88VM Hibernation
Hidden cost drivers
A service cheap in one cloud might have expensive data egress fees when talking to resources in another cloud
Lesson 2757Multicloud Challenges: Cost Management and Visibility
Hidden costs
Hardware refresh cycles (typically every 3-5 years), over-provisioning for peak capacity, maintenance contracts, and downtime costs
Lesson 28Understanding Total Cost of Ownership (TCO) in the CloudLesson 2799TCO Analysis for Migration
Hides the value
in CLI output (shows `<sensitive>` instead)
Lesson 766Sensitive Outputs
Hierarchical configs
Base configurations with cluster-specific overlays
Lesson 1871Multi-Cluster GitOps
Hierarchical federation
creates layers: edge Prometheus instances → regional aggregators → global view.
Lesson 1961Federation for Multi-Cluster Monitoring
Hierarchical organization
`/home/user/documents/report.
Lesson 114File Storage Overview
High (7.0–8.9)
Serious risk requiring prompt attention
Lesson 1075Vulnerability Severity and Prioritization
High availability isn't critical
Your application can tolerate brief downtime
Lesson 1168Recreate Strategy
High availability VPN connections
use multiple redundant components:
Lesson 2200High Availability VPN Connections
High cohesion within
– related functions grouped together
Lesson 2560Service Boundaries and Decomposition
High evictions
Increase cache size or implement better eviction policies
Lesson 2695Cache Monitoring and Performance Metrics
high IOPS
and low latency—perfect for performance-sensitive applications.
Lesson 113Block Storage OverviewLesson 125Block Storage vs Other Storage Types
High IOPS (thousands+)
Essential for production workloads with heavy traffic
Lesson 454Database Storage Performance
High latency
Your data path might be geographically inefficient or traversing too many network hops.
Lesson 2226Bandwidth vs Throughput vs Latency
High priority systems
(RTO 1-4 hours): Quarterly
Lesson 2415DR Testing and Validation Frequency
High Throughput
NLBs can handle millions of requests per second while maintaining static IP addresses.
Lesson 235Network Load Balancers (Layer 4)Lesson 441Cloud Bigtable for Wide-Column StorageLesson 555AWS SQS Standard Queues
High transaction volume
Larger CPU counts with sufficient memory
Lesson 399Database Instance Classes
High write throughput
across distributed nodes
Lesson 443Keyspaces and Cassandra-Compatible Services
High-availability configurations
where multiple instances need simultaneous read/write access
Lesson 135Multi-Attach Volumes
High-Availability Tier
(`replicated-storage`): Multi-zone replication for critical data requiring disaster recovery guarantees.
Lesson 1314Multiple StorageClasses Strategy
High-cardinality targets
Longer intervals reduce storage pressure
Lesson 1988Scrape Interval Optimization
High-frequency apps
Use `1m` intervals for rapid iteration
Lesson 1942Flux Reconciliation Control
High-frequency transaction databases
(NoSQL stores)
Lesson 69Storage Optimized Instance Types
High-frequency, predictable loads
If your function runs constantly 24/7, you're paying premium prices for convenience—dedicated servers become cheaper
Lesson 470FaaS Use Cases and Anti-Patterns
High-performance computing
requiring low latency
Lesson 125Block Storage vs Other Storage Types
High-performance processors
(latest generation CPUs with higher clock speeds)
Lesson 67Compute Optimized Instance Types
High-performance web servers
handling thousands of requests per second
Lesson 67Compute Optimized Instance Types
High-risk changes
Database migrations or infrastructure modifications
Lesson 1662Manual Approval Gates
High-scale, critical production
→ custom configuration based on `default` or use platform-specific guidance
Lesson 1586Istio Configuration Profiles
High-traffic user-facing services
after thorough testing
Lesson 1575Service Mesh Adoption Strategies
High-value
Provide clear benefits when separated
Lesson 2569Microservices Migration Strategies
High-Value Targets
Roll out to services that benefit most from mesh features (complex routing, security requirements)
Lesson 1601Service Mesh Adoption PatternsLesson 2237Introduction to Secrets Management in Cloud
high-value, low-risk
improvements that don't require architectural changes.
Lesson 2793Replatform StrategyLesson 2801Prioritizing Applications for Migration
High-volume key usage
(potential data exfiltration)
Lesson 2290Audit Logging for Key Usage
Higher `maxSurge`
More new Pods spin up before old ones terminate → faster updates, more resources used temporarily
Lesson 1167Rolling Update Strategy
Higher availability
Multiple independent failure domains
Lesson 280Cross-Zone and Cross-Region Load Balancing
Higher bandwidth options
Connections from 50 Mbps up to 100 Gbps
Lesson 2212AWS Direct Connect Fundamentals
Higher cache hit ratios
(as we learned in lesson 585)
Lesson 587TTL and Cache Control Headers
Higher Costs
Duplicated tools, cross-cloud data transfer fees, and specialized staff
Lesson 23Multi-Cloud Strategy Fundamentals
Higher memory usage
on nodes holding multiple Pods with the same Secret
Lesson 1273Secret Size and Performance Limits
Higher packet-per-second (PPS) performance
Up to millions of packets per second instead of hundreds of thousands
Lesson 2231Enhanced Networking and SR-IOV
Higher parallelism
when deploying many independent resources
Lesson 839Parallel Execution and Performance
Higher per-millisecond cost
Each millisecond costs more at higher memory tiers
Lesson 2545Function Memory and CPU Optimization
Higher storage costs
– you're charged for storing these packages
Lesson 485Function Packaging and Deployment Size
Higher throughput
millions of requests per second
Lesson 263Layer 4 vs Layer 7 Load Balancing
Higher vCPU-to-memory ratio
(more CPU cores relative to RAM)
Lesson 67Compute Optimized Instance Types
Higher-performance storage
with faster write capabilities
Lesson 2409Relationship Between RTO, RPO, and Cost
Highest effort
and risk, but maximizes cloud benefits: elasticity, cost efficiency, and modern features.
Lesson 2819Database Migration Strategies Overview
Highest RPO/RTO
, lowest cost.
Lesson 2411DR Tiers and Service Levels
histogram
groups observations into predefined buckets (ranges).
Lesson 628Metric Types: Histograms and SummariesLesson 1951Metric Types: Histogram
histograms
when you need flexible querying and can aggregate across instances.
Lesson 628Metric Types: Histograms and SummariesLesson 1640Performance Metrics and Histograms
Historical Data
Compare current performance against past trends to spot degradation over time.
Lesson 412Performance Insights
Historical trending
Compare performance across time windows to spot degradation
Lesson 456Performance Insights and Diagnostics Tools
History
How each layer was created (which command generated it)
Lesson 980Image Manifest and Metadata
History tracking
See who changed what and when
Lesson 2111Dashboard as Code and Version Control
Hit
Return cached value immediately
Lesson 2700Read-Through Caching Pattern
homogeneous migration
means moving a database from one environment to another while keeping the same database engine (e.
Lesson 2807Homogeneous Database MigrationLesson 2808Heterogeneous Database Migration
Hooks
are temporary resources that run at specific sync lifecycle points:
Lesson 1911Sync Waves and Resource Hooks
Horizontal partitioning
(often called **sharding**) splits a table by *rows*.
Lesson 455Partitioning and Sharding Strategies
Horizontal Pod Autoscaler (HPA)
Scales pod replicas based on CPU/memory/custom metrics
Lesson 2984Container Cost Optimization
Horizontal Scaling (Scaling Out)
means adding more resources to distribute the load.
Lesson 39Scalability: Vertical vs Horizontal Scaling
Host mode
removes network isolation between the container and the Docker host.
Lesson 1043Host and None Network Modes
Host networking
is useful when:
Lesson 1043Host and None Network Modes
Host-based IDS (HIDS)
runs on individual instances or containers, monitoring system calls, file integrity, and process behavior—like a motion sensor inside each room.
Lesson 2867Intrusion Detection Systems (IDS) in Cloud
Hosted
At a third-party facility, but still dedicated hardware just for you (sometimes called "hosted private cloud")
Lesson 21Private Cloud Deployment Model
Hosted Connection
Provided through an AWS Partner with flexible bandwidth from 50 Mbps to 10 Gbps
Lesson 2212AWS Direct Connect Fundamentals
Hostname/region
Tag each log with which server or datacenter it came from
Lesson 660Log Parsing and Enrichment
Hot data exists
A small subset of data gets requested repeatedly (e.
Lesson 2682In-Memory Caching Fundamentals
Hot standby infrastructure
running 24/7 instead of cold backups
Lesson 2409Relationship Between RTO, RPO, and Cost
Hot Storage
(or Standard tier) is optimized for data you access frequently—daily or even hourly.
Lesson 118Hot, Warm, and Cold Storage Tiers
hot tier
costs more than **cold storage** because high-performance infrastructure is more expensive to maintain.
Lesson 120Storage Cost ConsiderationsLesson 2980Storage Lifecycle Optimization
Hot/Standard storage
Optimized for frequently accessed data.
Lesson 148Storage Classes Introduction
Hourly fee
for running (even if idle)
Lesson 199Internet Connectivity Costs
Hourly/daily usage reports
for near-real-time visibility
Lesson 2138Cloud Billing Structure Basics
How to apply them
(with validation checks)
Lesson 1923Kustomize Controller Fundamentals
How-To Guides
Task-focused instructions for common operations like "requesting a new environment" or "configuring observability" within your self-service capabilities.
Lesson 2943Platform Documentation and Onboarding
HPA adds replicas
based on CPU/memory usage, but VPA might be changing those very thresholds
Lesson 1457VPA and HPA Interaction
HPA on custom/external metrics
(e.
Lesson 1457VPA and HPA Interaction
HSM protection level
when creating keys.
Lesson 2321GCP Cloud KMS Integration and HSM
HSM-protected keys
(Premium tier) are generated, stored, and processed entirely within FIPS 140-2 Level 2 validated Hardware Security Modules.
Lesson 2316Azure Key Vault Key Management
HTTP 500 errors
Application logic issue in health endpoint
Lesson 1430Debugging Failed Probes
HTTP 5xx errors
(backend failures) versus **4xx errors** (client issues).
Lesson 2187Load Balancer Health and Metrics
HTTP APIs
cost significantly less than **REST APIs** (often 70% cheaper) for basic routing needs.
Lesson 549API Gateway Cost Optimization
HTTP checks
Sends an HTTP request and expects a specific status code (typically 200).
Lesson 268NLB Health Checks
HTTP endpoint
The specific path the ALB should request (e.
Lesson 251Health Check Configuration for ALBs
HTTP floods
Overwhelm web servers with GET/POST requests
Lesson 2378DDoS Attack Types and Vectors
HTTP request/response bodies
containing tokens or PII
Lesson 664Security and Sensitive Data in Logs
HTTP triggers
Respond to web requests
Lesson 511Azure Functions: Bindings and Triggers
HTTP verbs
(GET, POST, PUT, DELETE) combined with **resource paths** to express actions on data.
Lesson 524REST API Gateway Basics
HTTP(S) Load Balancers
(global and regional) and **TCP/SSL Proxy Load Balancers**.
Lesson 2371Google Cloud Armor Fundamentals
HTTP(S) Load Balancing Metrics
Lesson 327MIG Autoscaling Configuration
HTTP/2
allows **multiplexing**—sending multiple requests and responses simultaneously over one TCP connection, rather than opening separate connections for each resource.
Lesson 254WebSocket and HTTP/2 SupportLesson 2572gRPC for High-Performance Communication
HTTP/HTTPS
when you need to verify application logic (checking a `/health` endpoint).
Lesson 268NLB Health Checks
HTTPRoute
resources (managed by application teams) define routing rules.
Lesson 1233Gateway API Introduction
HTTPS checks
Like HTTP but over TLS.
Lesson 268NLB Health Checks
Hub-and-spoke
One management cluster deploys agents to workload clusters
Lesson 1871Multi-Cluster GitOpsLesson 2781Multicloud Transit Patterns
Human error increases
Teams forget to enable encryption on new resources
Lesson 2839Encryption by Default
Human Interaction
Pause a workflow waiting for external approval or input (like waiting for a manager to approve an expense report)
Lesson 512Azure Functions: Durable FunctionsLesson 2523Azure Durable Functions
Human requirement
"All S3 buckets containing customer data must have encryption enabled.
Lesson 2337Compliance Requirements Translation
Human-in-the-Loop
Long workflows often need approvals.
Lesson 2525Long-Running Workflows
Human-readable output
formatting
Lesson 1130What is kubectl and Its Role
Human-Readable Syntax
Configuration files use HashiCorp Configuration Language (HCL), which is designed to be clear and maintainable.
Lesson 723What is Terraform and Why Use It
Hybrid Architecture
Seamlessly integrate on-premises systems with cloud resources as if they were on the same network.
Lesson 2201AWS Direct Connect Fundamentals
Hybrid deployments
let you run some services on Kubernetes (containers) while others run serverless (functions), optimizing for each service's behavior rather than forcing everything onto one platform.
Lesson 2568Hybrid Microservice Deployments
Hybrid encryption
solves this by using the best of both worlds.
Lesson 2307Hybrid Encryption for Large Data
Hybrid Flexibility
AKS supports Azure Arc for extending Kubernetes management to on-premises and multi-cloud environments, giving you a consistent operational model.
Lesson 1490Introduction to Azure Kubernetes Service (AKS)
Hybrid models
Combine methods: base costs split evenly, variable costs by usage.
Lesson 2967Shared Cost Allocation
Hybrid operations
is the discipline of managing both environments simultaneously with consistent processes, tooling, and governance during this transition period (which might last months or years).
Lesson 2815Hybrid Operations and Coexistence
Hybrid policies
combine these approaches: keep all production artifacts for 1 year, the last 5 non-production builds, and anything tagged as `critical-release` indefinitely.
Lesson 1678Artifact Retention and Cleanup
Hypothesis-driven experimentation
is at the heart of chaos engineering.
Lesson 2490Introduction to Chaos Engineering

I

IaaS → PaaS
is the most traveled route.
Lesson 26Service Model Migration Patterns
IaC-based test environments
use Terraform or similar tools to spin up isolated replicas of your infrastructure where DR procedures can run safely.
Lesson 2906Automated DR Test Frameworks
IAM
for authentication and authorization (similar to IRSA in EKS)
Lesson 1475GKE Overview and ArchitectureLesson 2539Serverless API Authentication
IAM Authentication
uses AWS Signature Version 4 (or equivalent cloud provider IAM) to sign requests.
Lesson 2539Serverless API Authentication
IAM integration
for identity-based access control
Lesson 2238Cloud-Native Secrets Services Overview
IAM service outage
Deny all actions requiring permission checks
Lesson 2837Fail Secure Principles
IAM users
are individual identities you create *within* your AWS account.
Lesson 377AWS IAM Users and Root Account
ID lookup
Retrieve a resource when you know its unique identifier
Lesson 750Data Source Arguments and Filters
Ideal for
Time-series data, IoT telemetry, financial ticks, analytics pipelines
Lesson 441Cloud Bigtable for Wide-Column Storage
Identifies constraints
– licensing restrictions, compliance requirements, performance SLAs
Lesson 2797Migration Assessment Framework
Identify a boundary
Choose a well-defined piece of functionality (using domain-driven design principles)
Lesson 2598Strangler Fig Pattern for Migration
Identify bottlenecks
Spot heavily-used services that need scaling
Lesson 1639Service Dependency Mapping
Identify business processes
What does your organization actually *do*?
Lesson 2410Business Impact Analysis (BIA)
Identify one feature
to extract and build as serverless functions
Lesson 2514Strangler Fig Pattern for Migration
Identify the bad commit
Review recent Git history to find the problematic change
Lesson 1873Rollback and Recovery
Identify the commitment
$10,000 upfront for a 1-year RI
Lesson 2148Amortizing Reserved Instance Costs
Identify the source
Use specific IP addresses or security group references instead of "anywhere"
Lesson 212Least Privilege Network Access
Identifying mismatches
– Spot instances running at 10% CPU when you're paying for 100% capacity
Lesson 79Cost Optimization with Right-Sizing
Identifying packages
It catalogs all installed software, libraries, and dependencies (OS packages, language-specific libraries like npm or pip packages)
Lesson 1073Image Scanning Fundamentals
Identifying the resource
you want to import (like an existing EC2 instance or S3 bucket)
Lesson 891Stack Import Operations
Identities
are the people with key cards (users, applications, services), and **resources** are the rooms, equipment, and data they might need to access (databases, storage, virtual machines, networks).
Lesson 333IAM Core Concepts: Identities and Resources
Identity as the Perimeter
changes this fundamentally: instead of asking *"Where are you connecting from?
Lesson 2394Identity as the PerimeterLesson 2399Context-Aware Access ControlsLesson 2400Software-Defined Perimeter (SDP)
Identity Federation
means establishing trust relationships between different identity providers (IdPs) and service providers (SPs), allowing users authenticated in one system to access resources in another without re-authenticating.
Lesson 2852Identity Federation and SSO
Identity information
Which user or service account acted
Lesson 344IAM Audit and Compliance Logging
Identity management complexity
How does Service A know Service B is legitimate?
Lesson 1617Service Mesh Security Overview
Identity Provider Integration
connects your registry to enterprise systems like LDAP, Active Directory, OAuth providers (GitHub, Google), or OIDC.
Lesson 1079Private Registry Authentication
Identity service
Issues and manages mTLS certificates for secure pod-to-pod communication
Lesson 1591Linkerd Overview and Architecture
Identity-based
Your library card lists what sections you're allowed to enter (children's area, reference room, archives).
Lesson 336Identity-Based vs Resource-Based Policies
Identity-based access
rather than IP-based rules
Lesson 2391Micro-Segmentation vs Traditional Segmentation
Identity-based access control
Each service gets a cryptographic identity
Lesson 1617Service Mesh Security Overview
Identity-based example
"Alice can read all storage buckets"
Lesson 336Identity-Based vs Resource-Based Policies
Identity-based perimeter
means:
Lesson 2394Identity as the Perimeter
Identity-centric
Access decisions are based on *who* (user identity, device posture) rather than *where* (network location)
Lesson 2393Zero Trust Network Access (ZTNA)
Idle compute instances
with near-zero CPU utilization
Lesson 2160Idle Resource Detection
Idle or underutilized resources
VMs running at 2% CPU for weeks
Lesson 2180GCP Recommender and Cost Insights
Idle resources
consuming budget without delivering value
Lesson 2175Azure Budgets and Advisor
If Condition
Branch execution based on expressions (e.
Lesson 2650ADF Pipeline Activities and Control Flow
If one AZ fails
(power loss, hardware failure), your application continues running in other AZs
Lesson 45Multi-AZ and Multi-Region Designs
If the ETag differs
(content changed): The server sends **200 OK** with the new content and updated ETag.
Lesson 2674ETag and Conditional Requests
If the ETag matches
(content unchanged): The server responds with **304 Not Modified** and *no body*—saving bandwidth dramatically.
Lesson 2674ETag and Conditional Requests
Ignore all query strings
– Cache `/page?
Lesson 2678Query String and Cookie Handling
IgnoredDuringExecution
If node labels change after the Pod is running, it stays put
Lesson 1347Required Node Affinity Rules
Ignoring alarm testing
if you can't validate it fires correctly, it's unreliable
Lesson 651Alarm Best Practices and Anti-Patterns
Ignoring context propagation cost
Serializing/deserializing context adds latency—keep baggage minimal
Lesson 2087Best Practices and Performance Considerations
Ignoring Fields
You can tell ArgoCD to ignore specific JSON paths during comparison.
Lesson 1901Diff Customization
Ignoring pipeline performance
A 2-hour pipeline kills momentum.
Lesson 1656CI/CD Best Practices and Anti-patterns
Image age
Delete images older than 30 days
Lesson 1087ECR Repository Configuration
Image configuration
Default environment, working directory, user
Lesson 980Image Manifest and Metadata
Image count
Keep only the last 10 images
Lesson 1087ECR Repository Configuration
image digest
is a cryptographic hash like `sha256:a1b2c3d4.
Lesson 983Image Tags vs DigestsLesson 1067Image Digests and Immutability
Image immutability
Original layers never change, ensuring consistency
Lesson 976Union Filesystem Mechanics
Image integrity
Original images never change, so multiple containers can safely share them
Lesson 979Copy-on-Write Strategy
image manifest
a JSON document that serves as the blueprint describing all the layers, configuration, and metadata that make up your image.
Lesson 980Image Manifest and MetadataLesson 995Image Manifest and DigestLesson 1070Image Manifest and Layers
Image processing
Auto-resize images when uploaded
Lesson 168Event Notifications
Image registry validation
Reject pods using images from untrusted registries
Lesson 1409Validating Admission Webhooks
Image replication workflows
Automated pipelines that copy images between ECR, ACR, and Artifact Registry after builds
Lesson 1099Cross-Provider Registry Integration
Image scanning
Built-in vulnerability scanning examines your images for known security issues automatically.
Lesson 1086AWS ECR Fundamentals
Image/video processing
Different functions handle different transformations
Lesson 2503Fan-Out/Fan-In Pattern
ImagePolicy
specifying which tags to consider (latest semantic version, alphabetical, etc.
Lesson 1929Image Automation with FluxLesson 1937Image Automation Controllers
ImagePullSecret
is a special type of Secret (`kubernetes.
Lesson 1271ImagePullSecrets for Private Registries
ImagePullSecrets
are the native Kubernetes approach.
Lesson 2278Container Registry Authentication
ImageRepository
resource pointing to your container registry, an **ImagePolicy** specifying which tags to consider (latest semantic version, alphabetical, etc.
Lesson 1929Image Automation with FluxLesson 1937Image Automation Controllers
ImageUpdateAutomation
that tells Flux where and how to commit changes.
Lesson 1929Image Automation with FluxLesson 1937Image Automation Controllers
Immediate
binding mode (the default), Kubernetes binds a PVC to a PV as soon as the PVC is created, before any Pod uses it.
Lesson 1305Volume Binding ModesLesson 2489Monitoring Replication Health
Immediate rollback
When a deployment fails health checks, rollback quickly to restore service
Lesson 1556Helm Rollback Strategies
Immutable audit trails
Log every migration action (database replications, cutover triggers, configuration changes) to support forensic analysis if recovery is needed.
Lesson 2817Disaster Recovery During Migration
Immutable Blobs
(Azure): WORM (Write Once, Read Many) policies at the container level
Lesson 2353Audit Log Storage and Retention
Immutable Infrastructure Pattern
takes a radically different approach: you never modify running infrastructure.
Lesson 968Immutable Infrastructure PatternLesson 973What is a Container Image?Lesson 1034Container Writable Layer
Immutable Storage
Store it in an artifact repository with a unique version identifier
Lesson 1676Artifact Promotion Patterns
Immutable tags
Enable tag immutability to prevent overwriting (especially for production)
Lesson 1087ECR Repository Configuration
Impact assessment
Quantify the effect on SLOs, users affected, revenue impact, and error budget consumption.
Lesson 2134Post-Incident Reviews and Blameless Postmortems
Imperative
"Chop romaine, add dressing, grate parmesan, add croutons"—you control every action
Lesson 685Declarative vs Imperative IaCLesson 1135Creating Resources with kubectl create and apply
Imperative IaC
requires you to write explicit, step-by-step instructions—the *how*.
Lesson 685Declarative vs Imperative IaC
Imperative scripts have problems
Lesson 1855Declarative Infrastructure
Imperva
, **Cloudflare**, and **AWS Partner Network** providers offer sanctioned testing that simulates various attack vectors (volumetric floods, application-layer attacks, protocol exploits) without risking account termination.
Lesson 2389DDoS Testing and Simulation
Implement chargeback or showback
by sending reports (or invoices) to team leads
Lesson 2145Cost Centers and Business Units
Implement proper severity levels
Not everything is critical.
Lesson 651Alarm Best Practices and Anti-Patterns
Implement Retry Logic
Network hiccups happen—build retry capability into your deployment scripts.
Lesson 919ARM Template Best Practices and Validation
Implement sidecar patterns
that handle caching and rotation centrally
Lesson 2251Secrets Management Cost Optimization
Implement state locking
Always use DynamoDB (S3) or native locking (GCS, Azure) to prevent concurrent modifications.
Lesson 797Remote State Best Practices
Implementation pattern
Separate logs into tiers—hot storage for recent logs (fast access), cold storage for archived logs (compliance retention).
Lesson 2353Audit Log Storage and Retention
ImplementationSpecific
leaves the matching logic entirely up to your Ingress controller.
Lesson 1228Path Types and Matching
Implicit Deny (Default)
– If there's no explicit allow and no explicit deny, AWS **defaults to deny**.
Lesson 381AWS IAM Policy Evaluation Logic
implicit dependencies
when one resource references another's attributes.
Lesson 822Implicit and Explicit DependenciesLesson 829Terraform Graph and Visualization
import
capability lets you take resources that already exist in your cloud provider and add them to your Terraform state, allowing you to manage them going forward.
Lesson 826Import Existing InfrastructureLesson 873Fn::ImportValue and Cross-Stack ReferencesLesson 950Template Imports and Organization
Important caveat
Terraform documentation recommends avoiding provisioners when possible, because they break the declarative model and make your infrastructure harder to manage.
Lesson 823Null Resources and Provisioners
Importing
is the process of telling your IaC tool about resources that already exist, so it can add them to its state file and manage them going forward.
Lesson 706Import Existing Resources
Impossible travel
Logins from different continents minutes apart
Lesson 2865CloudTrail and Audit Logging for Security
Improve network performance
Smaller broadcast domains mean less network noise
Lesson 175Subnet Fundamentals
Improve throughput
Process more data per unit of time
Lesson 502Batch Processing Pattern
Improved Availability
If your origin goes down, cached content remains available from CDN edge servers.
Lesson 582What is a CDN and Why Use One
Improved cash flow
Preserve capital for core business activities
Lesson 29CapEx vs OpEx: Financial Models in Cloud Computing
Improved reliability
Smaller uploads are less likely to fail
Lesson 166Multipart UploadLesson 591Origin Shield and Cache Hierarchies
Improved scalability
Supports services with thousands of backend Pods
Lesson 1212EndpointSlices
Improving availability
If one region experiences issues, others continue serving images
Lesson 1093ACR Geo-Replication
Improving readability
Code looks more like modern programming languages
Lesson 920Introduction to Bicep
In CI/CD pipelines
Mandatory gates that block unsafe deployments
Lesson 722IaC Security Scanning
In Progress
Currently executing on a runner
Lesson 1694Workflow Status and Logs
In version control
Automated checks in your repository on every pull request
Lesson 722IaC Security Scanning
In your cloud DNS
"For queries about `*.
Lesson 226Hybrid DNS and Conditional Forwarding
In your on-premises DNS
"For queries about `*.
Lesson 226Hybrid DNS and Conditional Forwarding
IN_SYNC
Resource matches the template perfectly
Lesson 879Stack Drift Detection
In-Memory Caching
stores data in global variables outside your function handler.
Lesson 2549Caching Strategies in Functions
In-Memory Databases
Systems like Redis, Memcached, or SAP HANA that store entire datasets in RAM for lightning- fast queries.
Lesson 68Memory Optimized Instance Types
In-Place Deployment
The application on each instance is stopped, updated with the new version, and restarted — all on the same instances.
Lesson 1831CodeDeploy Overview and Deployment Types
Inactivity
Remove images not pulled in 6 months
Lesson 998Image Retention and Cleanup Policies
Inbound
Routes incoming internet traffic to the correct resource's private IP address
Lesson 187Internet Gateway FundamentalsLesson 196NAT Instance Configuration
Incentive Alignment
drives sustained behavior change:
Lesson 2989Continuous Optimization Programs
Incident Frequency
How often incidents occur over time.
Lesson 2135Incident Metrics and Learning
Incident Response Lifecycle
is a framework that breaks down incident management into five distinct stages, each with clear goals and handoffs.
Lesson 2126Incident Response Lifecycle
Include context fields
like timestamp, severity level, service name, and trace IDs in every log entry:
Lesson 1437Structured Logging Best Practices
Include purpose
`s3-read-only-logs-bucket` not `policy-47`
Lesson 375Policy Documentation and Governance
Incomplete transactions
that were partially replicated
Lesson 2444Data Consistency Validation
Inconsistent Security Models
Firewall rules, encryption in transit, and network segmentation all work differently.
Lesson 2778Multicloud Networking Challenges
Incorrect metric queries
Custom metrics misconfigured or returning invalid data
Lesson 1459Autoscaling Best Practices and Troubleshooting
Incorrect targets
Traffic pointing to the wrong gateway, NAT device, or peering connection
Lesson 2190Route Table Verification
Increased Complexity
Managing multiple dashboards, billing systems, and security policies
Lesson 23Multi-Cloud Strategy Fundamentals
Increased latency
API requests take longer to complete
Lesson 1340CPU Throttling Behavior
Increases rollout safety
by slowing down when problems emerge
Lesson 1173MinReadySeconds and Stability
incremental
they only save the blocks that changed since the last snapshot, saving both time and storage costs.
Lesson 131Volume SnapshotsLesson 912Deployment Modes: Complete vs IncrementalLesson 2423VM and Volume Backup Strategies
Incremental Backup
captures only changes since the *last backup of any kind*.
Lesson 2419Full, Incremental, and Differential Backups
Incremental Mode (Default)
Azure adds or updates resources declared in your template but **leaves untouched** any existing resources in the resource group that aren't mentioned.
Lesson 912Deployment Modes: Complete vs Incremental
Indentation matters
Use 2 spaces per level.
Lesson 1697Workflow File Structure and YAML Syntax
Independence
Each microservice can be developed, deployed, scaled, and updated without affecting others.
Lesson 2555What Are Microservices?
Independent change
– updates don't cascade everywhere
Lesson 2560Service Boundaries and Decomposition
Independent Deployment
Update your authentication service without touching your shopping cart
Lesson 41Loose Coupling and Service Independence
Independent Deployments
Each cloud runs a complete, self-sufficient stack.
Lesson 2759Multicloud Architecture Patterns: Active-Active
Independent endpoint
Each replica has its own connection string
Lesson 418Read Replicas for Scalability
Independent limits
Each tenant can have custom rate limits, retention policies, and cardinality controls
Lesson 1985Cortex Multi-Tenancy
Independent Scaling
Your payment service can scale to handle Black Friday traffic while your product catalog stays at normal capacity (remember **horizontal scaling** from our previous lessons?
Lesson 41Loose Coupling and Service IndependenceLesson 574CQRS Pattern with EventsLesson 969Microservices and Container AffinityLesson 2561Database per Service Pattern
Independent test suites
(unit, integration, functional)
Lesson 1792Parallel Stage Execution
Index Lifecycle Management (ILM)
automates the entire lifecycle—from fresh, frequently-queried logs to eventual deletion—based on age or size triggers.
Lesson 2020Elasticsearch Index Lifecycle Management
Indexers
are Splunk's heart: they receive raw log data, break it into events, and store it in highly compressed, searchable indexes.
Lesson 2042Splunk Cloud and Enterprise Logging
Indexes and partitioning
strategies unique to each platform
Lesson 2808Heterogeneous Database Migration
Indexing strategies
Bitmap indexes, function-based indexes
Lesson 2823Heterogeneous Database Migration
Indicators of Compromise (IOCs)
such as malicious IP addresses, domain names, file hashes, or attack patterns—into your SIEM, Security Command Center, GuardDuty, or Sentinel systems you've already configured.
Lesson 2873Threat Intelligence Integration
Individual job statuses
with expandable step logs
Lesson 1696Workflow Run History and Re-runs
Inefficient algorithms
– O(n²) loops processing large datasets
Lesson 2547Execution Duration Optimization
Info (P4/P5)
Informational events worth logging but not requiring immediate action.
Lesson 649Alert Severity and Prioritization
Inform
Make costs visible and understandable
Lesson 2948What is FinOps?
Infracost
and **Terraform Cloud's cost estimation** integrate directly into CI/CD workflows.
Lesson 838Cost Estimation in CI/CDLesson 2885Cost Estimation Testing
Infrastructure as Code
is the practice of managing and provisioning infrastructure using **machine-readable definition files** instead of manual processes.
Lesson 684What is Infrastructure as Code?Lesson 2929Software Templates and Scaffolding
Infrastructure as Code (IaC)
tools like Terraform, CloudFormation, or Pulumi treat your cluster as versioned, reviewable code.
Lesson 1462EKS Cluster Creation OptionsLesson 2431Backup Automation and OrchestrationLesson 2816Migration Automation and Scripting
Infrastructure first
Deploy ingress controllers before applications
Lesson 1939Dependency Management
infrastructure layer
rather than requiring each application team to build it:
Lesson 1617Service Mesh Security OverviewLesson 2833Defense in Depth and Layered Security
Infrastructure policies
DNS, monitoring, logging access
Lesson 1246NetworkPolicy Best Practices
Infrastructure scaling
– Control plane scales with your workload needs
Lesson 1505Managed Kubernetes Overview
Infrastructure Validation
Deploy your Terraform or Kubernetes manifests to each target cloud.
Lesson 2776Portability Testing and Validation
Infrastructure-as-Code
Tools like Terraform that work across clouds
Lesson 2764Application Portability Fundamentals
Infrastructure-layer waves
Move data tier first, then application tier, then presentation layer systematically.
Lesson 2802Migration Wave Planning
Infrequently-used functions
– Always cold when invoked
Lesson 463Cold Starts and Warm Starts
Ingester
Holds recent logs in memory, creates chunks, compresses them, and flushes to object storage.
Lesson 2035Loki Components and Deployment Modes
ingesters
(buffer and write), **queriers** (execute PromQL), and **compactors** (optimize storage).
Lesson 1986Mimir for Large-Scale MetricsLesson 2034Loki Architecture and Design Philosophy
Ingestion time
(automatic by load time)
Lesson 2665BigQuery Data Organization
Ingests application logs
Container stdout/stderr streams flow directly to Cloud Logging
Lesson 1487GKE Monitoring with Cloud Monitoring
Ingress annotations
metadata you add to your Ingress resource that instructs the Ingress Controller how to handle traffic.
Lesson 1231Rate Limiting and IP Whitelisting
Ingress Controller
(a separate component you must install), but understanding the Ingress resource itself is the first step.
Lesson 1219Ingress Resource FundamentalsLesson 1221Ingress Controller Architecture
Ingress Controllers
Handle external HTTP/HTTPS traffic routing into the cluster, acting as a smart load balancer.
Lesson 1112Add-on Components and Extensions
Ingress filtering
Restrict which external IPs can reach your services
Lesson 1241IP Block Rules
Ingress Resource
(YAML): What you want (routing rules)
Lesson 1221Ingress Controller Architecture
Ingress rule
defines how to match incoming requests (by hostname or path) and which Service should handle them.
Lesson 1223Basic Ingress Rules and Paths
IngressClass
is like a routing tag that says: "This Ingress resource should be handled by *that specific* Ingress Controller.
Lesson 1227IngressClass Resource
Init container
Runs before your app starts, authenticates to Vault using Kubernetes service account tokens, retrieves secrets, and writes them to a shared volume
Lesson 2275Vault Agent Injector for Kubernetes
Initial assessment steps
How to verify the problem's scope
Lesson 2130Runbooks and Playbooks
Initial full load
Copy existing data using native backup or snapshot methods
Lesson 2822Homogeneous Database Migration
Initial permissions
– What they're allowed to do (usually none by default, following least privilege)
Lesson 346Creating and Managing User Identities
Initial request
Server responds with `ETag: "v1"` and full content.
Lesson 2674ETag and Conditional Requests
Initialization
happens only once in Vault's lifetime.
Lesson 2255Initializing and Unsealing Vault
Initialization code
runs once when the function container first starts (cold start), while **handler code** runs on every invocation.
Lesson 482Function Initialization and Handler Code
Initialization code complexity
(heavy dependencies increase startup time)
Lesson 491Cold Start Fundamentals
Initialize
the project with `terraform init`
Lesson 725Your First Terraform Configuration
Initialize the runtime
– Start the language runtime (Node.
Lesson 2543Cold Start Fundamentals
Initiate
You tell the storage service "I'm about to send a large object in pieces"
Lesson 166Multipart UploadLesson 185Network Address Translation (NAT) Preview
Inject
it into structured log fields: `{"correlationId": "abc-123", "message": "Processing payment"}`
Lesson 2057Correlation IDs and Tracing Context
Injected into log statements
using structured logging fields
Lesson 2069Correlation with Logs and Metrics
Injection mechanism
Leverage Kubernetes ConfigMaps/Secrets populated from portable sources, or sidecar containers that fetch configuration
Lesson 2773Configuration Management Portability
Innovation enablement
Accessing cutting-edge services like AI/ML, analytics, and serverless computing without upfront infrastructure investment.
Lesson 2790Introduction to Cloud Migration
Input bindings
inject data into your function (like reading from a database).
Lesson 511Azure Functions: Bindings and Triggers
Input data
Context about the request (who, what, when)
Lesson 2338Open Policy Agent (OPA) Fundamentals
Input plugins
are the receiving docks where raw materials (logs) arrive
Lesson 2021Logstash Architecture and PipelinesLesson 2024Fluentd Architecture and Design
InService
– Instance passes health checks and actively receives traffic
Lesson 295Instance Lifecycle in Auto Scaling
inside
your handler, it runs on every single invocation, which wastes time and resources if it doesn't need to change between requests.
Lesson 482Function Initialization and Handler CodeLesson 1565Service Mesh vs API Gateway
Insider threats
Detecting when privileged users access systems outside their normal scope
Lesson 2866Anomaly Detection and Behavioral Analysis
InSpec
provides a compliance-focused testing language for infrastructure.
Lesson 2346Compliance Testing and Validation
Inspect a network
to see its configuration, connected containers, and subnet details:
Lesson 1046Network Troubleshooting and Inspection
Inspect container images
in registries for vulnerable dependencies or malware
Lesson 2868Vulnerability Scanning and Management
Inspect environment variables
`kubectl exec my-pod -- env`
Lesson 1140kubectl exec: Executing Commands in Containers
Inspect message content
to identify patterns (malformed data, edge cases)
Lesson 2714Dead Letter Queues
Inspect pod events
`kubectl describe pod` reveals scheduling failures
Lesson 1519Troubleshooting Common Cluster Issues
Inspecting a release
reveals its configuration and status:
Lesson 1526Helm Releases: Managing Deployments
Install and validate
Uses your AppSpec file and lifecycle hooks to deploy and test
Lesson 1835Blue/Green Deployments with CodeDeploy
Install the controller
in your Kubernetes cluster (it generates a key pair)
Lesson 2277Sealed Secrets for GitOps
Install the runner application
from your GitHub repository or organization settings
Lesson 1720Self-Hosted Runners
Installed
View and update your current plugins
Lesson 1775Jenkins Plugins and Extensibility
Installing
the Flux controllers (source-controller, kustomize-controller, helm-controller, notification- controller) into your cluster
Lesson 1921Installing Flux on a Kubernetes Cluster
instance class
defines the CPU, memory, and network capacity allocated to your database server.
Lesson 399Database Instance ClassesLesson 402Creating and Launching RDS Instances
Instance count
Minimum, maximum, and initial number of VMs
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
Instance ID
Unique identifier for your VM
Lesson 86Instance Metadata Service
Instance metadata
Preserved when stopped, lost when terminated
Lesson 83Starting and Stopping VMs
Instance Metadata Service
is a special internal API that runs inside every cloud environment, allowing your VM to query information about itself.
Lesson 86Instance Metadata Service
Instance size
(number of vCPUs, memory)
Lesson 73On-Demand Pricing Model
Instance sizing
Larger instance classes offer more CPU and memory but cost significantly more.
Lesson 458Cost vs Performance Trade-offs
Instance Status Checks
monitor your specific VM's operating system and network configuration.
Lesson 90VM Monitoring and Health Checks
instance template
is a saved configuration that defines everything about a VM—machine type, disk image, network settings, metadata, and startup scripts.
Lesson 103GCP Instance Groups and TemplatesLesson 326GCP Managed Instance Groups (MIG) Overview
Instance terminates
→ ASG automatically deregisters it, draining connections gracefully
Lesson 320ASG Integration with Elastic Load Balancing
Instance type diversity
Include 5-10 similar instance types (`c5.
Lesson 2978Spot Instance Fleet Management
Instance type pool
A list of compatible instance types (e.
Lesson 309Mixed Instance Policies
Instance-level
Set by administrators for all projects (lowest precedence)
Lesson 1763Custom CI/CD Variables and Inheritance
Instant onboarding
New developers clone the repository and start the container.
Lesson 970Developer Workflow Improvements
Instant recovery
Failed instances are replaced without data loss concerns
Lesson 2474Designing for Stateless-First Architecture
Instant rollback
Disable a problematic feature in seconds without redeploying
Lesson 1666Feature Flag Integration
Instant teardown
When you're done, tearing down infrastructure is just as fast.
Lesson 688IaC Benefits: Speed and Efficiency
Instant vector
A set of time-series containing a single sample per series at one moment in time.
Lesson 1962PromQL Basics and Data ModelLesson 1966Aggregation Operators
Instrument strategically
, not exhaustively.
Lesson 2087Best Practices and Performance Considerations
Instrumentation
means adding monitoring code directly into *your* applications using Prometheus client libraries.
Lesson 1954Exporters and Instrumentation
Instrumentation overhead
is the performance tax you pay for distributed tracing—the difference between your application's throughput and latency with and without tracing enabled.
Lesson 2071Instrumentation Overhead
Insufficient bandwidth
You've hit your capacity ceiling and need to upgrade the connection size.
Lesson 2226Bandwidth vs Throughput vs Latency
Insufficient cluster capacity
Cluster Autoscaler can't provision nodes fast enough
Lesson 1459Autoscaling Best Practices and Troubleshooting
INSUFFICIENT_DATA
– Not enough data exists yet to evaluate the alarm (common when first created or after gaps in metric collection).
Lesson 640Alarm States and TransitionsLesson 646Alarm Actions and NotificationsLesson 670CloudWatch Alarms and Actions
Integer range
(user_id ranges, for example)
Lesson 2665BigQuery Data Organization
Integrated AWS services
Native integration with IAM, VPC, Load Balancers, and CloudWatch
Lesson 1460Introduction to Amazon EKS
Integrated Azure Ecosystem
AKS seamlessly connects with Azure Active Directory for authentication, Azure Monitor for observability, Azure Container Registry for images, and Azure Load Balancers for networking.
Lesson 1490Introduction to Azure Kubernetes Service (AKS)
Integrated Storage (Raft)
Built-in, consensus-based storage for high availability
Lesson 2253Vault Architecture and Components
Integrated tooling
(CI/CD, monitoring, security scanning already wired up)
Lesson 2940Golden Paths and Paved Roads
Integration Challenges
Making services talk across cloud boundaries requires extra networking setup
Lesson 23Multi-Cloud Strategy Fundamentals
Integration Events
flow between different systems or bounded contexts:
Lesson 569Event Types and Naming Conventions
Integration glue
Connect services together (e.
Lesson 470FaaS Use Cases and Anti-Patterns
Integration Runtime
software that bridges cloud and on-premises environments.
Lesson 2649Azure Data Factory Overview
Integration Testing
Validate that external dependencies—databases, message queues, observability tools—behave consistently when using abstracted interfaces you've built.
Lesson 2776Portability Testing and ValidationLesson 2875Introduction to Infrastructure TestingLesson 2880Kitchen-Terraform for Module Testing
Integration with ADF pipelines
– Use as activities within your broader orchestration workflows (from lesson 2649)
Lesson 2651ADF Mapping Data Flows
Integration with AWS CI/CD
CodeArtifact seamlessly connects with CodeBuild, CodePipeline, and other AWS services, creating a unified native CI/CD experience.
Lesson 1815CodeArtifact: Artifact Repository Service
Integration with existing toolchains
Works with CI/CD, monitoring, and source control
Lesson 2914Internal Developer Platform (IDP) Fundamentals
Integration with FinOps tools
Feed API data into platforms like CloudHealth, Apptio, or custom Backstage plugins to visualize shared cost allocation (lesson 2967) or showback reports (lesson 2966).
Lesson 2973Cost Allocation APIs and Automation
Integration with Load Balancer
Applied before traffic reaches your backend
Lesson 2750Cloud Provider Rate Limiting Services
Integrity Verification
ensures backup files aren't corrupted by checking checksums, file consistency, and metadata completeness.
Lesson 2428Backup Validation and Testing
Intelligent Retry Logic
Not all failures are retriable.
Lesson 2749Back-off and Retry Strategies
Inter-service communication
Can microservices discover and communicate with each other?
Lesson 2908Application Recovery Testing
Interactive dashboards
Business intelligence tools querying live data for real-time reporting
Lesson 2656Serverless Query Engine Overview
Interactive setup
where you type sensitive data directly
Lesson 1261Creating Secrets from Literals
Internal
Who to notify, when, and through which channels (Slack, PagerDuty, phone tree)
Lesson 2870Incident Response Planning
Internal Developer Platform
(IDP) is a curated layer of tools, workflows, and abstractions that sits between developers and the underlying infrastructure.
Lesson 2914Internal Developer Platform (IDP) Fundamentals
Internal Load Balancers
live entirely within your private subnets.
Lesson 233Load Balancer Placement Patterns
Internal names
Instances within your VPC can resolve each other's private DNS names (like `ip-10-0-1-45.
Lesson 223DNS Resolution in VPCs
Internal tools and microservices
Lesson 1062Public vs Private Registries
Internet-Facing Load Balancers
sit at the edge of your virtual network, in public subnets with Internet Gateway access.
Lesson 233Load Balancer Placement Patterns
Interval variables
Time intervals for aggregation
Lesson 1998Variables and Templating
IntervalSeconds
initial wait before retry
Lesson 2520Error Handling in State Machines
Invalid configurations
should fail evaluation with specific violations.
Lesson 2899Policy Testing and Validation
Invalidate
Gentler on origin, but stale content may linger briefly
Lesson 2675Cache Invalidation Strategies
Invalidation coordination
becomes critical—when data changes, you may need to use event-based invalidation across multiple tiers or accept eventual consistency windows.
Lesson 2708Multi-Layer Caching Strategies
Invalidation logic is complex
(easier to set "expire everything after 10 minutes" than track dependencies)
Lesson 2703Time-Based Cache Invalidation (TTL)
Inventories all assets
– servers, databases, applications, storage, networking components
Lesson 2797Migration Assessment Framework
Inventory
creates scheduled reports listing every object in your bucket—their keys, sizes, storage classes, encryption status, replication state, and tags.
Lesson 170Inventory and AnalyticsLesson 561Azure Service Bus Topics
Inventory all connection points
Map every application, script, and job that connects to migrated resources
Lesson 2828Connection String and Configuration Updates
Inventory Service
reserves stock → Compensating: release reservation
Lesson 2587Compensating Transactions
invisible
to other consumers for a specified period called the **visibility timeout**.
Lesson 554Message Visibility and TimeoutsLesson 2713Message Visibility and Acknowledgment
Invocation count
(how often the function runs)
Lesson 2553Cost Monitoring and Analysis
Invoke
Trigger Lambda functions for custom logic
Lesson 1841Pipeline Actions and Action Types
Invoke tool
Call Maven, Gradle, or other build tools
Lesson 1776Build Steps and Post-Build Actions
iopsPerGB
controls performance (input/output operations per second)
Lesson 1304StorageClass ParametersLesson 1310AWS EBS StorageClasses
IoT (Internet of Things)
Lesson 2601Streaming Use Cases
IoT and mobile backends
Respond to device events or push notifications
Lesson 470FaaS Use Cases and Anti-Patterns
IoT device communication
for continuous sensor data streams
Lesson 525WebSocket API Support
IoT Device Fleets
Millions of IoT devices sending telemetry over MQTT, CoAP, or custom TCP protocols require a load balancer that doesn't inspect application-layer data.
Lesson 271NLB Use Cases and Patterns
IoT devices
require minimal, highly compressed responses
Lesson 2577Backend for Frontend (BFF) Pattern
IP Address Management
Overlapping IP ranges between clouds cause routing nightmares.
Lesson 2778Multicloud Networking Challenges
IP allowlisting
to restrict access to known safe addresses, enable **firewall rules**, and place it behind a **reverse proxy** or **API gateway** for additional filtering.
Lesson 1081Network Security for Registries
IP Allowlists
explicitly permit only trusted IP ranges (your office, partner networks).
Lesson 2373Geo-Blocking and IP Reputation
IP Block Rules
let you specify CIDR ranges (IP address blocks) to allow or deny traffic beyond your cluster.
Lesson 1241IP Block Rules
IP Blocklists
deny specific addresses or ranges known to be problematic while allowing everyone else through.
Lesson 2373Geo-Blocking and IP Reputation
IP Flow Verify
(checks if traffic is allowed to/from a VM), **Next Hop** (shows routing decisions), and **Connection Monitor** (tracks connectivity and latency over time).
Lesson 2194Provider-Specific Network Insights
IP portability
Move Elastic IPs between NLBs during migrations or failovers
Lesson 266Static IP and Elastic IP Support
IP reputation
leverages databases of known malicious IP addresses—those associated with botnets, spam networks, or previous attacks.
Lesson 2373Geo-Blocking and IP Reputation
IP whitelisting
only allows traffic from specific, trusted IP addresses (like a guest list at an exclusive event).
Lesson 1231Rate Limiting and IP Whitelisting
IP-based
Allow requests only from your corporate network
Lesson 394GCP IAM Conditions
IP-based affinity
Routes based on the client's source IP address
Lesson 2467Sticky Sessions and Affinity
IPC namespace
Inter-process communication resources (like message queues) are isolated between containers.
Lesson 963Process Isolation with NamespacesLesson 1403Host Namespaces and Ports
IPs
when you need flexibility beyond VPC boundaries or precise IP control.
Lesson 267NLB Target Types
IPsec
protocols to encrypt all traffic flowing between clouds.
Lesson 2779Cross-Cloud VPN Connections
IPsec tunnels
over your private connection or implement **MACsec** (Layer 2 encryption) for physical link protection.
Lesson 2223Private Connectivity Security
IPVS mode
Uses Linux IP Virtual Server for more efficient load balancing
Lesson 1111Kube-proxy: Network Routing
Isolate compromised resources
by modifying security group rules or network ACLs to block all traffic
Lesson 2871Automated Incident Response
Isolate unavoidable state
When you must be stateful, contain it in specialized services with appropriate replication
Lesson 2474Designing for Stateless-First Architecture
Isolated experiments
Want to try a new database version?
Lesson 970Developer Workflow Improvements
Isolated test environments
Deploy each test run into a separate namespace, account, or project to prevent conflicts.
Lesson 2882Integration Testing Strategies
Isolated testing
Spin up ephemeral test environments for integration tests with Terratest or Kitchen-Terraform
Lesson 2887CI/CD Integration for IaC Tests
Isolated workloads
(compliance, multi-tenancy) need separate node groups
Lesson 1508Node Pool Management
Isolating environments
Block all traffic between development and production subnets
Lesson 2396Network ACLs for Subnet Isolation
Isolation boundaries
are the strategic separations you create between fault domains.
Lesson 2452Fault Domains and Isolation Boundaries
Issue
certificates (the `pki` engine)
Lesson 2260Vault Secrets Engines Concepts
Issuer
The trusted identity provider URL (e.
Lesson 1627JWT Authentication and Validation
Istio
offers extensive configurability through many Custom Resource Definitions (VirtualService, DestinationRule, Gateway, ServiceEntry).
Lesson 1592Linkerd vs Istio: Key DifferencesLesson 2769Service Mesh for Portability
Istiod
consolidates all three into a single binary, simplifying deployment, reducing resource overhead, and making troubleshooting easier.
Lesson 1577Istio Control Plane Components
Items
are individual records in a table (like spreadsheet rows).
Lesson 430DynamoDB: Fundamentals and Data Model
Iterate Based on Feedback
Regular retrospectives, office hours, and feedback loops ensure you're solving real problems, not building ivory-tower solutions.
Lesson 2938Platform as a Product Mindset

J

Jaeger Agent
A lightweight daemon deployed alongside your services that batches and forwards spans to collectors
Lesson 2089Jaeger Overview
Jaeger Client Libraries
Embedded SDKs that instrument your applications (now largely replaced by OpenTelemetry SDKs)
Lesson 2089Jaeger Overview
Jaeger Collector
Receives spans from agents, validates them, processes them through a pipeline, and writes to storage
Lesson 2089Jaeger Overview
Jaeger Query Service
API layer that retrieves traces from storage
Lesson 2089Jaeger Overview
Jaeger UI
Web interface for searching, filtering, and visualizing traces with service maps and dependency graphs
Lesson 2089Jaeger Overview
Java
Maven/Gradle dependency for `opentelemetry-sdk`
Lesson 2078Installing and Configuring OpenTelemetry SDKs
JavaScript only
and can't access external services or perform complex operations.
Lesson 613CloudFront Functions Basics
Jenkins job
(also called a "project") is a runnable task that Jenkins executes.
Lesson 1773Jenkins Jobs and Build Triggers
Jenkins Master
(controller) is the project manager who assigns tasks, while **Agents** (workers) are the crews who actually build things.
Lesson 1771Jenkins Architecture: Master and Agents
Jenkins Plugin Manager
is your central hub for discovering and installing these extensions.
Lesson 1775Jenkins Plugins and Extensibility
Jenkins X
is an opinionated CI/CD platform built around GitOps for Kubernetes.
Lesson 1863GitOps Tooling Landscape
Jenkins' own user database
– simplest, stores users internally
Lesson 1781Jenkins User Management and Security
JNLP
Agent initiates connection to master (works through firewalls)
Lesson 1779Jenkins Build Agents and Executors
Job A
builds your application and creates a binary, and **Job B** needs to test that exact binary, you can't just reference it directly—the file is gone once Job A completes.
Lesson 1710Artifacts: Upload and Download Between Jobs
Job B
needs to test that exact binary, you can't just reference it directly—the file is gone once Job A completes.
Lesson 1710Artifacts: Upload and Download Between Jobs
Job configurations
XML files defining all your pipeline jobs and freestyle projects
Lesson 1808Backup and Disaster Recovery
Job Control
Cancel running jobs, retry failed ones, or download artifacts using job-specific endpoints—all without manual intervention.
Lesson 1769GitLab CI API and Automation
Job level
Within a specific job definition
Lesson 1736Environment Variables in GitLab CI
Job list
Shows all configured jobs/pipelines
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Job Metrics
Track duration, records processed, memory usage, CPU utilization, and throughput.
Lesson 2623Batch Job Monitoring and Logging
Job Monitoring and Observability
to track success rates.
Lesson 1202Job and CronJob Best Practices
Job Orchestration
Built-in scheduling and triggering mechanisms that coordinate complex multi-step workflows.
Lesson 2643AWS Glue Overview
Job template
with a **schedule specification**.
Lesson 1196CronJob Resource Fundamentals
Job-level variables
apply only to steps within that specific job:
Lesson 1693Environment Variables in Workflows
Jobs
are designed for tasks that need to run to completion and then stop—think data processing, batch calculations, or one-time migrations.
Lesson 1191Kubernetes Job Resource FundamentalsLesson 1683GitHub Actions Architecture ComponentsLesson 1739Pipeline Visualization and Job Logs
Jobs completed
by a background worker
Lesson 1949Metric Types: Counter
Join Optimization
focuses on how tables connect.
Lesson 449Query Optimization Techniques
Joining split-and-selected values
Lesson 876Complex Function Nesting
JSON parsing
If logs are already JSON-formatted, extract nested fields automatically
Lesson 660Log Parsing and Enrichment
JSON Patch
describing what to change.
Lesson 1410Mutating Admission Webhooks
JSON-based structured language
for defining state machines in AWS Step Functions.
Lesson 2518Amazon States Language (ASL)
Jumbo frames
are packets larger than the standard 1,500-byte MTU—typically **9,000 bytes** or **9,001 bytes**.
Lesson 2229MTU and Jumbo Frames
Just-in-time VM access
Reduces attack surface by locking down management ports
Lesson 2863Azure Security Center and Sentinel
JWKS URI
Where to fetch public keys for signature verification
Lesson 1627JWT Authentication and Validation
JWT
for user-facing apps with modern identity providers.
Lesson 2539Serverless API Authentication
JWT (JSON Web Tokens)
let clients prove their identity by presenting signed tokens.
Lesson 2539Serverless API Authentication
JWT authorizers
both letting you enforce fine-grained access control before requests reach your backend.
Lesson 544API Gateway Authorization Strategies
JWT claims
Extract user roles, groups, or permissions from authenticated tokens
Lesson 1624Request-Level Authorization

K

KEDA
(Kubernetes Event-Driven Autoscaling)
Lesson 1453External Metrics and HPA
Keep count
Retain only the latest 10 versions of each image
Lesson 998Image Retention and Cleanup Policies
Keep dashboards focused
Each dashboard should serve one specific purpose (cluster health, application metrics, team overview).
Lesson 2003Grafana Best Practices and Performance
Keep files maintainable
Use `extends` and override files to separate environments (dev, test, prod) rather than duplicating configurations.
Lesson 1059Compose Best Practices and Limitations
Keep functions small
Smaller code bundles load faster.
Lesson 622Edge Function Performance Optimization
Keep it focused
One layer per concern (e.
Lesson 507AWS Lambda: Layers and Dependencies
Keep it lightweight
Your health check will run repeatedly (based on your `periodSeconds`).
Lesson 1427Designing Effective Health Check Endpoints
Keep Secrets under 100KB
when possible
Lesson 1273Secret Size and Performance Limits
Keep sensitive data secure
in your private cloud (like customer financial records)
Lesson 22Hybrid Cloud Deployment Model
Keep them off
during weekends and holidays
Lesson 2161Scheduled Shutdown for Non-Production
Keep values simple
and standardized
Lesson 92VM Tagging and Organization
Keep your configuration read-only
for certain infrastructure components
Lesson 753When to Use Resources vs Data Sources
Keep-Alive Settings
control HTTP connection reuse between the ALB and your targets.
Lesson 252ALB Connection Handling and Timeouts
Kernel manipulation
Can load kernel modules or change system settings
Lesson 1394Privileged Containers
Key
A unique identifier or name (like `user-photos/vacation-2024.
Lesson 115Object Storage OverviewLesson 1363Defining Tolerations in Pod Specs
Key advantage
You need only **one** load balancer (managed by an Ingress Controller) to handle traffic for many services—saving cost and complexity.
Lesson 1220Ingress vs Service Load Balancing
Key characteristic
You cannot delete or modify local routes—they're permanent and managed by the cloud provider.
Lesson 181Default Routes and Local Routes
Key Encryption Key (KEK)
A master key that encrypts the DEK itself
Lesson 2282Data Encryption Keys (DEK) and Key Encryption Keys (KEK)
Key Encryption Keys (KEK)
Protected by the root key.
Lesson 2283Key Hierarchy and Root of Trust
Key insight
Test with realistic payloads and traffic patterns—not just synthetic uniform load.
Lesson 2554Performance Testing and Benchmarking
Key Management System (KMS)
is a centralized service that creates, stores, rotates, and controls access to **cryptographic keys** — the secret values used to encrypt and decrypt your data.
Lesson 2280Introduction to Key Management Systems
Key missing
→ Process event and store key with TTL
Lesson 2734Event Deduplication Strategies
Key Performance Indicators (KPIs)
and **metrics**.
Lesson 37Measuring Cloud Business Value: KPIs and Metrics
Key ring-level
Grants access to all keys within that ring
Lesson 2319GCP Cloud KMS IAM and Permissions
Key Rotation
You can rotate KEKs without re-encrypting all your data—just re-encrypt the DEKs.
Lesson 2282Data Encryption Keys (DEK) and Key Encryption Keys (KEK)
Key Vault references
in application settings (format: `@Microsoft.
Lesson 2317Azure Key Vault Service Integration
Key-level
Grants access to a single specific key (most restrictive)
Lesson 2319GCP Cloud KMS IAM and Permissions
key-value pairs
you attach to your VMs (and other cloud resources) to label them with meaningful information.
Lesson 92VM Tagging and OrganizationLesson 1697Workflow File Structure and YAML Syntax
Keyspaces
are managed cloud services that offer Apache Cassandra-compatible databases without requiring you to install, patch, or maintain Cassandra clusters yourself.
Lesson 443Keyspaces and Cassandra-Compatible Services
Keyword fields
for exact matches (IP addresses, status codes)
Lesson 2019Elasticsearch Index Templates and Mappings
Kiali
is the topology-focused dashboard for service mesh.
Lesson 1634Service Mesh Dashboards
Kibana Query Language (KQL)
comes in—a simple, human-readable query syntax designed specifically for searching structured log data.
Lesson 2030Kibana Query Language (KQL)
Kill switches
Automated triggers that halt experiments if critical metrics deteriorate
Lesson 2493Blast Radius and Safety Controls
Kinesis Data Analytics
for SQL-based stream processing.
Lesson 2612Managed Streaming Services Overview
Kinesis Data Firehose
for loading streams into data lakes, and **Kinesis Data Analytics** for SQL-based stream processing.
Lesson 2612Managed Streaming Services Overview
Know Your Audience
A CFO needs monthly trend summaries and budget variance.
Lesson 2970Cost Dashboard Design
Know Your Users
Conduct interviews, surveys, and usage analysis.
Lesson 2938Platform as a Product Mindset
Knowledge transfer
so new on-call engineers aren't helpless
Lesson 2130Runbooks and Playbooks
Known CVE databases
(Common Vulnerabilities and Exposures)
Lesson 1679Artifact Security Scanning
Known scenarios
Tests what you already thought could go wrong
Lesson 2491Chaos Engineering vs Traditional Testing
Kong
, **Ambassador**, or **Tyk** use standard configuration formats (YAML, CRDs) and can run on any Kubernetes cluster, regardless of cloud provider.
Lesson 2772API Gateway Abstraction
KQL (Kusto Query Language)
Azure's equivalent to Kibana's KQL or Loki's LogQL.
Lesson 2053Azure Monitor Logs
kube-proxy
Manages network rules on the node, enabling communication between Pods and external traffic
Lesson 1108Worker Node Components IntroductionLesson 1469EKS Add-ons Overview
KubeFed (Federation v2)
Community project for declarative multi-cluster management
Lesson 1514Cluster Federation Basics
Kubelet ↔ API Server
Kubelets use certificates to register nodes and report status securely
Lesson 1115Component Communication and Security
Kubernetes API server
(which you learned about in previous lessons).
Lesson 1130What is kubectl and Its Role
Kubernetes APIs
and **cloud provider SDKs** to fetch live data.
Lesson 2932Kubernetes and Cloud Resource Visualization
Kubernetes clusters
Pod status, deployments, services, ingress routes, resource utilization
Lesson 2932Kubernetes and Cloud Resource Visualization
Kubernetes events
Pod scheduling, failures, restarts
Lesson 1500AKS Monitoring with Azure Monitor
Kubernetes Operator
Managed deployment in cloud-native environments
Lesson 2089Jaeger Overview
Kubernetes RBAC enforcement
Map Azure AD users/groups to Kubernetes roles
Lesson 1498AKS Integration with Azure Active Directory
Kubernetes StatefulSet
running PostgreSQL or MySQL behaves identically on AWS EKS, Azure AKS, or Google GKE.
Lesson 2770Database Abstraction Strategies
Kubernetes version
from available releases
Lesson 1492Creating an AKS Cluster via Azure Portal
Kubernetes-native
Integrates seamlessly with the abstraction layer you've already built
Lesson 2772API Gateway Abstraction
Kubewarden
offer more granular, customizable policy enforcement.
Lesson 1400Migrating from PodSecurityPolicy
Kustomization
resource includes a `healthChecks` field where you specify which resources to monitor:
Lesson 1926Flux Health Checks and Readiness
KV v1
is a single drawer where updating a document destroys the old version, while **KV v2** is a multi-drawer system that keeps historical copies of every document you file.
Lesson 2261Key-Value Secrets Engine
KV v2
is a multi-drawer system that keeps historical copies of every document you file.
Lesson 2261Key-Value Secrets Engine

L

Label matching
to correlate metrics
Lesson 1975Subqueries and Complex Expressions
Label/tag injection
at the source ensures every log entry carries immutable tenant context.
Lesson 2058Multi-Tenancy and Log Isolation
Labels on PersistentVolumes
are key-value pairs you add to describe attributes:
Lesson 1300Volume Selectors and Labels
Lake Formation permissions
, not complex bucket policies.
Lesson 2634AWS Lake Formation
Lambda authorizer
is a function you write that API Gateway calls before routing requests.
Lesson 544API Gateway Authorization Strategies
Lambda authorizers
(formerly custom authorizers) and **JWT authorizers**—both letting you enforce fine-grained access control before requests reach your backend.
Lesson 544API Gateway Authorization Strategies
Lambda function
Either AWS-provided templates or custom code
Lesson 2240AWS Secrets Manager Rotation
Lambda Functions
automatically send logs to CloudWatch Logs by default—every `print()` or `console.
Lesson 2052AWS CloudWatch Logs IntegrationLesson 2240AWS Secrets Manager Rotation
Lambda is invoked
with your secret ARN
Lesson 2240AWS Secrets Manager Rotation
Lambda Layers
as shared bookshelves.
Lesson 507AWS Lambda: Layers and Dependencies
Lambda@Edge
allows up to **30 seconds** execution time (viewer events) or **5 seconds** (origin events), supports up to **10GB memory**, **50MB** code packages, and runs Node.
Lesson 615CloudFront Functions vs Lambda@Edge
Lambda/Functions
Execute custom remediation code
Lesson 646Alarm Actions and Notifications
Language Agnostic
Generate clients and servers in any supported language from the same `.
Lesson 2572gRPC for High-Performance Communication
Language independence
A single sidecar implementation works across microservices written in Python, Java, Go, or any language.
Lesson 2599Sidecar Pattern for Cross-Cutting Concerns
Language packages
Maven (Java), npm (JavaScript), PyPI (Python), and more
Lesson 1095Artifact Registry Multi-Format Support
Language-specific images
(`python:3.
Lesson 1001FROM: Base Image Selection
Large
(15 GB RAM, 8 vCPUs): Complex builds, large codebases
Lesson 1823CodeBuild Build Environments and Images
Large block sizes
favor throughput-optimized volumes
Lesson 134Volume Performance Optimization
Large dependency packages
Deployment package limits make functions with massive libraries impractical
Lesson 470FaaS Use Cases and Anti-Patterns
Large Ecosystem
Terraform has extensive community support, pre-built modules, and integrations that accelerate development.
Lesson 723What is Terraform and Why Use It
Large Relational Databases
Running MySQL, PostgreSQL, or Oracle databases with huge active datasets.
Lesson 68Memory Optimized Instance Types
Larger storage footprints
for incremental snapshots
Lesson 2409Relationship Between RTO, RPO, and Cost
Largest scope, end-to-end validation
Acceptance (or E2E) tests simulate real user workflows through your entire system.
Lesson 1649Automated Testing in CI/CD
Last resort: cross-region
– Only route far away when necessary
Lesson 1615Locality-Aware Load Balancing
Latency distribution
(P50, P95, P99)
Lesson 1632Automatic Metrics Collection
Latency distribution charts
show performance patterns over time
Lesson 2094Google Cloud Trace
Latency increases
Messages wait longer in queues before processing
Lesson 2740Understanding Backpressure in Distributed Systems
Latency Injection
Add delays (e.
Lesson 2495Network Chaos Patterns
Latency matters
Sub-millisecond response times are critical
Lesson 2682In-Memory Caching Fundamentals
Latency overhead
Each proxy hop typically adds **1-5 milliseconds** of latency per request.
Lesson 1573Service Mesh Performance Overhead
Latency Reduction
The biggest win is speed.
Lesson 610Edge Computing Concepts and Use Cases
Latency vs Consistency
Synchronous cross-region replication ensures consistency but increases latency; asynchronous improves speed but means different regions see events at different times
Lesson 2737Multi-Region Event Distribution
Latency-sensitive APIs
where cold starts are unacceptable
Lesson 493Provisioned Concurrency
Latency-sensitive applications
– User-facing APIs notice the delay
Lesson 463Cold Starts and Warm Starts
Lateral movement
One compromised secret enables attackers to access more systems
Lesson 2237Introduction to Secrets Management in Cloud
Launch hook
– Pause between Pending and InService (install special software, register with external systems)
Lesson 295Instance Lifecycle in Auto Scaling
Launch Template or Configuration
– The blueprint defining what kind of EC2 instances to create (instance type, AMI, security groups, etc.
Lesson 313AWS Auto Scaling Groups (ASG) Overview
Launch Templates
over Launch Configurations — they're more flexible, versioned, and support modern Auto Scaling features like mixed instance policies.
Lesson 314ASG Launch Templates and Configurations
Launched During Failover
Lesson 2432Pilot Light Pattern
Lawfulness and Transparency
You must have a legal basis (consent, contract, legitimate interest) to process data and clearly inform users what you're doing with their information.
Lesson 2328GDPR Data Protection Requirements
Layer 3/4 attacks
the most common DDoS vectors that overwhelm network connections with massive traffic volumes.
Lesson 2381AWS Shield Standard
Layer 4
(TCP/UDP), meaning it routes traffic based on IP addresses and ports.
Lesson 1220Ingress vs Service Load Balancing
Layer 4 (NLB)
for ultra-low latency requirements, non-HTTP protocols, or extreme performance needs (gaming servers, IoT data streams, financial trading systems).
Lesson 263Layer 4 vs Layer 7 Load Balancing
Layer 4 (Transport Layer)
load balancers make routing decisions based on basic network information like IP addresses and TCP/UDP ports.
Lesson 234OSI Layer 4 vs Layer 7 Load BalancingLesson 263Layer 4 vs Layer 7 Load Balancing
Layer 4 capabilities
Route TCP and SSL/TLS traffic based on IP and port
Lesson 237Classic/Legacy Load Balancers
Layer 7
(HTTP/HTTPS), allowing you to route traffic based on URLs, hostnames, and paths.
Lesson 1220Ingress vs Service Load Balancing
Layer 7 (ALB)
for web applications where you need intelligent routing, microservices architectures, or content- based decisions.
Lesson 263Layer 4 vs Layer 7 Load Balancing
Layer 7 (Application Layer)
load balancers go deeper—they inspect the actual HTTP/HTTPS request content, including URLs, headers, and cookies, to make smarter routing decisions.
Lesson 234OSI Layer 4 vs Layer 7 Load BalancingLesson 263Layer 4 vs Layer 7 Load Balancing
Layer 7 capabilities
Perform basic HTTP/HTTPS routing and sticky sessions
Lesson 237Classic/Legacy Load Balancers
Layer digests
The cryptographic hashes (SHA-256) identifying each layer in order
Lesson 980Image Manifest and Metadata
Layer in traffic management
Introduce routing rules, retries, and timeouts only where needed
Lesson 1601Service Mesh Adoption Patterns
Layer Optimization
Cloud providers let you extract common dependencies into separate layers shared across multiple functions.
Lesson 2546Package Size Optimization
Layer sharing
Ten containers from the same image share the same base layers
Lesson 976Union Filesystem Mechanics
Layer sizes
which steps consume the most space
Lesson 986Inspecting Image Layers
Lazy Evaluation
Only compute expensive attributes when a span is actually sampled.
Lesson 2071Instrumentation Overhead
Lazy Loading
) is a caching strategy where your application code is responsible for both reading from the cache and loading data into it.
Lesson 2697Cache-Aside (Lazy Loading) Pattern
LDAP/Active Directory
– integrates with corporate directory services
Lesson 1781Jenkins User Management and Security
Leaky bucket
Requests drain at a constant rate, smoothing bursts
Lesson 2592Rate Limiting and Throttling
Learning
Understand how your configuration translates to actual infrastructure
Lesson 698Planning and Preview
Learning curve
Declarative is simpler for beginners; Scripted requires Groovy knowledge
Lesson 1783Declarative vs Scripted Pipeline Syntax
Learning-focused
Builds confidence and reveals emergent behaviors
Lesson 2491Chaos Engineering vs Traditional Testing
Learning/testing locally
→ `demo`
Lesson 1586Istio Configuration Profiles
Lease ID
A unique identifier for that specific secret instance
Lesson 2265Vault Leases and Revocation
Least connections
Send traffic to the instance with fewest active connections
Lesson 2457Load Distribution for AvailabilityLesson 2464Stateless HA Patterns: Load Balancing
Least Privilege Networking
Just as you grant minimal IAM permissions, you grant minimal network access.
Lesson 2390Network Segmentation Fundamentals
Least Privilege Principle
means giving identities (users, groups, roles, or services) *only* the permissions they absolutely need to perform their job—and nothing extra.
Lesson 368Least Privilege Principle
Least Request
Sends traffic to the instance currently handling the fewest active requests.
Lesson 1569Load Balancing in Service Mesh
Least-privilege
Users access only specific applications they need, not entire network segments
Lesson 2393Zero Trust Network Access (ZTNA)
Leave headroom
between requests and limits for memory spikes
Lesson 1335Setting Memory Limits
Leaves untouched
any resources in the resource group that aren't mentioned in the template
Lesson 901Template Deployment ModesLesson 912Deployment Modes: Complete vs Incremental
legal holds
indefinite locks that stay active until explicitly removed, useful during ongoing investigations.
Lesson 167Object Lock and RetentionLesson 424Manual Snapshots and Retention
Legal/Compliance Liaison
Ensures regulatory requirements are met
Lesson 2870Incident Response Planning
Lenient settings
(1 out of 1) catch problems quickly but may alert unnecessarily on transient spikes
Lesson 642Alarm Evaluation Periods and Datapoints
LessThan (<)
Alarm when metric drops below threshold (e.
Lesson 643Comparison Operators and Thresholds
LessThanOrEqual (≤)
Alarm when metric reaches or falls below threshold (e.
Lesson 643Comparison Operators and Thresholds
Level
Which Pod Security Standard to apply (`privileged`, `baseline`, or `restricted`)
Lesson 1399Pod Security Admission Controller
Level-based filtering
Only forward ERROR and WARN logs, drop DEBUG and INFO
Lesson 1443Log Sampling and Filtering
Leverage scheduled scaling
If you know traffic patterns (like weekday business hours), use scheduled actions to scale down during predictable low-traffic periods—nights, weekends, holidays.
Lesson 311Scaling for Cost Optimization
Leverage spot instances
for fault-tolerant workloads—they cost up to 90% less than regular VMs but can be evicted.
Lesson 1504AKS Cost Management and Cluster Sizing
Leverage variables
Instead of creating separate dashboards for each environment, use template variables to filter dynamically.
Lesson 2003Grafana Best Practices and Performance
LICENSE
Optional licensing information
Lesson 1522Charts: Helm's Packaging Format
License databases
to identify incompatible or restricted licenses
Lesson 1679Artifact Security Scanning
Licensing
Operating systems, databases, middleware, support contracts
Lesson 2799TCO Analysis for Migration
Licensing constraints
require per-socket or per-core licensing (some Oracle or Windows licenses)
Lesson 108GCP Sole-Tenant Nodes
Lifecycle
They start together, stop together, and are scheduled on the same node.
Lesson 1148Multi-Container Pods
Lifecycle automation
Create lifecycle policies that target specific tags.
Lesson 169Object Tagging and MetadataLesson 2422Cloud-Native Backup Services Overview
Lifecycle hooks
pause the instance at key transition points, giving you time to perform custom actions:
Lesson 295Instance Lifecycle in Auto ScalingLesson 318ASG Lifecycle HooksLesson 1834CodeDeploy Lifecycle Hooks
Lifecycle Independence
A PV's lifecycle is decoupled from Pods.
Lesson 1289PersistentVolume (PV) Fundamentals
Lifecycle stage
(experimental, production, deprecated)
Lesson 2928Software Catalog in Backstage
Lifecycle Transitions
Job changes trigger automatic access adjustments—promotions grant new permissions while revoking old ones; transfers move users between security groups; leave-of-absence temporarily suspends accounts.
Lesson 2857Identity Governance and Lifecycle
Lift and Shift
uses `terraform import` to quickly move resources into state, then iteratively improve the configuration quality.
Lesson 844Migration Strategies for Legacy Infrastructure
Lighter control plane
Fewer components mean less resource overhead and simpler operations
Lesson 1596Open Service Mesh (OSM) Basics
Lightweight
Unlike virtual machines that require a full operating system, containers share the host OS kernel, making them much smaller and faster to start
Lesson 960What Are Containers?Lesson 961Containers vs Virtual Machines
Lightweight Transformations
Resize images, modify headers, or rewrite URLs on-the-fly
Lesson 610Edge Computing Concepts and Use Cases
Like CloudFormation and ARM
Native to its cloud platform, deeply integrated with GCP services
Lesson 935Introduction to Google Cloud Deployment Manager
Likelihood
Low, medium, or high probability of occurrence
Lesson 2803Risk Assessment and Mitigation
Limit blast radius
if one zone is compromised, attackers can't freely move laterally
Lesson 2841Security Boundaries and Trust Zones
Limit dependencies
Each library adds load time.
Lesson 622Edge Function Performance Optimization
Limit history depth
Configure `--history-max` to prevent unbounded revision storage
Lesson 1556Helm Rollback Strategies
Limit panel count
Aim for 10-20 panels per dashboard.
Lesson 2003Grafana Best Practices and Performance
Limit partition count
Too many tiny partitions (thousands per query) create overhead.
Lesson 2661Athena Partitioning Strategies
Limit scan depth
with appropriate WHERE filters
Lesson 2662Athena Performance Optimization
Limit Time Ranges
Longer range vectors require more data processing.
Lesson 1976Query Optimization and Best Practices
Limit Your Palette
Too many colors create cognitive overload.
Lesson 2105Color Theory and Accessibility
Limited features
Basic health checks, simple routing (no content-based rules)
Lesson 237Classic/Legacy Load Balancers
LimitRange
acts like a safety net and helper combined—it enforces minimum/maximum resource boundaries *and* automatically fills in missing values when pods don't specify requests or limits.
Lesson 1338LimitRange Objects
Limits attacker persistence
mechanisms
Lesson 1392Read-Only Root Filesystem
Line charts
for metrics over time (error rates, request counts)
Lesson 2028Kibana Dashboard Creation
Line graphs
show trends over time (CPU utilization across the day)
Lesson 673CloudWatch DashboardsLesson 2103Visualization Types and Best Practices
Lineage
Visualize data flow from source to destination through pipelines
Lesson 2637Data Catalog and Metadata Management
Linear
Gradually increase traffic in equal increments
Lesson 1835Blue/Green Deployments with CodeDeploy
Linear Pipeline Pattern
, where each stage executes sequentially—one completes before the next begins.
Lesson 1658Parallel Execution Pattern
Linked templates
let you call one ARM template from another using a special `Microsoft.
Lesson 907Linked Templates and Template NestingLesson 916Outputs and Cross-Template Communication
Linkerd
prioritizes simplicity with fewer moving parts and a smaller API surface.
Lesson 1592Linkerd vs Istio: Key DifferencesLesson 2769Service Mesh for Portability
Lint first
to catch structural issues
Lesson 1548Chart Testing and Validation
Linting
Does your code follow style and naming conventions?
Lesson 721Continuous Integration for IaC
Linux hosts
(not Windows or Mac Docker Desktop in certain configurations), and you must set size limits to prevent consuming all system memory.
Lesson 1039tmpfs Mounts
Linux kernel's networking stack
.
Lesson 1599Cilium Service Mesh with eBPF
List all networks
to see what's available:
Lesson 1046Network Troubleshooting and Inspection
List constraints
Allow or deny specific values (e.
Lesson 2344GCP Organization Policy Service
LIST operation
shows what objects exist in a bucket, often with a prefix filter to narrow results (remember: folders are simulated).
Lesson 153Basic Object Operations
List workflow runs
and their status for a repository
Lesson 1724GitHub Actions APIs and Webhooks
Listen on specific ports
(80 for HTTP, 443 for HTTPS)
Lesson 1583Gateway Resource for Ingress
listener
is a process that monitors a specific port and protocol combination on your load balancer.
Lesson 243Load Balancer Listeners and RulesLesson 246ALB Listeners and Rules
Listeners
These define what traffic the NLB accepts.
Lesson 262NLB Architecture and Components
Listing releases
shows what's currently deployed:
Lesson 1526Helm Releases: Managing Deployments
Live code editing
Mount your source code directory so changes reflect instantly without rebuilding images
Lesson 1038Bind Mounts
Live dashboards
showing streaming metrics or logs
Lesson 525WebSocket API Support
Live documentation
auto-generated from specs
Lesson 2931API Discovery and Documentation
Live migration
is the preferred method.
Lesson 91VM Maintenance and Updates
Liveness
Restart frozen applications
Lesson 1419The Three Types of Probes
Load balancer health checks
Are services correctly registered and receiving traffic?
Lesson 2908Application Recovery Testing
Load balancer integration
Optional traffic routing during deployments
Lesson 1832CodeDeploy Application and Deployment Groups
Load balancer misconfigurations
Verify security groups allow health check traffic
Lesson 1519Troubleshooting Common Cluster Issues
Load Balancer Probes
If your VMSS is behind a load balancer, those health checks (pinging specific endpoints) signal VMSS about instance health.
Lesson 324VMSS Health Monitoring and Automatic Repairs
Load balancer upgrades
Swapping legacy load balancers for cloud-native ALBs or Application Gateways
Lesson 2793Replatform Strategy
Load Balancers
AWS ALB/NLB, NGINX, Envoy
Lesson 2575Service Discovery Patterns
Load balancing algorithms
are the decision-making strategies that determine this distribution.
Lesson 1614Load Balancing Algorithms
Load balancing policies
(round-robin, least-connections)
Lesson 1603Virtual Services and Destination Rules
Load data
from the Glue Data Catalog
Lesson 2647Glue ETL Script Development
Load simulation
is your primary tool.
Lesson 307Scaling Policy Testing
Load Testing
simulates typical usage patterns with expected concurrent users and transaction volumes.
Lesson 459Performance Testing and BenchmarkingLesson 2554Performance Testing and Benchmarking
LoadBalancer Service
provisions a cloud load balancer (like AWS ELB or GCP Load Balancer) for each Service.
Lesson 1220Ingress vs Service Load Balancing
Loads the state file
to see what resources it created previously
Lesson 774What is Terraform State
Local name
– your chosen identifier for referencing this data
Lesson 748Data Source Block Syntax
Local paths
Development and tightly-coupled modules
Lesson 804Module Sources and Versioning
local route
that allows traffic to flow between all subnets in the same VPC.
Lesson 180Route Tables BasicsLesson 181Default Routes and Local Routes
Local Secondary Index
shares the same partition key as your base table but uses a *different sort key*.
Lesson 433DynamoDB Secondary Indexes: GSI and LSI
local state storage
the default behavior where your state file lives on your computer's filesystem, right alongside your `.
Lesson 776Local State StorageLesson 777State Locking Fundamentals
Local testing
Access a microservice directly without external routing
Lesson 1142kubectl port-forward for Local Access
Localhost
A custom profile you've created
Lesson 1397Seccomp Profiles
Locality-Aware
Prefers instances in the same availability zone or region to reduce latency and cross-zone transfer costs.
Lesson 1569Load Balancing in Service Mesh
Locality-aware load balancing
is a traffic management feature that prioritizes routing requests to service instances in the same zone or region as the caller before attempting more distant locations.
Lesson 1615Locality-Aware Load Balancing
Location-aware policies
Restrict actions based on source IP or region
Lesson 367Policy Variables and Dynamic Policies
Lock down production networking
(VPCs, subnets, security groups)
Lesson 856Stack Policies for Update Protection
Lock ID
A unique identifier for the stuck lock
Lesson 795Handling State Lock Failures
Log access
Make container logs immediately available on the host for debugging
Lesson 1038Bind Mounts
Log Aggregation
centralizes Jenkins master logs, agent logs, and build logs into a searchable repository.
Lesson 1807Monitoring and Alerting for JenkinsLesson 2861Security Information and Event Management (SIEM)
log aggregation architecture
works similarly, transforming scattered log chaos into organized, queryable insights through four core components working in harmony.
Lesson 2005Log Aggregation ArchitectureLesson 2011Log Indexing Fundamentals
log aggregation backend
a centralized system designed to receive, index, store, and query massive volumes of logs from across your entire cluster.
Lesson 1439Log Aggregation BackendsLesson 1441Multi-Line Log Handling
Log analysis
Querying application or infrastructure logs stored as files
Lesson 2656Serverless Query Engine Overview
Log Analytics agent
(formerly called MMA) or the newer **Azure Monitor Agent** (AMA).
Lesson 2053Azure Monitor Logs
Log Analytics workspace
is a centralized repository in Azure where all your logs and performance data are stored and analyzed.
Lesson 676Azure Log Analytics WorkspacesLesson 2053Azure Monitor Logs
Log collectors
Gathering logs from every node (like Fluentd or Logstash agents)
Lesson 1185DaemonSet Fundamentals
Log correlation
means connecting related log entries that belong to the same logical operation, even when they're written by different services at different times.
Lesson 2012Log Correlation and Context
Log Explorer
is the interactive interface for searching and analyzing your logs.
Lesson 681Cloud Logging in GCP
Log File Validation
involves generating and storing cryptographic hashes (like SHA-256) of log entries.
Lesson 2357Audit Log Integrity and Validation
Log indexing
is the process of creating data structures that act like a book's index—allowing you to jump directly to relevant logs instead of reading every line.
Lesson 2011Log Indexing Fundamentals
Log insights widgets
embed query results directly
Lesson 673CloudWatch Dashboards
Log levels
are standard categories that classify how urgent or significant a log entry is—like labeling emails as "urgent," "normal," or "FYI.
Lesson 653Log Levels and Severity
Log parsing
means breaking those raw strings into individual fields (like timestamp, severity, user ID, or error message).
Lesson 660Log Parsing and Enrichment
Log processing
applications ingesting terabytes of data daily
Lesson 69Storage Optimized Instance Types
Log shipping
collects logs locally and sends them in batches at regular intervals (every 5 minutes, hourly, etc.
Lesson 659Log Streaming vs Log ShippingLesson 2429Continuous Data Protection (CDP)
Log sinks
are routing rules that tell the log router where to send logs.
Lesson 681Cloud Logging in GCP
Log streaming
sends log data in real-time, as events occur.
Lesson 659Log Streaming vs Log Shipping
Log volume per day
= average log entry size × entries per day
Lesson 656Log Retention and Storage Requirements
Log-based metrics
let you turn log patterns into measurable numbers—like counting how many times "ERROR" appears per minute, or tracking the percentage of requests that contain "authentication failed.
Lesson 667Log-Based Metrics and Alerting
Logging
Enable comprehensive audit logging (CloudTrail, Azure Monitor) with immutable storage
Lesson 2326PCI DSS for Payment Card DataLesson 2774Observability Portability
Logging and Debugging
Many logging frameworks and error handlers automatically capture environment variables during crashes or debugging sessions, potentially exposing secrets in logs you never intended to persist.
Lesson 2270Environment Variables for Secrets
Logging and monitoring
of suspicious patterns for audit trails
Lesson 2364What is a Web Application Firewall (WAF)
Logging sidecars
Collect and ship logs to centralized systems
Lesson 2599Sidecar Pattern for Cross-Cutting Concerns
Logic testing
goes deeper: it simulates real authorization requests using the policy evaluation logic you learned earlier.
Lesson 371Policy Validation and Testing
Logical grouping
– Related steps stay together, making pipelines easier to understand and modify
Lesson 1786Stages and Steps OrganizationLesson 1913App of Apps Pattern
Logical Replication
Most database systems support logical replication, which captures changes at the transaction level and replays them on target databases.
Lesson 2787Cross-Cloud Database Replication
Logs Explorer
, where you can filter by resource type, severity, timestamp, or custom fields.
Lesson 2054Google Cloud Logging (Operations)
Logs in context
eliminates this friction by automatically linking logs directly to traces and infrastructure metrics in a single view.
Lesson 2044New Relic Logs in Context
Logstash
runs on the JVM (Java Virtual Machine), requiring significantly more resources—often 500 MB to 1 GB+ of memory even for simple pipelines.
Lesson 2025Fluentd vs Logstash Trade-offs
Long gaps
between parent span start and first child span
Lesson 2068Trace Analysis Patterns
Long polling
is like waiting at your mailbox for up to, say, 20 seconds.
Lesson 564Long Polling vs Short PollingLesson 2717Batch Operations in Queues
Long retention (weeks)
For audit trails or scenarios where messages might need extended processing windows
Lesson 565Message Retention and Expiration
Long upload times
without progress visibility
Lesson 166Multipart Upload
Long-lived feature branches
They accumulate merge debt and delay integration problems until it's painful.
Lesson 1656CI/CD Best Practices and Anti-patterns
Long-running analysis jobs
Pause expensive computations overnight, pay nothing while hibernated, resume instantly in the morning
Lesson 88VM Hibernation
Long-running connections
Least connections.
Lesson 240Load Balancing Algorithms
Long-running processes
Jobs exceeding function timeout limits (remember those 15-minute constraints?
Lesson 470FaaS Use Cases and Anti-PatternsLesson 2568Hybrid Microservice Deployments
Long-running production
applications
Lesson 2532DynamoDB Capacity Modes
Longer cold starts
– more time extracting and loading dependencies
Lesson 485Function Packaging and Deployment Size
Longer TTL (3600s+)
Allows time to inspect logs and debug issues
Lesson 1194Job TTL and Automatic Cleanup
Lookup/GetMetadata
Retrieve metadata for decisions
Lesson 2620Azure Data Factory Pipelines
Loop forever
(wasting resources)
Lesson 2714Dead Letter Queues
Loose coupling between
– minimal dependencies across boundaries
Lesson 2560Service Boundaries and Decomposition
Lost
The bound PV no longer exists
Lesson 1291PV and PVC Binding Process
Lost changes
when one apply overwrites another's work
Lesson 777State Locking Fundamentals
Low (0.1–3.9)
Minor issues with limited exploitability or impact
Lesson 1075Vulnerability Severity and Prioritization
Low hit ratio
Review cache keys, expiration times, or cache-warming strategies
Lesson 2695Cache Monitoring and Performance Metrics
Low IOPS (hundreds)
Fine for development or infrequently accessed databases
Lesson 454Database Storage Performance
Low latency access
– ideal for databases and transactional applications
Lesson 125Block Storage vs Other Storage Types
Low priority systems
(RTO > 24 hours): Annually
Lesson 2415DR Testing and Validation Frequency
Low resolution
(1-hour averages): Keep for 1 year
Lesson 634Metric Aggregation and Resolution
Low risk
Test new projects without major upfront commitments
Lesson 30Pay-as-You-Go Pricing Model Fundamentals
Low RPO/RTO
, near-zero data loss.
Lesson 2411DR Tiers and Service Levels
Low-latency requirements
Cold starts introduce unpredictable latency that real-time applications can't tolerate
Lesson 470FaaS Use Cases and Anti-Patterns
Low-latency tolerance
applications where adding 2ms to a 200ms request is negligible
Lesson 1573Service Mesh Performance Overhead
Low-performing paths
URLs with poor hit rates may need better caching headers
Lesson 2680CDN Cache Analytics and Hit Rates
Low-risk
Not core business-critical initially
Lesson 2569Microservices Migration Strategies
Low-Risk Services
Move to production namespaces with low-traffic or non-critical services
Lesson 1601Service Mesh Adoption Patterns
Low-traffic internal services
with straightforward communication patterns
Lesson 1575Service Mesh Adoption Strategies
Lower `maxUnavailable`
Fewer Pods go down at once → better availability, slower updates
Lesson 1167Rolling Update Strategy
Lower bandwidth costs
Origin sends each file once per edge location, not once per user
Lesson 584Origin Servers and Edge CachingLesson 585Cache Hit vs Cache Miss
Lower barriers to entry
Start small without massive upfront investment
Lesson 29CapEx vs OpEx: Financial Models in Cloud Computing
Lower billing
Fewer invocations = lower costs in most FaaS pricing models
Lesson 502Batch Processing Pattern
Lower bound
Alert when metric drops below minimum (available memory < 1GB)
Lesson 641Threshold-Based Alarms
Lower complexity
in failover logic—just route to healthy instances
Lesson 2462Stateless Services and Horizontal Scaling
Lower CPU utilization
The network adapter handles more work, freeing your CPU for application tasks
Lesson 2231Enhanced Networking and SR-IOV
Lower data transfer costs
AWS charges less for data transferred via Direct Connect than over the internet
Lesson 2212AWS Direct Connect Fundamentals
Lower initial risk
Since you're not changing application code, there's less chance of introducing bugs or compatibility issues.
Lesson 2792Rehost (Lift-and-Shift) Strategy
Lower latency access
– Users in distant locations can read from a nearby replica
Lesson 160Cross-Region Replication Basics
Lower operational overhead
Fewer infrastructure pieces to manage and patch
Lesson 2164Multi-Tenancy and Resource Sharing
Lower Origin Load
Your origin servers handle fewer requests since the CDN absorbs most traffic.
Lesson 582What is a CDN and Why Use One
Lower parallelism
when hitting provider API rate limits
Lesson 839Parallel Execution and Performance
Lower resource usage
Shared memory and processing
Lesson 1577Istio Control Plane Components
Lower runner costs
Less compute time means lower GitHub Actions usage
Lesson 1719Caching Dependencies and Build Artifacts
Lowering bandwidth costs
No cross-region data transfer fees when pulling local replicas
Lesson 1093ACR Geo-Replication
Lowest-price
Cheapest option but higher interruption risk
Lesson 2978Spot Instance Fleet Management
LSI
when you need different sorting within the same partition.
Lesson 433DynamoDB Secondary Indexes: GSI and LSI

M

Machine learning inference
(making predictions with trained models)
Lesson 67Compute Optimized Instance Types
Machine learning models
analyze your historical billing data to understand patterns:
Lesson 2987Cost Anomaly Detection Systems
MACsec
(Layer 2 encryption) for physical link protection.
Lesson 2223Private Connectivity Security
Magnetic/HDD storage
Slowest option, lowest cost, only for archival or rarely-accessed data
Lesson 454Database Storage Performance
Maintain existing keys
created in on-premises HSMs without re-encrypting data
Lesson 2293Key Import and External Key Stores
Maintain legacy systems
in private infrastructure while modernizing with public cloud services
Lesson 22Hybrid Cloud Deployment Model
Maintain service continuity
during the transition
Lesson 2514Strangler Fig Pattern for Migration
Maintaining stateful connections
between clients and backend services
Lesson 525WebSocket API Support
Maintenance
Update all instances by updating the StackSet
Lesson 883StackSets Fundamentals
Maintenance mode
`kubectl taint nodes worker-03 maintenance=true:NoExecute` (evicts running pods immediately)
Lesson 1362Applying Taints to Nodes
Maintenance mode pages
during updates
Lesson 1229Default Backend Configuration
Maintenance operations
– Planned updates that require instance restart
Lesson 416Multi-AZ Failover Process
Maintenance schedules
Plan proactive maintenance before expected failures
Lesson 2413Mean Time Between Failures (MTBF)
Maintenance window
A weekly time slot (e.
Lesson 413Maintenance Windows and Updates
Major upgrades
may take longer and require testing first, so you typically trigger them manually after validating compatibility.
Lesson 413Maintenance Windows and Updates
Major version upgrades
Manual control over big jumps (like PostgreSQL 13 → 14)
Lesson 413Maintenance Windows and Updates
Make decisions
(branch based on input data)
Lesson 2516Step Functions and State Machines
Make every alarm actionable
Each alert should answer: "What do I do about this?
Lesson 651Alarm Best Practices and Anti-Patterns
Make operations naturally idempotent
Some operations are inherently safe to repeat—like setting a value to a specific state (`SET status = 'complete'`) rather than incrementing it (`clicks = clicks + 1`).
Lesson 503Idempotency in Functions
Malformed messages
Invalid JSON or missing required fields
Lesson 553Dead Letter Queues
Malware scanning
examines images for known malicious code, trojans, or backdoors that might have been introduced through compromised base images or dependencies.
Lesson 1083Malware and Secret Scanning
Malware signatures
and suspicious patterns
Lesson 1679Artifact Security Scanning
Manage configuration changes
over time through your code
Lesson 753When to Use Resources vs Data Sources
Manage lifecycle
Monitor health, apply updates, and scale runner pools as needed
Lesson 1720Self-Hosted Runners
Manage self-hosted runners
(list, register, remove)
Lesson 1724GitHub Actions APIs and Webhooks
Managed caching
Replacing self-hosted Redis with ElastiCache or Azure Cache
Lesson 2793Replatform Strategy
Managed database services
Migrating from self-managed MySQL to Amazon RDS or Azure Database for MySQL
Lesson 2793Replatform Strategy
Managed infrastructure
No servers to patch or scale
Lesson 1812CodeBuild: Managed Build Service Overview
managed instance group (MIG)
uses your template to create and manage a collection of identical VMs.
Lesson 103GCP Instance Groups and TemplatesLesson 326GCP Managed Instance Groups (MIG) Overview
Managed Node Groups
are AWS-operated EC2 instances that EKS provisions, updates, and terminates for you.
Lesson 1464EKS Node Groups: Managed vs Self-ManagedLesson 1471EKS Cluster Upgrades
Managed relational database services
(like AWS RDS, Azure SQL Database, or Google Cloud SQL) are databases provided as a service by your cloud provider.
Lesson 396Introduction to Managed Relational Databases
Managed rule groups
are pre-built, vendor-maintained collections (from AWS or marketplace sellers) that protect against common threats like SQL injection, cross-site scripting, or bot traffic.
Lesson 2369AWS WAF Rules and Rule Groups
Managed Service Enhancements
Cloud providers add IAM integration (AWS), Azure AD authentication, and VPC peering to strengthen access control beyond basic passwords.
Lesson 2696Cache Security and Access Control
Managed services
like AWS API Gateway, Azure API Management, or Google Cloud Armor can handle this coordination automatically without requiring you to manage Redis clusters.
Lesson 2747Distributed Rate Limiting
Managed session services
Cloud-native services specifically designed for session management
Lesson 2468State Externalization Patterns
Managed state service
(DynamoDB with TTL)
Lesson 2506Circuit Breaker for Functions
Management (Control) Plane
Administrative actions that *configure* resources
Lesson 2352Management vs Data Event Logging
Management and monitoring tools
Lesson 2799TCO Analysis for Migration
Management Groups
– The top level, containing multiple subscriptions.
Lesson 386Azure RBAC FundamentalsLesson 2147Multi-Account Cost Consolidation
Management Zone
Administrative tools isolated from production traffic
Lesson 2840Network Segmentation ArchitectureLesson 2841Security Boundaries and Trust Zones
Manages
the lifecycle of resources on that platform
Lesson 724Installing Terraform and Provider Basics
Manages the keys separately
, often using envelope encryption where the DEK itself is encrypted by a Key Encryption Key (KEK)
Lesson 2297Client-Side Encryption
Managing connection lifecycle
(connect, message, disconnect events)
Lesson 525WebSocket API Support
Managing Variables
The `/projects/:id/variables` endpoint allows you to create, update, or delete CI/CD variables programmatically—useful when credentials rotate or configurations change.
Lesson 1769GitLab CI API and Automation
manifest
a detailed snapshot of what was deployed at that moment.
Lesson 944Viewing Manifests and Deployment StateLesson 1070Image Manifest and Layers
Manifest Generation
CI pipeline runs scripts (using tools like `kustomize`, `helm template`, or custom scripts) to generate Kubernetes manifests with the correct image tags, environment-specific values, and configuration
Lesson 1876GitOps Workflow Automation
manifest list
(also called an "image index") is a special pointer that sits above individual architecture-specific images.
Lesson 984Multi-Architecture ImagesLesson 996Multi-Architecture Images
manual approval gate
is a deliberate pause point in your automated pipeline where execution stops until a human reviewer explicitly gives permission to continue.
Lesson 1662Manual Approval GatesLesson 1725Deployment Strategies and Blue-Green Patterns
Manual Approval Gates
(which pause before deploying) by adding automated safety checks *after* deployment.
Lesson 1663Rollback and Recovery PatternsLesson 1725Deployment Strategies and Blue-Green Patterns
Manual cleanup
Use build steps to remove unnecessary files with shell commands
Lesson 1780Workspace Management and Build Artifacts
Manual entry
You click a timestamp and add a description
Lesson 2000Annotations and Time Range Controls
Manual gate
Human approval required before production
Lesson 1651Environment Promotion Strategies
Manual injection
uses the `istioctl kube-inject` command to modify your deployment YAML before applying it to the cluster.
Lesson 1579Sidecar Injection Mechanisms
Manual intervention
Flag for human review when automatic compensation isn't possible
Lesson 2735Compensating Transactions
Manual jobs
require a human to click "Play" in the GitLab interface before they run—perfect for approval gates before production releases.
Lesson 1753Manual and Delayed Jobs
Manual re-run
Trigger a workflow again from the UI even if it succeeded
Lesson 1696Workflow Run History and Re-runs
Manual review
Alert teams to review and approve fixes
Lesson 842Drift Detection and Remediation
Manual rotation
requires you to explicitly create a new key, update references in your applications, re-encrypt data (if needed), and eventually disable old keys.
Lesson 2287Key Rotation FundamentalsLesson 2304Encryption Key Rotation Strategies
Manual scaling
works for predictable, infrequent changes — like adding capacity before a scheduled sale event.
Lesson 287Auto Scaling vs Manual Scaling
Manual suppression
Disable specific alarms before starting work, re-enable after
Lesson 648Alarm Suppression and Maintenance Windows
Manual work
Username/password is quickest
Lesson 1068Registry Authentication Methods
map
is like a dictionary—a collection of key-value pairs where you look up values by their descriptive names.
Lesson 734Lists and Maps in HCLLesson 2521Parallel and Map States
Map state
iterates over an array and processes each item in parallel (within concurrency limits).
Lesson 2521Parallel and Map States
Map to cloud constructs
Translate to actual service properties
Lesson 2337Compliance Requirements Translation
Map to IT systems
Which applications, databases, and services support each process?
Lesson 2410Business Impact Analysis (BIA)
Map-reduce operations
Parallel computation followed by result merging
Lesson 2503Fan-Out/Fan-In Pattern
MapName
– which mapping to search
Lesson 871Fn::FindInMap Function
Mappings
Static lookup tables within your template.
Lesson 847Template Structure and Sections
Mappings section
in CloudFormation lets you define a two-level lookup table of static values.
Lesson 870Mappings Section
maps
when you need descriptive labels—like environment-specific settings or tag values.
Lesson 734Lists and Maps in HCLLesson 757Variable Types: Complex Types
Maps dependencies
– which apps talk to which databases, which services depend on which infrastructure
Lesson 2797Migration Assessment Framework
Mark it
on your diagram (often with a red icon or highlight)
Lesson 2450Single Points of Failure Identification
Mark rooms as "deprecated"
(soft deletes) — forward compatible; new data doesn't require old fields
Lesson 2638Schema Evolution and Versioning
Market Internally
Developers won't use what they don't understand.
Lesson 2938Platform as a Product Mindset
Marketing analytics
Important → RTO: 24 hours, RPO: 4 hours
Lesson 2410Business Impact Analysis (BIA)
Marketing campaigns
– Known traffic surges from ads or email blasts
Lesson 2676Cache-Warming and Preloading
Masked variables
hide their values in job logs, replacing them with `[masked]`.
Lesson 1763Custom CI/CD Variables and Inheritance
Match (Output)
Where logs go next—Elasticsearch, S3, another Fluentd, or multiple destinations simultaneously.
Lesson 2026Fluentd Configuration and Parsing
Match environment separation strategies
(not accidentally deploying to production)
Lesson 715Code Review and Peer Validation
Math functions
`ROUND()`, `MOD()`, `SQRT()`
Lesson 2666BigQuery Standard SQL and Functions
Math operations
Calculate ratios, percentages, or custom metrics
Lesson 682GCP Monitoring Query Language
Matrix
Multi-environment deployments where every app should exist in every cluster
Lesson 1910Matrix and Merge Generators
matrix build
expands a single pipeline definition into many parallel jobs by testing every combination of specified parameters—like operating systems, language versions, or environment configurations.
Lesson 1660Matrix Build PatternLesson 1709Matrix Builds for Parallel TestingLesson 1713Matrix Builds and Parameterization
Matrix generator
combines two or more generators by creating every possible combination (Cartesian product).
Lesson 1910Matrix and Merge Generators
Matrix-based Security
provides a spreadsheet-like grid where you assign specific permissions (read, build, configure) to individual users.
Lesson 1781Jenkins User Management and Security
Mature cloud operations teams
experienced with at least one cloud provider
Lesson 2763Evaluating When Multicloud is the Right Strategy
Maturity
Battle-tested since 2011 with a massive community
Lesson 1770Introduction to Jenkins and CI/CD Automation
Max Age
How long browsers cache preflight responses (in seconds)
Lesson 542API Gateway CORS Configuration
Max Connections
The maximum number of HTTP/TCP connections the pool will maintain to a destination service.
Lesson 1613Connection Pool Management
Max delay cap
prevent waiting hours (e.
Lesson 2590Retry Pattern with Exponential Backoff
Max log file size
How large a single log file grows before rotation (e.
Lesson 1436Log Rotation and Storage
Max log files
How many rotated copies to retain (e.
Lesson 1436Log Rotation and Storage
Max Pending Requests
How many requests can wait in queue when all connections are busy.
Lesson 1613Connection Pool Management
Max Requests Per Connection
Limits concurrent requests on a single connection (HTTP/2 and gRPC support multiplexing many requests over one connection).
Lesson 1613Connection Pool Management
Max surge
How many *extra* instances can exist temporarily during the update (e.
Lesson 328MIG Rolling Updates and Canary Deployments
Max TTL
The maximum duration a lease can be renewed to
Lesson 2265Vault Leases and Revocation
Max unavailable
How many instances can be offline simultaneously (e.
Lesson 328MIG Rolling Updates and Canary Deployments
MaxAttempts
how many times to retry
Lesson 2520Error Handling in State Machines
Maximum = 10 waiters
(your dining room physically can't accommodate more)
Lesson 292Minimum, Maximum, and Desired Capacity
Maximum connections
Cap to prevent resource exhaustion
Lesson 2234Connection Pooling and Keep-Alive
Maximum event age
How long to keep retrying before abandoning the event
Lesson 488Function Error Handling and Retries
Maximum instances
Cost/resource ceiling (e.
Lesson 327MIG Autoscaling Configuration
Maximum receive count
How many times a message can be delivered before moving to DLQ (e.
Lesson 2714Dead Letter Queues
Maximum retry attempts
(typically 2-3 times)
Lesson 2551Asynchronous Processing Patterns
Maximum storage limit
The ceiling the database can grow to (prevents runaway costs)
Lesson 401Storage Autoscaling
Maximum Transmission Unit (MTU)
is the largest size (in bytes) of a single network packet that can be sent across a connection.
Lesson 2229MTU and Jumbo Frames
Meaningful Conventions
In infrastructure monitoring, certain colors carry universal meaning:
Lesson 2105Color Theory and Accessibility
Meaningful metrics
answer critical questions:
Lesson 2102Metric Selection and Relevance
Measurable
Compare conversion rates, engagement, or performance across cohorts
Lesson 1608A/B Testing and Experimentation
Measure everything
Track actual RTO/RPO achieved, recovery steps completed, team coordination time, and automation effectiveness.
Lesson 2442DR Testing Scenarios
Measure Success
Track metrics like adoption rate, time-to-first-deployment, support tickets, and Net Promoter Score (NPS).
Lesson 2938Platform as a Product Mindset
Measured RTO and RPO
versus targets
Lesson 2447Compliance and DR Documentation
Measurement Window
Specify how long you observe to confirm steady state—typically 5-15 minutes before introducing chaos.
Lesson 2492Steady State Hypothesis
Measuring Lag
Monitor the time gap between when events are published and when consumers process them.
Lesson 581Event-Driven Monitoring and Observability
Measuring RTO
Track how long it actually takes from failure detection to full service restoration.
Lesson 2488Failover Testing and Validation
Media files
Photos, videos, and audio that don't change frequently
Lesson 115Object Storage Overview
Media types
The format of each component (e.
Lesson 980Image Manifest and Metadata
Medium
(7 GB RAM, 4 vCPUs): Standard application builds
Lesson 1823CodeBuild Build Environments and Images
Medium (4.0–6.9)
Moderate risk, should be addressed in regular cycles
Lesson 1075Vulnerability Severity and Prioritization
Medium resolution
(1-minute averages): Keep for 7 days
Lesson 634Metric Aggregation and Resolution
Medium retention (days)
For business transactions that need time for processing and retries but eventually become irrelevant
Lesson 565Message Retention and Expiration
Medium scope, moderate speed
Integration tests check how multiple components work together—databases connecting to APIs, microservices communicating, configuration loading correctly.
Lesson 1649Automated Testing in CI/CD
Medium windows (1-24 hours)
Daily patterns, incident investigation
Lesson 2104Time Series and Temporal Context
Medium-traffic services
with known dependencies
Lesson 1575Service Mesh Adoption Strategies
Meet business requirements
for uptime
Lesson 414RDS High Availability Overview
Meet compliance requirements
by keeping regulated data on-premises while using public cloud for general workloads
Lesson 22Hybrid Cloud Deployment ModelLesson 213Network Security Logging and Monitoring
Meet data residency requirements
Store European customer data in AWS's Frankfurt region, Chinese data in Alibaba Cloud's Beijing region, and Australian data in Azure's Sydney region—all within a single architecture.
Lesson 2755Multicloud Benefits: Geographic and Regulatory Coverage
Meet regulatory requirements
that mandate specific key generation processes or custody
Lesson 2293Key Import and External Key Stores
Meeting data residency requirements
by keeping certain data within specific geographic boundaries
Lesson 25Edge and Distributed Cloud
Memory
Set maximum RAM usage (e.
Lesson 964Resource Limits with cgroups
Memory (RAM)
Space for caching data and active connections
Lesson 399Database Instance Classes
Memory allocation
(more memory = faster CPU initialization)
Lesson 491Cold Start FundamentalsLesson 2543Cold Start Fundamentals
Memory breakdown
(active, buffered, cached, free)
Lesson 411Enhanced Monitoring
Memory buffers
Fast but lost on crash
Lesson 2024Fluentd Architecture and Design
Memory exhaustion
Unbounded queues consume all available RAM
Lesson 2740Understanding Backpressure in Distributed Systems
Memory management
Memcached uses a slab allocator with LRU eviction; Redis is more flexible
Lesson 2689Memcached Fundamentals
Memory overhead
A VM typically requires 1-2 GB just for the guest operating system before running any application.
Lesson 966Density and Resource Efficiency
Memory pressure
occurs when a node's total available memory drops below a threshold—regardless of individual container limits.
Lesson 1341OOMKilled and Memory Pressure
Memory Pressure Eviction
The *entire node* is low on memory → pods evicted based on priority
Lesson 1341OOMKilled and Memory Pressure
Memory provisioned
(allocated RAM, even if unused)
Lesson 2553Cost Monitoring and Analysis
Memory requests and limits
(aggregate total)
Lesson 1337Resource Quota Basics
Memory security
Keys in RAM are vulnerable to memory dumps
Lesson 2305Data Key Caching Pattern
Memory-hungry applications
(databases, in-memory caches, real-time analytics) → **Memory Optimized** instances deliver large RAM allocations without overpaying for unused CPU.
Lesson 78Choosing Instance Types for Your Workload
Memory-intensive workloads
(databases, caching) need memory-optimized instances
Lesson 1508Node Pool Management
MEMORY(bytes)
Actual memory consumption in mebibytes (Mi)
Lesson 1448kubectl top Command
Memory/CPU limits
Containerized services get resource quotas via Kubernetes
Lesson 2583Bulkhead Pattern for Isolation
MEMORY%
Percentage of the node's total memory being used
Lesson 1448kubectl top Command
Merge
Applying progressive overrides (base config → cluster overrides → environment overrides)
Lesson 1910Matrix and Merge GeneratorsLesson 1999Transformations and Data Processing
Merge generator
combines generators sequentially, with later generators overriding parameters from earlier ones.
Lesson 1910Matrix and Merge Generators
Merge request approvals
require senior engineers to review infrastructure changes before they deploy
Lesson 1874GitOps Access Control
Mesh-wide
Default policy for everything
Lesson 1621Enabling mTLS in Istio
Message
A unit of data or work to be processed
Lesson 550Message Queue Fundamentals
message attributes
(key-value pairs like `"event_type": "order_placed"` or `"region": "us-west-2"`).
Lesson 558SNS Message FilteringLesson 563Message Attributes and Metadata
Message becomes invisible
Other consumers can't see this message
Lesson 2713Message Visibility and Acknowledgment
Message broker
receives and stores the event
Lesson 2578Event-Driven Communication
Message brokers
(like Amazon Kinesis, Apache Kafka, or Azure Event Hubs) sit between producers and consumers, providing:
Lesson 2602Streaming Architecture Patterns
Message Group IDs
partition FIFO queues into logical streams.
Lesson 2718Message Ordering and Partitioning
Message queue events
When messages arrive in SQS or EventBridge, process them asynchronously with lambda functions.
Lesson 2501Event-Driven Invocation Pattern
Message routing
Messages flow bidirectionally—client-to-server and server-to-client through the same connection
Lesson 543WebSocket APIs
Message timers
provide finer control—you set the delay on *individual messages* rather than the entire queue.
Lesson 2723Delay Queues and Message Timers
Message Visibility
When a consumer retrieves a message, it becomes invisible to other consumers during processing (preventing duplicate work)
Lesson 2720Competing Consumers Pattern
Messages
are the units of data being transmitted.
Lesson 2710Message Queue Fundamentals Revisited
Meta-arguments
are special Terraform keywords that work across all resource types to control behavior:
Lesson 729Resource Blocks and Meta-Arguments
Metadata concealment
Prevents pods from accessing sensitive instance metadata by default (via Workload Identity)
Lesson 1488GKE Security: Private Clusters and Hardening
metadata service
is a special HTTP endpoint available from inside your EC2 instance at `http://169.
Lesson 95AWS EC2 User Data and Metadata ServiceLesson 358Instance Profiles and Metadata
Metadata Tagging
Apply environment-specific tags like `dev-approved`, `qa-passed`, or `prod-ready`
Lesson 1676Artifact Promotion Patterns
Metaspace
Allocate sufficient space for plugin classes (`-XX:MaxMetaspaceSize=512m`)
Lesson 1806Performance Tuning and Resource Management
Method-level
stricter limits on expensive operations
Lesson 2540Serverless API Rate Limiting and Throttling
Method-level limits
Fine-grained control per endpoint
Lesson 539API Gateway Throttling and Rate Limits
Method-level throttling
Apply different limits to specific API methods
Lesson 2750Cloud Provider Rate Limiting Services
metric
in CloudWatch is a time-ordered set of data points—think of it as a variable being tracked over time (CPU usage, disk I/O, request count).
Lesson 669CloudWatch Metrics and NamespacesLesson 682GCP Monitoring Query LanguageLesson 1997Query Builder and Query Editor
Metric aggregation
is the process of combining multiple raw data points into summary statistics over time intervals (like taking 60 one-second measurements and creating a single one-minute average).
Lesson 634Metric Aggregation and Resolution
Metric breach frequency
How often does your chosen metric (CPU, memory, custom) cross thresholds?
Lesson 312Scaling Policy Monitoring
Metric Cardinality
Limit label dimensions.
Lesson 1643Observability Performance Impact
Metric source
What are you watching?
Lesson 639Introduction to Alarms and Alerting
Metric-based scaling
adjusts capacity based on real-time performance data (like CPU usage, memory, or network traffic).
Lesson 322VMSS Scaling Policies and Rules
Metrics Collection
involves tracking key performance indicators like build queue length, executor utilization, agent availability, job success/failure rates, and build duration trends.
Lesson 1807Monitoring and Alerting for Jenkins
Metrics Explorer
lets you build charts by selecting a resource type (like Compute Engine VM), choosing a metric (CPU utilization), and applying filters.
Lesson 680Cloud Monitoring in GCP
Metrics Server
(via the Resource Metrics API) to collect current resource utilization for pods.
Lesson 1449Horizontal Pod Autoscaler (HPA) Fundamentals
Metrics unavailable
Verify Metrics Server is running with `kubectl top nodes`
Lesson 1459Autoscaling Best Practices and Troubleshooting
Metrics-based identification
Monitor CloudWatch, Azure Monitor, or GCP metrics for resources with sustained low utilization (e.
Lesson 2160Idle Resource Detection
MFA Delete
adds a critical safety layer: before permanently deleting a version or suspending versioning on a bucket, you must provide a code from a physical multi-factor authentication device (like a key fob or authenticator app).
Lesson 157Versioning Lifecycle and MFA Delete
MFA requirement
– Whether they must use multi-factor authentication
Lesson 346Creating and Managing User Identities
Micro-segmentation
applies security policies at the workload or individual resource level, not just the network perimeter.
Lesson 2391Micro-Segmentation vs Traditional SegmentationLesson 2394Identity as the PerimeterLesson 2400Software-Defined Perimeter (SDP)
Microservice coordination
Lightweight event propagation without heavy message broker infrastructure
Lesson 2685Redis Pub/Sub and Messaging
Microservices
with typical resource needs
Lesson 66General Purpose Instance Types
Microservices mode
Every component runs independently with dedicated replicas.
Lesson 2035Loki Components and Deployment Modes
Microsoft edge routers
Azure's gateway into their global network
Lesson 2215Azure ExpressRoute Fundamentals
Microsoft-backed
Originally developed and contributed to CNCF by Microsoft, with strong Azure integration
Lesson 1596Open Service Mesh (OSM) Basics
Middle floors
Template-based deployments with some customization options
Lesson 2920Abstraction Levels and User Personas
Middle layers add dependencies
– language runtimes, frameworks
Lesson 981Layer Order and Dependencies
Middle tier
(optional): Regional Prometheus instances aggregate metrics from their zone
Lesson 1979Prometheus Federation Basics
Middleware services
databases, message queues, and caching layers are integrated
Lesson 14Platform as a Service (PaaS) Overview
Migrate from in-tree
if you're using deprecated provisioners
Lesson 1316Provisioner Selection and Configuration
Migrate MongoDB workloads
to the cloud without rewriting application code
Lesson 442DocumentDB and MongoDB-Compatible Services
Migrate workloads
by simply redeploying the same gateway configuration to a different cloud's Kubernetes cluster
Lesson 2772API Gateway Abstraction
Migration
Snapshots let you move volumes between availability zones or regions for better performance or compliance requirements.
Lesson 131Volume Snapshots
Migration flexibility
Organizations can gradually migrate from one provider to another or run parallel environments during transitions.
Lesson 2751What is Multicloud and Why Organizations Adopt It
Migration is likely
Business strategy includes eventual cloud changes
Lesson 2777Lock-In vs Portability Trade-offs
Migration waves and phases
Track which applications are in assessment, planning, execution, or validation.
Lesson 2818Migration Progress Tracking and Reporting
Millicore notation
`500m` (500 millicores)
Lesson 1330CPU Resource Units
Min/max constraints
– Reject pods that ask for too much or too little
Lesson 1338LimitRange Objects
Min/max limits
Set guardrails to prevent runaway costs or insufficient capacity
Lesson 2155Auto Scaling for Cost Efficiency
Minimal downtime
Continuous replication until cutover
Lesson 2806Database Migration Service Fundamentals
Minimal images
(`alpine`, `scratch`) reduce size and attack surface but may lack tools
Lesson 1001FROM: Base Image Selection
Minimal lag
changes typically replicate within seconds
Lesson 2825Continuous Data Replication for Databases
Minimal ports
(only the ports your service actually uses)
Lesson 212Least Privilege Network Access
Minimal resource footprint
Critical for edge devices and dense container environments
Lesson 2027Fluent Bit for Edge Collection
Minimize cold starts
Keep functions warm with provisioned concurrency only for latency-sensitive workloads
Lesson 2983Serverless Cost Optimization Patterns
Minimize cross-environment calls
Group tightly-coupled applications into the same migration wave to avoid chatty cross-cloud communication
Lesson 2829Dependency Mapping and Migration Order
Minimize data loss
during unexpected outages
Lesson 414RDS High Availability Overview
Minimize global scope work
Initialize only what's needed for each request, not on every cold start.
Lesson 622Edge Function Performance Optimization
Minimize redundant overhead
Shared control planes, monitoring agents, and base OS instances
Lesson 2164Multi-Tenancy and Resource Sharing
Minimize risk
by migrating small, isolated features first
Lesson 2514Strangler Fig Pattern for Migration
Minimum = 2 waiters
(you never operate with fewer, even on slow days)
Lesson 292Minimum, Maximum, and Desired Capacity
Minimum connections
Always kept warm and ready
Lesson 2234Connection Pooling and Keep-Alive
Minimum instances
Never scale below this (e.
Lesson 327MIG Autoscaling Configuration
Minimum team size
At least 4-6 engineers to avoid excessive frequency
Lesson 2127On-Call Rotation Structures
MinLength/MaxLength
for strings, **MinValue/MaxValue** for numbers, and **AllowedPattern** for regex validation.
Lesson 861Parameters Section Deep Dive
Minor updates
often require brief reboots (1–3 minutes).
Lesson 413Maintenance Windows and Updates
MinValue/MaxValue
for numbers, and **AllowedPattern** for regex validation.
Lesson 861Parameters Section Deep Dive
Miss
Cache loads from data store, stores in cache, returns to application
Lesson 2700Read-Through Caching Pattern
Missing resource limits
Set memory limits on the Collector to prevent runaway consumption
Lesson 2087Best Practices and Performance Considerations
Missing routes
No path defined to a subnet or external destination
Lesson 2190Route Table Verification
Missing security controls
Unencrypted databases or logging disabled
Lesson 722IaC Security Scanning
Mission-critical data
High-availability tier with strict reclaim policies
Lesson 1314Multiple StorageClasses Strategy
Mixed server sizes
Weighted distribution.
Lesson 240Load Balancing Algorithms
ML-based analysis
Algorithms identify patterns and predict optimal sizing based on historical trends, not just point- in-time snapshots
Lesson 2979Right-Sizing at Scale with Automation
Mobile apps
need smaller payloads to conserve bandwidth and battery
Lesson 2577Backend for Frontend (BFF) Pattern
Mocking
replaces actual cloud provider APIs with fake implementations that return predetermined responses.
Lesson 2881Mocking and Stubbing Infrastructure
Mode mismatches
occur when one service expects mTLS (STRICT) but another sends plaintext (PERMISSIVE or disabled).
Lesson 1630mTLS Troubleshooting and Verification
Moderate complexity
, better TCO than lift-and-shift.
Lesson 2819Database Migration Strategies Overview
Moderate settings
(3 out of 5) offer a practical middle ground for most scenarios
Lesson 642Alarm Evaluation Periods and Datapoints
Modification opportunities
Can underused RIs be converted to better-matched types?
Lesson 2976Reserved Instance Portfolio Management
Modify your template
with the desired changes
Lesson 878Stack Updates and Change Sets
Module composition
breaks monolithic configurations into reusable, tested modules that teams can independently maintain and version.
Lesson 831Scaling Challenges and Patterns
Module outputs
act as labeled windows into that box, letting you selectively share specific values (like resource IDs, IP addresses, or DNS names) with the calling configuration.
Lesson 803Module Output Values
MongoDB API
Compatible with MongoDB drivers and tools — migrate existing MongoDB apps without code changes
Lesson 436Azure Cosmos DB: Architecture and APIsLesson 2534Azure Cosmos DB Serverless
MongoDB compatibility
existing drivers, tools, and queries work with minimal changes
Lesson 442DocumentDB and MongoDB-Compatible Services
MongoDB-compatible managed services
databases that support MongoDB's query language and tools, but run on fully managed, cloud- native infrastructure.
Lesson 442DocumentDB and MongoDB-Compatible Services
Monitor
closely for errors or performance issues
Lesson 2826Database Cutover Planning
Monitor access logs
Enable CloudTrail or Azure audit logs to track who accessed or modified state files.
Lesson 797Remote State Best Practices
Monitor actual utilization
Regularly review your scaling metrics.
Lesson 311Scaling for Cost Optimization
Monitor and Adjust Continuously
Lesson 1343Right-Sizing Resources
Monitor and rollback
Watches for errors and can automatically revert if thresholds are breached
Lesson 1835Blue/Green Deployments with CodeDeploy
Monitor and validate
behavior matches expectations
Lesson 2514Strangler Fig Pattern for Migration
Monitor egress traffic
to identify unexpected spikes
Lesson 199Internet Connectivity Costs
Monitor Grafana itself
Track Grafana's own metrics (query duration, active users) to identify bottlenecks.
Lesson 2003Grafana Best Practices and Performance
Monitor index usage
Cloud databases provide metrics showing which indexes are actually used.
Lesson 448Index Design and Strategy
Monitor key usage
through IAM audit logs
Lesson 348Access Keys and Programmatic Access
Monitor metrics
(error rates, latency, business KPIs) for the canary
Lesson 1606Canary Deployments with Service MeshLesson 1665Canary Deployment Pattern
Monitor node utilization
Use Cloud Monitoring to identify underutilized nodes
Lesson 1489GKE Cost Optimization and Bin Packing
Monitor OOMKilled events
to detect undersized limits
Lesson 1335Setting Memory Limits
Monitor security
Detect unusual traffic patterns, port scanning attempts, or unauthorized access attempts.
Lesson 222VPC Flow Logs
Monitor the transition
Verify which services still use plaintext
Lesson 1622mTLS Migration Strategies
Monitoring and alerts
Track failure patterns and trends
Lesson 500Dead Letter Queues
Monitoring and Logging
Components like metrics-server collect resource usage data (CPU, memory) enabling features like autoscaling and capacity planning.
Lesson 1112Add-on Components and ExtensionsLesson 1505Managed Kubernetes Overview
Monitoring and Observability
You need separate monitoring tools for each provider—CloudWatch, Azure Monitor, Cloud Monitoring—or invest in unified third-party platforms that aggregate data, adding cost and integration points.
Lesson 2756Multicloud Challenges: Complexity and Management Overhead
Monitoring and Validation
DMS tracks replication lag, validates data integrity, and provides visibility into transfer progress— essential for the migration progress tracking you've learned about.
Lesson 2821Database Migration Service (DMS) Fundamentals
Monitoring boundaries
Set thresholds (latency > 2s, error rate > 1%, availability < 99.
Lesson 2493Blast Radius and Safety Controls
Monitoring layer
Logging, anomaly detection, intrusion detection systems
Lesson 2833Defense in Depth and Layered Security
Monitoring Options
Enable enhanced monitoring if needed
Lesson 402Creating and Launching RDS Instances
Monitoring replica health
means tracking:
Lesson 419Read Replica Lag and Consistency
Monitoring replication health
means actively tracking key indicators of the replication pipeline's performance and integrity, then alerting when thresholds are breached—before users experience impact.
Lesson 2489Monitoring Replication Health
Monitoring utilization metrics
– Track CPU usage, memory consumption, network throughput, and disk I/O over time
Lesson 79Cost Optimization with Right-Sizing
MonitoringTimeInMinutes
How long to watch alarms after stack operation begins (0-180 minutes)
Lesson 890Stack Rollback Configuration
Monitors execution
and alerts on issues
Lesson 2626Workflow Orchestration Tools
Monitors health
Continuously checks if containers are running and healthy
Lesson 1109Kubelet: The Node Agent
Monolithic mode
All components run in a single process.
Lesson 2035Loki Components and Deployment Modes
Monthly
Analyze trends, validate tagging, review reservation utilization
Lesson 2167Continuous Optimization Process
Monthly backups (Grandfather)
Keep for 1–7 years
Lesson 2420Backup Retention Policies
More etcd storage consumed
(etcd has limited capacity)
Lesson 1273Secret Size and Performance Limits
More frequent backup operations
consuming compute and bandwidth
Lesson 2409Relationship Between RTO, RPO, and Cost
More origin traffic
→ Slightly higher load
Lesson 587TTL and Cache Control Headers
More predictable performance
No "best effort" routing behavior
Lesson 2211Private Connectivity Overview
Mount external volumes
(complex for simple config)
Lesson 1247ConfigMap Fundamentals and Use Cases
Mount namespace
Each container has its own filesystem view.
Lesson 963Process Isolation with Namespaces
Move
the binary to a directory in your system's PATH (like `/usr/local/bin` on Linux/Mac or `C:\Windows\System32` on Windows)
Lesson 724Installing Terraform and Provider Basics
Mozilla SOPS
encrypts YAML/JSON files with keys from AWS KMS, Azure Key Vault, or GCP KMS.
Lesson 1941Secrets Management in Flux
Multi-AZ
roughly doubles your cost.
Lesson 417Multi-AZ vs Single-AZ Trade-offs
Multi-AZ approach
Servers in subnets across `us-east-1a`, `us-east-1b`, and `us-east-1c` — even if one AZ fails, servers in the other zones keep serving traffic.
Lesson 178Availability Zones and Subnets
Multi-AZ vs Multi-Region Trade-offs
Lesson 50Cost Optimization Through Architecture
Multi-Cloud Aggregation
If you operate across AWS, Azure, and GCP, visibility means bringing all spending into a unified view rather than juggling separate portals.
Lesson 2961Cost Visibility Fundamentals
Multi-cloud integration
Query datasets across AWS, Azure, or GCP without replication
Lesson 2668Query Federation and External Data
Multi-Cloud Support
Unlike cloud-specific tools, Terraform works across AWS, Azure, GCP, and hundreds of other providers.
Lesson 723What is Terraform and Why Use It
Multi-cluster DNS
Services automatically discoverable across clusters with federated DNS names
Lesson 1514Cluster Federation Basics
Multi-cluster GitOps
extends the GitOps principles you've learned to orchestrate deployments across all your clusters from one centralized Git repository.
Lesson 1871Multi-Cluster GitOps
Multi-cluster scheduling
Workloads placed based on cluster capacity, location, or policies
Lesson 1514Cluster Federation Basics
Multi-container pods
Specify which container's logs you need: `kubectl logs <pod-name> -c <container-name>`.
Lesson 1444Troubleshooting with Logs
Multi-Datacenter Support
Consul excels at spanning multiple data centers or cloud regions.
Lesson 1593Consul Service Mesh Fundamentals
Multi-dimensional metrics
using labels (e.
Lesson 1946What is Prometheus and Why It Matters
Multi-environment deployment
Deploy to dev, staging, and production regions simultaneously after approval.
Lesson 1845Parallel and Sequential Stage Execution
Multi-Factor Authentication
, federation becomes a cornerstone of Zero Trust architecture, treating **identity as the security perimeter**.
Lesson 2852Identity Federation and SSO
Multi-host connectivity
without manual network configuration
Lesson 1045Overlay Networks for Multi-Host
Multi-level attribute retrieval
Lesson 876Complex Function Nesting
Multi-level navigation
Overview → Service → Endpoint → Trace → Log line
Lesson 2109Contextual Links and Drill-Down
Multi-level partitioning
combines dimensions:
Lesson 2661Athena Partitioning Strategies
Multi-location
Circuits terminating at different cloud edge locations—protects against site-level outages.
Lesson 2220Private Connectivity Redundancy
Multi-Metric Correlation
Combine signals.
Lesson 457Monitoring and Alerting for Performance
Multi-platform builds
(Linux, Windows, macOS simultaneously)
Lesson 1792Parallel Stage Execution
Multi-protocol notifications
Send the same alert via email, SMS, and trigger a Lambda function simultaneously.
Lesson 557AWS SNS Topics and Subscriptions
Multi-provider backbone
Using different telco providers for physical transport—protects against carrier-specific issues.
Lesson 2220Private Connectivity Redundancy
Multi-region
deploys workloads across multiple geographic regions *within the same cloud provider*.
Lesson 2752Multicloud vs Hybrid Cloud vs Multi-Region
Multi-Region Active-Active Deployments
Lesson 2233Multi-Region Latency Optimization
Multi-region databases
Support encrypted database replication (Aurora Global, DynamoDB Global Tables)
Lesson 2312AWS KMS Multi-Region Keys
Multi-region deployments
for disaster recovery
Lesson 821Provider Aliases and Multi-Region Deployments
Multi-Region Keys
(from lesson 2292) let you create a primary key in one region with automatic replicas in others.
Lesson 2308Encryption in Multi-Region Architectures
Multi-Region Redundancy
Alert only when `Region-A-Down OR Region-B-Down` (but silence if both regions fail, since that might need a different escalation path).
Lesson 645Composite Alarms
Multi-service pattern
Detect all microservices in an `apps/` directory and deploy each.
Lesson 1908Git Generator Patterns
Multi-Stage Builds Synergy
Lesson 1022Minimizing Image Size
Multi-Step Tasks
define complex workflows in YAML, chaining together build, test, and push operations.
Lesson 1091ACR Tasks and Automated Builds
Multi-tenant authorization
Make decisions based on customer subscription levels
Lesson 1626External Authorization Integration
Multi-Tier Patterns
combine both types.
Lesson 233Load Balancer Placement Patterns
Multi-User Collaboration
As your team grows, IAM allows you to safely grant different levels of access without sharing root credentials or worrying about unauthorized changes.
Lesson 331What is IAM and Why It Matters
Multi-zone deployments
Distribute pods across availability zones for regional resilience
Lesson 1352Pod Anti-Affinity Basics
Multicloud
means using services from two or more cloud providers simultaneously—such as AWS, Azure, and Google Cloud—in a single IT environment.
Lesson 2751What is Multicloud and Why Organizations Adopt ItLesson 2752Multicloud vs Hybrid Cloud vs Multi-Region
Multicloud backup
means storing copies of your production data from one cloud (say, AWS) into another cloud's storage service (like Google Cloud Storage or Azure Blob Storage).
Lesson 2788Multicloud Backup and Archive
Multiplayer games
requiring low-latency player interactions
Lesson 525WebSocket API Support
Multiple alarms firing
When several target tracking or step scaling policies trigger simultaneously, each calculates its desired capacity independently, and the highest value is selected.
Lesson 305Multiple Scaling Policy Coordination
Multiple attack surfaces
Every service-to-service connection becomes a potential vulnerability
Lesson 1617Service Mesh Security Overview
Multiple compute instances
need simultaneous access to the same data
Lesson 123Comparing Storage Types: When to Use What
Multiple Consumers
Deploy several instances of your consumer application (e.
Lesson 2720Competing Consumers Pattern
Multiple declarations
You can call `WORKDIR` multiple times; each changes the context.
Lesson 1004WORKDIR: Setting Working Directory
Multiple files
Load several files into one Secret:
Lesson 1262Creating Secrets from Files
Multiple instances
of the same service make correlation impossible.
Lesson 2004Why Centralized Logging
Multiple Language Support
Run applications built in various languages and frameworks on the same platform without managing different VM images.
Lesson 101Azure App Service Overview
Multiple options
("Schedule on nodes with GPU *or* high memory")
Lesson 1346Node Affinity vs Node Selector
Multiple protocol support
(HTTP, TCP, UDP, gRPC)
Lesson 1233Gateway API Introduction
Multiple Queries
Combine data from Log Analytics, Application Insights, and Azure metrics in one place.
Lesson 678Azure Monitor Workbooks
Multiple read models
Create different views from the same events (analytics, search, reports)
Lesson 574CQRS Pattern with Events
Multiple recipients
Send alerts to email, SNS topics, or Chatbot integrations
Lesson 2170AWS Budgets and Alerts
Multiple replicas
You can create several replicas to scale further
Lesson 418Read Replicas for Scalability
Multiple tunnels
from your on-premises device to each cloud gateway
Lesson 2200High Availability VPN Connections
Multiple update layers
Running system updates across multiple layers instead of consolidating them.
Lesson 985Layer Size and Bloat
Multiple views
Create different read models from the same events (pairs well with CQRS)
Lesson 2596Event Sourcing Fundamentals
Multiple violation scenarios
Different ways rules can be broken
Lesson 2899Policy Testing and Validation
multiplexing
sending multiple requests and responses simultaneously over one TCP connection, rather than opening separate connections for each resource.
Lesson 254WebSocket and HTTP/2 SupportLesson 283HTTP/2 and gRPC Load Balancing
Mutate
Modify the request (add labels, inject sidecars, etc.
Lesson 1408Dynamic Admission Control
Mutating
admission controllers execute (in undefined order among themselves)
Lesson 1406Admission Controller Types
Mutating admission controllers
modify incoming API requests.
Lesson 1406Admission Controller Types
Mutating controllers
Modify requests before acceptance (example: "Inject a sidecar container automatically")
Lesson 1405Admission Control Overview
Mutual TLS (mTLS)
extends this by requiring both parties to present and verify digital certificates before establishing a connection.
Lesson 1618Mutual TLS (mTLS) Fundamentals
Mutual TLS encryption
between services
Lesson 1566The Sidecar Proxy Pattern

N

N-2 minor versions
of Kubernetes at any time.
Lesson 1501AKS Cluster Upgrades and Maintenance
N+1 redundancy
means having one extra unit beyond minimum requirements.
Lesson 2460Capacity Planning for High Availability
N+2 redundancy
adds two extra units, protecting against simultaneous failures in multiple fault domains.
Lesson 2460Capacity Planning for High Availability
Name and Region
What to call it and where it physically exists (e.
Lesson 174Creating a Virtual Network
Name-based matching
Find a resource by its exact name or name pattern
Lesson 750Data Source Arguments and Filters
Named groups
organize newer or specialized resources:
Lesson 1118API Groups and Versioning
named volumes
for easier management, but the Dockerfile's job is simply to declare "this path contains persistent data.
Lesson 1012VOLUME: Mount PointsLesson 1053Volume Management in Compose
Namespace prefixing
Group related events
Lesson 569Event Types and Naming Conventions
Namespace-based separation
is your first line of defense.
Lesson 2058Multi-Tenancy and Log Isolation
Namespace-level
Override for specific namespaces
Lesson 1621Enabling mTLS in Istio
Nano-services
(also called "micro-microservices") are excessively small services that do too little.
Lesson 2564Service Size and Granularity
NAT AMI
(Amazon Machine Image) that comes pre-configured with NAT software.
Lesson 195NAT Instance Basics
NAT gateways
, but the internet cannot initiate connections to them—adding a security layer.
Lesson 173Private IP Address Spaces (RFC 1918)
NAT instance
is simply a regular EC2 instance that you configure to perform network address translation for your private subnet resources.
Lesson 195NAT Instance BasicsLesson 197NAT Gateway vs NAT Instance
Native backup/restore
Use `pg_dump`/`pg_restore` for PostgreSQL, `mysqldump` for MySQL, or Oracle Data Pump
Lesson 2822Homogeneous Database Migration
Native clients
in various languages
Lesson 2091Zipkin Fundamentals
Native cloud integration
automatic backups, monitoring, IAM integration
Lesson 442DocumentDB and MongoDB-Compatible Services
Native Integration
Since it's built into GitHub, there's no need to configure webhooks or authenticate external services.
Lesson 1682What is GitHub Actions and Why Use ItLesson 1946What is Prometheus and Why It MattersLesson 2422Cloud-Native Backup Services Overview
Native Kubernetes integration
Reads container logs automatically
Lesson 2027Fluent Bit for Edge Collection
Native mode
for modern apps needing real-time features.
Lesson 440Google Cloud Firestore and Datastore
Natural data boundaries
– each service owns its entities
Lesson 2560Service Boundaries and Decomposition
Necessary protocols
(TCP, UDP, ICMP only when required)
Lesson 212Least Privilege Network Access
Need session persistence
IP hash.
Lesson 240Load Balancing Algorithms
Negotiating leverage matters
Ability to switch clouds improves contract terms
Lesson 2777Lock-In vs Portability Trade-offs
Nested operations
(children within children)
Lesson 2063Spans and Span Relationships
Nested stacks
let you organize complex infrastructure by creating a hierarchy: a parent stack references child stack templates, each handling a specific component.
Lesson 881Nested Stacks
Nested structure
(for complex value hierarchies)
Lesson 1558Helm Schema Validation
NetBIOS settings
– For Windows networking compatibility
Lesson 227DHCP Options Sets
Network Abstraction
Abstract VPCs, subnets, security groups, and load balancers into provider-agnostic constructs.
Lesson 2766Infrastructure Abstraction Patterns
Network ACL
(Access Control List) is a stateless firewall that operates at the **subnet boundary**.
Lesson 206Network ACL Fundamentals
Network ACLs are stateless
they evaluate inbound and outbound rules independently.
Lesson 209Ephemeral Ports in Network Security
Network address
(first IP) - Identifies the subnet itself
Lesson 179Reserved IP Addresses in Subnets
Network Address Translation (NAT)
acts as a middleman between your private resources and the internet.
Lesson 185Network Address Translation (NAT) Preview
Network bottlenecks
Consumer acknowledgments are delayed, but producers keep publishing
Lesson 2740Understanding Backpressure in Distributed Systems
Network Chaos
tests connectivity and **Compute Chaos** tests resource limits, **Application and State Chaos** targets the application layer itself.
Lesson 2497Application and State Chaos
Network congestion
on different paths
Lesson 586CDN Request Flow and Routing
Network connectivity checks
Can we reach the host?
Lesson 2482Failover Detection Mechanisms
Network connectivity loss
– Primary can't communicate with the monitoring system
Lesson 416Multi-AZ Failover Process
Network Control
Registry access follows your existing firewall and security group rules
Lesson 1098Private Registry Endpoints
Network dependencies
Which applications talk to which services?
Lesson 2798Application Discovery and Dependencies
Network efficiency
Better utilization of available bandwidth
Lesson 166Multipart Upload
Network failures
force you to restart from scratch
Lesson 166Multipart Upload
Network fencing
Revoke network access to storage or databases
Lesson 2485Split-Brain Prevention
Network firewalls
ask: "Is this traffic from an allowed IP?
Lesson 2364What is a Web Application Firewall (WAF)
Network I/O
Control bandwidth (with additional tools)
Lesson 964Resource Limits with cgroups
Network Intelligence Center
, offering **Connectivity Tests** (similar to AWS Reachability Analyzer), **Performance Dashboard** (packet loss and latency metrics), and **Firewall Insights** (identifies shadowed or unused firewall rules).
Lesson 2194Provider-Specific Network Insights
Network interface level
Single instance monitoring
Lesson 213Network Security Logging and Monitoring
Network interfaces
you explicitly created
Lesson 85VM Termination and Deletion
Network isolation
High-speed, low-latency connections link AZs within a region, but failures don't cascade
Lesson 2454Availability Zones and Data Center DistributionLesson 2696Cache Security and Access Control
Network latency
Increase `timeoutSeconds: 3` for remote checks
Lesson 1426Probe Timing Parameters
Network Load Balancer (NLB)
works at the **transport layer** (OSI Layer 4), handling raw TCP and UDP connections.
Lesson 261What is a Network Load Balancer (NLB)?
Network Load Balancers
uniquely support **static IP addresses** — one per availability zone.
Lesson 266Static IP and Elastic IP Support
Network Load Balancers (NLB)
handle gRPC differently:
Lesson 283HTTP/2 and gRPC Load Balancing
Network Load Balancers (NLBs)
operate at the transport layer (OSI Layer 4).
Lesson 235Network Load Balancers (Layer 4)
Network namespace
Containers get their own network stack—separate IP addresses, routing tables, and firewall rules.
Lesson 963Process Isolation with NamespacesLesson 1148Multi-Container PodsLesson 1403Host Namespaces and Ports
Network partitions
Isolated pods can't reach the CA for renewal
Lesson 1628Certificate Rotation and Expiry
Network Path Quality
Public internet routes are unpredictable.
Lesson 2789Network Performance and Latency Considerations
Network performance
Speed of data transfer to applications
Lesson 399Database Instance ClassesLesson 2230Network Placement Groups
Network plugins
Managing networking on every node (like Calico or Weave)
Lesson 1185DaemonSet FundamentalsLesson 1394Privileged Containers
Network routing
Configuring private endpoints or VPN connections between cloud networks to securely transfer images
Lesson 1099Cross-Provider Registry Integration
Network traffic
between availability zones, regions, or out to the internet incurs standard AWS data transfer charges.
Lesson 1474EKS Pricing and Cost Considerations
Network translation
Since services have different private IP schemes per cloud, your discovery mechanism must return the correct endpoint—whether that's a public IP, VPN gateway address, or load balancer DNS name.
Lesson 2784Multicloud Service Discovery
Network Watcher
includes tools like **IP Flow Verify** (checks if traffic is allowed to/from a VM), **Next Hop** (shows routing decisions), and **Connection Monitor** (tracks connectivity and latency over time).
Lesson 2194Provider-Specific Network Insights
Network-based controls
(restrict access by IP or network)
Lesson 122Storage Security Basics
Network-based IDS (NIDS)
watches network traffic flowing between resources—like a security camera monitoring hallways.
Lesson 2867Intrusion Detection Systems (IDS) in Cloud
Networking decisions
– CNI plugins (sometimes), ingress controllers, service mesh
Lesson 1505Managed Kubernetes Overview
NetworkPolicy
is a Kubernetes resource that acts like a firewall for your pods.
Lesson 1234NetworkPolicy Fundamentals
Never commit state files
Add `*.
Lesson 797Remote State Best Practices
Never delete or modify
past events — only add new ones
Lesson 573Event Sourcing Fundamentals
Never hardcode keys
in your application code or commit them to version control
Lesson 348Access Keys and Programmatic Access
Never remove
existing fields without deprecation
Lesson 570Event Schema Design
Never use in production
it prioritizes convenience over performance and security.
Lesson 1586Istio Configuration Profiles
New applications
with unknown workloads
Lesson 2532DynamoDB Capacity Modes
New connection arrives
→ NLB calculates flow hash
Lesson 264NLB Connection Handling
New Features
Adding a new projection or read model?
Lesson 2731Event Replay and Reprocessing
New instance launches
→ ASG automatically registers it with the load balancer's target group
Lesson 320ASG Integration with Elastic Load Balancing
NewestInstance
Removes the newest instances first
Lesson 308Scale-In Protection and Termination
Next actions
Links to documentation or configuration guides
Lesson 1544NOTES.txt and User Instructions
Next Hop
(shows routing decisions), and **Connection Monitor** (tracks connectivity and latency over time).
Lesson 2194Provider-Specific Network Insights
Next request
fetches fresh data and updates the cache
Lesson 536API Gateway Caching
NFS/SMB drivers
Mount network file shares
Lesson 1040Volume Drivers and Plugins
NGINX Ingress Controller
is the most widely adopted option.
Lesson 1230Ingress Controller Options
No additional cost
IAM is included with your AWS account
Lesson 376AWS IAM Service Overview
No address assigned
Controller might not be running
Lesson 1232Ingress Troubleshooting
No audit trail clarity
It's harder to track *who* did *what* when everyone uses root
Lesson 339Root Account and Administrative Access
No cache purge complexity
No need to track and delete specific keys
Lesson 2706Version-Based Cache Invalidation
No change
Resources that remain untouched
Lesson 903Template Validation and What-If Operations
No configuration drift
because nothing changes after creation
Lesson 691Immutable Infrastructure Principle
No Control Plane Costs
Unlike self-managed Kubernetes, Azure handles the master nodes completely free—you only pay for the worker nodes where your applications run.
Lesson 1490Introduction to Azure Kubernetes Service (AKS)
No coordination
Two applies running simultaneously can corrupt state or create race conditions
Lesson 783Why Remote State Matters
No data loss
Every failed invocation is preserved
Lesson 500Dead Letter Queues
No endpoints
Label mismatch between Service selector and Pods
Lesson 1218Service Debugging and Troubleshooting
No errors or crashes
The application keeps running, but sluggishly
Lesson 1340CPU Throttling Behavior
No ETL overhead
Query raw data immediately after landing in your lake
Lesson 2640Query Engines for Data Lakes
No guarantees
Even after preemption starts, the high-priority pod might not schedule if something else grabs the resources first.
Lesson 1371Pod Preemption Behavior
No guardrails
Mistakes can't be limited—you could accidentally delete your entire infrastructure
Lesson 339Root Account and Administrative Access
No infrastructure management
No servers to patch, scale, or monitor.
Lesson 2656Serverless Query Engine Overview
No internet exposure
Traffic never hits the public internet
Lesson 2397Private Link and Endpoint Services
No Key Extraction
Keys stored in an HSM cannot be exported in plaintext.
Lesson 2285Key Storage and Hardware Security Modules
No light
(implicit deny) → Stop by default
Lesson 364Policy Evaluation Logic
No load
is placed on your origin server
Lesson 585Cache Hit vs Cache Miss
No locking
Multiple `terraform apply` commands could run at once, corrupting state
Lesson 776Local State Storage
No maintenance
No patching, updating, or instance failures to worry about
Lesson 192NAT Gateway Overview
No maintenance burden
– the provider handles hardware, updates, and security
Lesson 20Public Cloud Deployment Model
No maintenance windows
leading to false alarms during deployments
Lesson 651Alarm Best Practices and Anti-Patterns
No NAT
pods have first-class network citizens status
Lesson 1496AKS Networking Models: kubenet vs Azure CNI
No over-provisioning
You don't buy servers for peak demand that sit idle most of the time
Lesson 32Elasticity and Cost Benefits of Auto-Scaling
No overlapping CIDR blocks
The IP address ranges in both VPCs must be different.
Lesson 216VPC Peering FundamentalsLesson 2214Direct Connect Gateway
No process inspection exposure
Secrets in environment variables appear in process listings (`ps aux`, container inspect commands).
Lesson 2271Volume-Mounted Secrets
No Rotation Support
Changing a secret requires restarting the container; you can't rotate credentials dynamically.
Lesson 2270Environment Variables for Secrets
No sharing
Each team member has their own separate state file on their laptop
Lesson 776Local State Storage
No sidecars required
(unlike Vault Agent Injector)
Lesson 2276Secrets Store CSI Driver
No Spark expertise required
– Data engineers focus on business logic, not cluster configuration
Lesson 2651ADF Mapping Data Flows
No state synchronization
between instances means no replication lag or consistency issues
Lesson 2462Stateless Services and Horizontal Scaling
No TTL set
Jobs remain forever until manually deleted
Lesson 1194Job TTL and Automatic Cleanup
No under-provisioning
You won't lose customers because your website crashed during high traffic
Lesson 32Elasticity and Cost Benefits of Auto-Scaling
No unified view
forces you to jump between machines, piecing together a story from fragments.
Lesson 2004Why Centralized Logging
No upfront hardware purchases
Infrastructure becomes an operational expense
Lesson 28Understanding Total Cost of Ownership (TCO) in the Cloud
node affinity
helps you place pods on specific *nodes*, **pod affinity** lets you place pods *near other pods*.
Lesson 1351Pod Affinity FundamentalsLesson 1516Cluster Cost Optimization
Node auto-repair and auto-upgrade
Keeps security patches current
Lesson 1488GKE Security: Private Clusters and Hardening
Node compromise
A breach in a privileged container = full node control
Lesson 1394Privileged Containers
Node conditions
Inspect disk pressure, memory pressure, or PID exhaustion with `kubectl describe node`
Lesson 1519Troubleshooting Common Cluster Issues
Node constraints
Did you specify the pod must run on certain nodes (using labels or taints)?
Lesson 1104Scheduler: Pod Placement Logic
Node Group Priorities
When multiple node pools exist, you can configure which should scale first based on cost, performance, or availability zone preferences.
Lesson 1510Cluster Autoscaler Configuration
Node image upgrades
replace the underlying OS and runtime on your nodes while keeping your applications running.
Lesson 1509Node Image Upgrades
Node incompatibility
Volume requires specific node features or drivers not present
Lesson 1302Troubleshooting PV and PVC Issues
Node management
– Choosing instance types, scaling node pools, upgrading node versions
Lesson 1505Managed Kubernetes Overview
node pool
is a group of nodes (virtual machines) within your cluster that all share the same configuration.
Lesson 1479GKE Node Pools and Machine TypesLesson 1494AKS Node Pools and VM Scale SetsLesson 1508Node Pool Management
Node replacement
(the preferred method) provides a clear rollback path and validates the new configuration completely before committing.
Lesson 1506Cluster Upgrade Strategies
Node selectors
Misconfigured nodeSelector or affinity rules can exclude nodes unintentionally
Lesson 1190StatefulSet and DaemonSet Troubleshooting
Node selectors and taints
Group workloads efficiently on cost-optimized node types
Lesson 2984Container Cost Optimization
Node Status Monitoring
shows individual node health: disk pressure, memory pressure, network status, and kubelet responsiveness.
Lesson 1518Observability for Cluster Operations
Node taints
If a node has taints that the DaemonSet doesn't tolerate, no pod will schedule there
Lesson 1190StatefulSet and DaemonSet Troubleshooting
Node-level agent
Deploy a DaemonSet (like Fluent Bit) that reads container logs from each node and ships them to a central system
Lesson 2049Kubernetes Logging Architecture
Node-level agents
DaemonSets like Fluent Bit collect from all pods on each node
Lesson 2046Cloud-Native Logging Overview
node-level logging agents
collect logs from all pods on a node, sidecar containers give you **pod-specific** control.
Lesson 1435Logging with Sidecar ContainersLesson 1438Fluentd and Fluent Bit
Node.js
`--mount=type=cache,target=/root/.
Lesson 1027Cache Mounts for Dependencies
NodePort
is a Service type that extends the ClusterIP functionality by opening a specific port on every node in your Kubernetes cluster.
Lesson 1207NodePort Service Type
Noisy neighbor prevention
Keep resource-intensive pods away from each other
Lesson 1352Pod Anti-Affinity Basics
Non-critical development servers
Lesson 104GCP Preemptible and Spot VMs
Non-critical services
could accept:
Lesson 2122SLOs for Different Service Tiers
Non-obvious decisions
Why you chose a specific instance size or unusual configuration
Lesson 717Documentation and Comments
Non-profits
with similar missions but limited budgets
Lesson 24Community Cloud Model
Non-transitive
If VPC-A peers with VPC-B, and VPC-B peers with VPC-C, VPC-A cannot automatically talk to VPC-C.
Lesson 216VPC Peering Fundamentals
None mode
does the opposite: it gives the container *no networking at all*.
Lesson 1043Host and None Network Modes
None networking
is appropriate when:
Lesson 1043Host and None Network Modes
Normalization
Different systems log events in different formats.
Lesson 2861Security Information and Event Management (SIEM)
Normalized Metrics
Cloud providers use different units and pricing models.
Lesson 2961Cost Visibility Fundamentals
Normalized timestamps
(converting various formats to ISO 8601)
Lesson 2010Log Parsing and Enrichment
Not optimize
your code automatically
Lesson 933Decompiling ARM to Bicep
NOT_CHECKED
Resource type doesn't support drift detection
Lesson 879Stack Drift Detection
NotActions
What to *exclude* from broader Actions (acts as a filter)
Lesson 388Azure Custom Roles
Notary
is the open-source framework that powers Content Trust.
Lesson 1077Content Trust and Notary
Notary v1
The original implementation, battle-tested but considered legacy
Lesson 1077Content Trust and Notary
Notary v2
Modern redesign focused on OCI standards, improved performance, and simplified architecture
Lesson 1077Content Trust and Notary
Note the RTO/RPO implications
How quickly can you recover?
Lesson 2450Single Points of Failure Identification
Notification
Alerts you (via scripts or APIs) when something goes wrong
Lesson 2687Redis High Availability with Sentinel
Notification actions
alert humans through channels like:
Lesson 646Alarm Actions and Notifications
Notification Channel
Where to send alerts (email, Slack, PagerDuty)
Lesson 2016Log Alerting Basics
Notification services
(Slack, webhooks, email endpoints)
Lesson 1915Notification and Alerting Integration
Notification triggers
Automated alerts at budget thresholds
Lesson 2120Error Budget Policies and Decision Making
Notification-only mode
Keep alarms evaluating but silence the actual notifications
Lesson 648Alarm Suppression and Maintenance Windows
NTP amplification
Similar technique using Network Time Protocol servers
Lesson 2378DDoS Attack Types and Vectors
NTP servers
– Time synchronization sources
Lesson 227DHCP Options Sets
number
, and **bool**—let you define simple, single-value variables for your infrastructure configurations.
Lesson 756Variable Types: PrimitivesLesson 815Count vs For_Each: Choosing the Right Meta- Argument
Number of executors
How many concurrent jobs it can handle
Lesson 1779Jenkins Build Agents and Executors
Number of objects
(pods, services, ConfigMaps, etc.
Lesson 1337Resource Quota Basics
Number of secrets stored
– Each active secret version may incur a monthly fee
Lesson 2251Secrets Management Cost Optimization
Number of targets
More services = more metrics
Lesson 1960Data Retention and Storage
Number widgets
display single values (current queue depth)
Lesson 673CloudWatch Dashboards
Numeric functions
perform math operations like finding minimum/maximum values or absolute numbers
Lesson 736Built-in Functions Overview

O

OAuth 2.0
focuses on *authorization*—granting apps limited access to user resources without sharing passwords.
Lesson 2852Identity Federation and SSO
OAuth 2.0 tokens
tied to service accounts.
Lesson 1096GCP Registry Authentication and IAM
Object Lifecycle Policies
(from lesson 158), you configure transitions as part of those rules:
Lesson 159Storage Class Transitions
Object Lock
(AWS S3): Set retention periods where objects cannot be deleted or modified
Lesson 2353Audit Log Storage and Retention
Object mapping
Identify equivalent features or suggest alternatives when direct translation isn't possible
Lesson 2824Schema Conversion Tools
Object storage credentials
(bucket name, access keys, region)
Lesson 1983Thanos Sidecar and Object Storage
Observability dashboards
View application health, metrics, and dependencies
Lesson 2924Introduction to Developer Portals
Observability gaps
Understanding what's happening across service boundaries is difficult
Lesson 1576Istio Overview and Core Value Proposition
Observability hooks
Logging, metrics, and tracing setup
Lesson 2929Software Templates and Scaffolding
Observability plugins
Pulling real-time metrics from Prometheus/Grafana, distributed traces from Jaeger, and logs from Elasticsearch or CloudWatch
Lesson 2934Integrating CI/CD and Observability
Observability portability
means implementing metrics, logs, and traces using open standards that work consistently across AWS, Azure, GCP, or on-premises—without rewriting instrumentation when you change providers.
Lesson 2774Observability Portability
Observable Metrics
Define concrete, measurable indicators of system health.
Lesson 2492Steady State Hypothesis
OCI registries
(the same container registries that store Docker images).
Lesson 1559Chart Repositories and OCI Registries
Offboarding
Disable one identity to revoke all access
Lesson 383AWS IAM Identity Center (SSO)
Offset management
tracking which messages have been processed (auto-commit or manual)
Lesson 2609Kafka Producers and Consumers
OIDC (OpenID Connect)
Modern, token-based identity protocol built on OAuth 2.
Lesson 395Cross-Provider IAM FederationLesson 1468IRSA: IAM Roles for Service Accounts
OK → ALARM
Your CPU usage crosses 80% and stays there for the evaluation period you configured.
Lesson 640Alarm States and Transitions
OK state
Send "all clear" notification
Lesson 646Alarm Actions and Notifications
Oldest launch template
Remove instances using outdated configurations first
Lesson 319ASG Termination Policies
OldestInstance
Removes the oldest instances first
Lesson 308Scale-In Protection and Termination
On Push (Build-Time Scanning)
Lesson 1074Scan Timing and Triggers
On schedule
periodic rescans catch newly-discovered vulnerabilities
Lesson 1679Artifact Security Scanning
On scheduled audits
Regular scans of existing infrastructure code
Lesson 722IaC Security Scanning
On upload
as soon as an artifact reaches your repository (Artifactory, Nexus, Harbor)
Lesson 1679Artifact Security Scanning
On-call Engineers
need actionable metrics front-and-center: error rates, latency percentiles, current alerts.
Lesson 2100Dashboard Purpose and Audience
On-Demand Instances
are like renting a hotel room by the hour—you pay for what you use with no commitment.
Lesson 94AWS EC2 Launch Types and Tenancy
On-demand mode
automatically scales with your application's traffic.
Lesson 432DynamoDB Capacity Modes: Provisioned vs On-Demand
On-Demand Resources
Spin up virtual machines in minutes across different **Regions and Availability Zones**, not weeks like traditional data centers.
Lesson 13Infrastructure as a Service (IaaS) Overview
On-demand self-service
No waiting for IT approval or hardware delivery
Lesson 34Business Agility: Time-to-Market Advantages
On-demand triggers
Manually start jobs via API or console
Lesson 2648Glue Job Triggers and Workflows
On-premise integration
Allow traffic to corporate network CIDR blocks
Lesson 1241IP Block Rules
On-premises
In your company's own data center, managed by your IT team
Lesson 21Private Cloud Deployment ModelLesson 2365WAF Deployment Models
On-the-fly attachment
connect/disconnect containers without restarting them
Lesson 1042Bridge Networks
Onboarding
New employees get one identity with appropriate access
Lesson 383AWS IAM Identity Center (SSO)
Onboarding/offboarding
– Add new hires to appropriate groups instantly; remove departing employees just as quickly
Lesson 349Groups Fundamentals
OnDelete
is a manual strategy.
Lesson 1188DaemonSet Update Strategies
one
load balancer (managed by an Ingress Controller) to handle traffic for many services—saving cost and complexity.
Lesson 1220Ingress vs Service Load BalancingLesson 1307Default StorageClassLesson 2296Envelope Encryption Pattern
One connection per VPC
Each VPC attaches once to the transit gateway
Lesson 218Transit Gateway Concepts
One consumer
retrieves and processes the message
Lesson 572Point-to-Point Queue Pattern
One instruction per line
(though arguments can span multiple lines with `\`)
Lesson 1000Dockerfile Structure and Parsing
One storage volume
without replication
Lesson 2450Single Points of Failure Identification
One user portal URL
where employees log in
Lesson 383AWS IAM Identity Center (SSO)
One-way sync
Primary → Replica (never the reverse)
Lesson 418Read Replicas for Scalability
OOMKilled Status
Kubernetes marks the container with an OOMKilled exit reason
Lesson 1335Setting Memory Limits
OPA Gatekeeper
, **Kyverno**, or **Kubewarden** offer more granular, customizable policy enforcement.
Lesson 1400Migrating from PodSecurityPolicyLesson 1517Cluster Security Hardening
OPA testing
validates your Rego policies themselves—ensuring your compliance rules produce correct decisions:
Lesson 2346Compliance Testing and Validation
OPA/Gatekeeper
(flexible, Rego-based policies)
Lesson 1078Admission Controllers for Image Policy
Open
Failure threshold exceeded, requests fail immediately
Lesson 501Circuit Breaker PatternLesson 2506Circuit Breaker for Functions
Open (Failing)
After failures exceed a threshold, the breaker "trips.
Lesson 2588Circuit Breaker Pattern
Open (Tripped)
After exceeding failure thresholds, the breaker stops sending requests and immediately returns errors.
Lesson 1612Circuit Breaking PatternsLesson 2581Circuit Breaker Pattern
Open Policy Agent
, **Cloud Custodian**, **Azure Policy**, **GCP Organization Policy Service**, and **Terraform Sentinel**—can all trigger automatically on code commits or pull requests.
Lesson 2345Continuous Compliance Scanning
Open-source projects
that want maximum distribution
Lesson 1062Public vs Private Registries
OpenAPI/Swagger definitions
describing endpoints, parameters, and schemas
Lesson 2931API Discovery and Documentation
OpenID Connect (OIDC)
builds atop OAuth 2.
Lesson 2852Identity Federation and SSO
OpenTelemetry
provides a vendor-neutral SDK and API for instrumenting applications.
Lesson 2774Observability Portability
OpenTelemetry (OTel)
is a unified, vendor-neutral observability framework that provides a single set of APIs, SDKs, and tools for collecting **traces, metrics, and logs** across all major programming languages and platforms.
Lesson 2073What is OpenTelemetry and Why It Matters
OpenTelemetry Collector
is a vendor-agnostic agent that sits between your instrumented applications and your observability platforms.
Lesson 2081OpenTelemetry Collector Fundamentals
OpenTelemetry exporters
(modern approach)
Lesson 2091Zipkin Fundamentals
Operate
Establish governance and continuous improvement
Lesson 2948What is FinOps?
Operating expenses (OpEx)
Power, cooling, physical security, staff salaries
Lesson 28Understanding Total Cost of Ownership (TCO) in the Cloud
Operating System Boot Volumes
The root disk where your OS lives typically uses block storage
Lesson 113Block Storage Overview
operating system image
(or **machine image**) as a snapshot or blueprint of a complete computer system frozen in time.
Lesson 54Operating System Images and AMIsLesson 55Public vs Private Images
Operating System Image (AMI)
that contains the base OS and any pre-installed software.
Lesson 81VM Launch Process and Initialization
Operation
What command was running (plan, apply, etc.
Lesson 795Handling State Lock Failures
Operational dashboards
help on-call engineers diagnose incidents in real-time
Lesson 2100Dashboard Purpose and Audience
Operational data
last restart reason, scaling triggers
Lesson 1124Annotations for Metadata
Operational Expenditure (OpEx)
is ongoing spending for services consumed over time.
Lesson 29CapEx vs OpEx: Financial Models in Cloud ComputingLesson 2799TCO Analysis for Migration
Operational overhead
Every team implementing their own resilience patterns (retries, timeouts, circuit breakers) leads to inconsistency
Lesson 1576Istio Overview and Core Value Proposition
Operational policies
backup requirements, monitoring standards
Lesson 2900Policy Libraries and Reusability
Operational predictability
Desired capacity sets your baseline
Lesson 310Capacity Limits and Constraints
Operational skills
Small teams benefit from higher-level services (PaaS); large DevOps teams can optimize with lower-level control (IaaS)
Lesson 110Compute Service Selection Criteria
Operational standards
(monitoring, logging, backup configuration)
Lesson 2918Self-Service vs. Full Autonomy
Operations
Create, update, or delete actions across all instances
Lesson 883StackSets FundamentalsLesson 2689Memcached Fundamentals
Operators beyond equality
(In, NotIn, Exists, DoesNotExist, Gt, Lt)
Lesson 1346Node Affinity vs Node Selector
OpEx model
where you only pay for what you actually consume.
Lesson 33Cloud Cost Optimization: Right-Sizing Resources
OpEx savings
compared to previous CapEx spending
Lesson 37Measuring Cloud Business Value: KPIs and Metrics
Opinionated simplicity
Focused feature set that covers essential mesh capabilities without bloat
Lesson 1596Open Service Mesh (OSM) Basics
Opsgenie
(now part of Atlassian) provides similar incident routing but integrates tightly with Jira and other Atlassian tools, making it ideal for teams already in that ecosystem.
Lesson 2132Incident Management Tools
Optimal file sizes
(typically 128MB–1GB) let query engines efficiently distribute work across multiple workers while minimizing metadata overhead.
Lesson 2641Data Lake Performance Optimization
Optimization
is finding ways to reduce costs without sacrificing performance or reliability.
Lesson 2137Cost Management Fundamentals
Optimization blindness
You can't compare apples-to-apples whether a workload would cost less on AWS vs Azure when pricing models are fundamentally different
Lesson 2757Multicloud Challenges: Cost Management and Visibility
Optimization potential
Right-sizing, reserved instances, spot instances
Lesson 2799TCO Analysis for Migration
Optimize
Improve efficiency without sacrificing performance
Lesson 2948What is FinOps?
Optimize algorithms
Replace nested loops with hash maps.
Lesson 2547Execution Duration Optimization
Optimize initialization
Move SDK clients and database connections outside handler functions
Lesson 2983Serverless Cost Optimization Patterns
Optimize read models
for query performance, using denormalized views or materialized data
Lesson 2597CQRS Pattern
Optimize refresh intervals
Don't set every panel to refresh every 5 seconds.
Lesson 2003Grafana Best Practices and Performance
Optimize write models
for data integrity, validation, and business rules
Lesson 2597CQRS Pattern
Optimized CPU cache
for faster data access during calculations
Lesson 67Compute Optimized Instance Types
Optimized models
Command database can be normalized; query databases can be denormalized for speed
Lesson 574CQRS Pattern with Events
Optimized resource usage
No idle time waiting for unrelated jobs
Lesson 1760Pipeline DAG and Needs
Optional arguments
Values you *can* provide to customize behavior, but they have reasonable defaults if omitted.
Lesson 740Resource Arguments and Attributes
Optional job keywords
refine behavior:
Lesson 1741GitLab CI/CD Pipeline File Structure
Oracle databases
might offer options like advanced security or data compression
Lesson 404Option Groups for Engine Features
Orchestration Functions
coordinate other functions using simple code that looks synchronous but runs asynchronously:
Lesson 512Azure Functions: Durable Functions
Orchestrator Functions
are the heart of the system.
Lesson 2523Azure Durable Functions
Orchestrator Pattern
uses a central state machine to coordinate multiple serverless functions in a defined sequence.
Lesson 2512Orchestrator Pattern with Step Functions
Order-dependent
Execute in reverse order of original saga steps
Lesson 2735Compensating Transactions
Ordered deployment and scaling
Pods start sequentially (`0`, then `1`, then `2`), ensuring dependencies are satisfied.
Lesson 2470Stateful Set Patterns in Kubernetes
Ordered operations
Pods are created in sequence (0, 1, 2.
Lesson 1176StatefulSet Fundamentals
Ordered processing
Stream partitions maintain event order
Lesson 2511Stream Processing Pattern
Ordered startup and shutdown
(start db-0 before db-1, etc.
Lesson 1176StatefulSet Fundamentals
OrderedReady
and **Parallel**—that control how StatefulSet pods are created, updated, and deleted.
Lesson 1184StatefulSet Pod Management Policies
Organization Policies
at any level to restrict resource configurations (like "deny public IPs" or "allowed regions").
Lesson 2361Cloud Governance Tools Overview
Organization-Level Trails
Cloud providers offer organization-wide logging configurations that automatically capture events from all member accounts without per-account setup.
Lesson 2354Centralized Audit Log Aggregation
Organize by application
or team (payments-keyring, analytics-keyring)
Lesson 2318GCP Cloud KMS Structure and Key Rings
Organize by role
Create groups like "Developers," "Admins," or "Auditors"
Lesson 378AWS IAM Groups
Organize fields
lets you rename columns, reorder them, or hide unnecessary ones—essential for making data human-readable.
Lesson 1999Transformations and Data Processing
Organize resources logically
Put web servers in one subnet, databases in another, internal tools in a third
Lesson 175Subnet Fundamentals
Origin Load
Tracks requests reaching your origin.
Lesson 2680CDN Cache Analytics and Hit Rates
Origin must support ranges
your origin server sends proper `Accept-Ranges: bytes` and `Content-Range` headers
Lesson 606Range Requests and Partial Content
Origin processes request
(if needed):
Lesson 611Edge vs. Origin: The Request Flow
Origin protection
Shields origin from traffic spikes and DDoS attacks
Lesson 584Origin Servers and Edge CachingLesson 591Origin Shield and Cache Hierarchies
Origin Server
Your source of truth (your application servers or storage)
Lesson 583CDN Architecture and Points of PresenceLesson 584Origin Servers and Edge Caching
Origin servers
are your centralized data centers where the authoritative version of content lives and complex processing happens.
Lesson 611Edge vs. Origin: The Request Flow
Origin Shield
acts as an extra protective caching layer between edge servers and your origin, reducing load and improving cache efficiency.
Lesson 591Origin Shield and Cache HierarchiesLesson 2681Multi-Tier Caching with CDN
Origin target
Which backend server to fetch from
Lesson 595Cache Behavior Configuration
Orphan deletion
Children are left behind (owner reference removed but objects remain)
Lesson 1125Owner References and Garbage Collection
Orphaned access
Former employees still listed in groups
Lesson 360Auditing Group and Role Membership
Orphaned Resources
You remove a resource from Git, but it remains running in the cluster, consuming resources and potentially causing conflicts.
Lesson 1886Self-Heal and Prune Options
Orphaned snapshots
from deleted resources
Lesson 2160Idle Resource Detection
OTel Collector
can be deployed in two primary patterns:
Lesson 2086OpenTelemetry in Kubernetes Environments
Other Common Parameters
include `work_mem` (memory for sorts/joins), `effective_cache_size` (helps query planner estimate available OS cache), and logging levels that balance observability with overhead.
Lesson 451Database Parameter Tuning
Out-of-order arrival
Events from 10:05 might arrive after events from 10:10
Lesson 2604Event Time vs Processing Time
Out-of-order writes
causing logical inconsistencies
Lesson 2444Data Consistency Validation
Outbound
Translates private IP addresses to public IPs for resources making requests to the internet
Lesson 187Internet Gateway FundamentalsLesson 196NAT Instance Configuration
Outdated configurations
Old machine types that cost more than newer equivalents
Lesson 2180GCP Recommender and Cost Insights
OutOfSync
Differences detected between Git and cluster (manual changes, drift, or new commits)
Lesson 1885Application Health and Sync Status
Output artifact name
(the code bundle passed to subsequent stages)
Lesson 1840Source Stage Configuration
Output bindings
send data from your function (like writing to storage).
Lesson 511Azure Functions: Bindings and Triggers
Output decision
Boolean result or structured data
Lesson 2338Open Policy Agent (OPA) Fundamentals
Output plugins
are the shipping departments that send finished products (structured logs) to their destinations
Lesson 2021Logstash Architecture and PipelinesLesson 2024Fluentd Architecture and Design
Output values
allow you to explicitly expose the information you care about, making it visible after `terraform apply` completes.
Lesson 764Introduction to Outputs
Over-attributing spans
Excessive tags/attributes increase payload size
Lesson 2087Best Practices and Performance Considerations
Over-provisioning
means paying for capacity you don't use (a 16-core server when 4 cores would suffice).
Lesson 33Cloud Cost Optimization: Right-Sizing ResourcesLesson 286What is Auto ScalingLesson 2155Auto Scaling for Cost Efficiency
Overage charges
Additional backup storage beyond that free allocation incurs per-GB monthly fees (usually cheaper than standard block storage but still significant at scale).
Lesson 426Backup Storage and Costs
Overall pipeline status
(running, passed, failed, canceled)
Lesson 1739Pipeline Visualization and Job Logs
Overall status
(success, failure, cancelled)
Lesson 1696Workflow Run History and Re-runs
Overhead
Requires more resources and network bandwidth
Lesson 2429Continuous Data Protection (CDP)
Overlap periods
keep old credentials valid briefly during rotation to avoid connection failures
Lesson 2279Secrets Rotation in Containers
Overlay networks
solve this by creating a virtual network layer that spans multiple Docker hosts, letting containers communicate transparently no matter where they physically run.
Lesson 1045Overlay Networks for Multi-Host
Overlays or kustomizations
(different manifests per environment)
Lesson 1867Branching Strategies for GitOps
Overly permissive grants
Policies using broad wildcards like `*` on sensitive actions
Lesson 372Access Analyzer for Policy Review
override
these defaults in two flexible ways: using custom values files or command-line flags.
Lesson 1529Values: Customizing Chart DeploymentsLesson 1705Environment Variables: Workflow and Job Level
Override values
Pass configuration to child charts through your parent `values.
Lesson 1545Chart Dependencies
Overwrite protection
Retrieve any previous version if the latest is corrupted or wrong
Lesson 156Object Versioning Fundamentals
Own the lifecycle
of that infrastructure—Terraform will create, update, and destroy it
Lesson 753When to Use Resources vs Data Sources
Owner
Full control over everything—can manage resources *and* assign permissions to others.
Lesson 387Azure Built-in RolesLesson 392GCP IAM Roles: Basic, Predefined, CustomLesson 2143Azure Cost Management Tags
Owner contact info
and support channels
Lesson 2931API Discovery and Documentation
Owner references
are metadata links that establish parent-child relationships between these objects.
Lesson 1125Owner References and Garbage Collection
Owner/Contact
Who's responsible for maintaining it
Lesson 375Policy Documentation and Governance
Owner/Contributor
Full management capabilities
Lesson 1092ACR Authentication and RBAC
Ownership
(which team/person is responsible)
Lesson 2928Software Catalog in Backstage

P

P0 (Critical)
Complete service outage or data loss affecting all or most users.
Lesson 2129Incident Severity Levels
P0 through P4
scale (P = Priority):
Lesson 2129Incident Severity Levels
P1 (High)
Major functionality degraded or significant user segment affected.
Lesson 2129Incident Severity Levels
P2 (Medium)
Partial service degradation, workarounds exist, or minor feature broken.
Lesson 2129Incident Severity Levels
P3 (Low)
Minor issues, cosmetic bugs, or non-urgent operational tasks.
Lesson 2129Incident Severity Levels
P4 (Minimal)
Feature requests, documentation issues, or "nice-to-haves.
Lesson 2129Incident Severity Levels
p95
95% of requests completed within this time; only 5% were slower
Lesson 635Percentiles vs AveragesLesson 1640Performance Metrics and Histograms
p99
99% completed within this time; only the worst 1% exceeded it
Lesson 635Percentiles vs AveragesLesson 1640Performance Metrics and Histograms
Package manager caches
When you install software, package managers often cache downloads.
Lesson 985Layer Size and Bloat
Package manager dependencies
(npm, pip, Maven, Gradle)
Lesson 1719Caching Dependencies and Build Artifacts
Package Managers
Use APT (Debian/Ubuntu) or YUM (RHEL/CentOS) for traditional server installations.
Lesson 1993Installing and Configuring Grafana
Package Restrictions
Block images containing blacklisted packages or require specific versions of critical libraries.
Lesson 1084Compliance and Policy Enforcement
Package size
(larger deployments take longer to download)
Lesson 491Cold Start Fundamentals
Packages
Language-specific bundles (`.
Lesson 1671What are Build Artifacts?
Packaging and Reusability
A single Chart can deploy entire applications.
Lesson 1520What is Helm and Why Use It?
Packet loss and jitter
Critical metrics that reveal physical link quality issues
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Packet-per-second (PPS)
rate measures how many individual data packets your instance can handle.
Lesson 72Network Performance Across Instance Types
Page during business hours
5% budget consumed in 6 hours (6x burn) + confirmed over 30 minutes
Lesson 2121Multi-Window and Multi-Burn-Rate Alerting
Page immediately
2% budget consumed in 1 hour (14.
Lesson 2121Multi-Window and Multi-Burn-Rate Alerting
PagerDuty
is the industry leader, offering sophisticated alert routing, escalation policies, and deep integrations with monitoring systems.
Lesson 2132Incident Management Tools
Parallel API calls
Query multiple external services simultaneously
Lesson 2503Fan-Out/Fan-In Pattern
Parallel backups
Maintain independent backup systems for both source and target environments during the migration window.
Lesson 2817Disaster Recovery During Migration
Parallel Development
Frontend teams can build against API contracts while backend teams implement services
Lesson 545Mock Integrations and Testing
Parallel Execution Pattern
breaks this constraint by identifying stages that don't depend on each other and running them simultaneously.
Lesson 1658Parallel Execution PatternLesson 1659Fan-Out/Fan-In Pattern
Parallel operations
(sibling spans happening concurrently)
Lesson 2063Spans and Span Relationships
Parallel Run Approach
means building new Terraform-managed infrastructure alongside legacy systems, testing thoroughly, then cutting over.
Lesson 844Migration Strategies for Legacy Infrastructure
Parallel state
lets you execute multiple workflow branches at the same time.
Lesson 2521Parallel and Map States
Parallelize when possible
Make concurrent API calls instead of sequential ones.
Lesson 2547Execution Duration Optimization
Parameter Groups
(which you learned earlier).
Lesson 451Database Parameter Tuning
Parameter optimization
is critical.
Lesson 2831Performance Tuning Post-Migration
Parameter Store
(part of Systems Manager) offers a simpler, cost-effective option for both plain configuration and encrypted secrets, though without automatic rotation.
Lesson 508AWS Lambda: Environment Variables and SecretsLesson 1827Environment Variables and Parameter Store
Parameterize Everything Variable
Hardcoded values make templates brittle.
Lesson 919ARM Template Best Practices and Validation
Parameterize policies
Use variables for organization-specific values (allowed regions, account IDs, tag requirements) so teams can customize without forking.
Lesson 2347Policy Libraries and Reusability
Parent image build
`ONBUILD` instructions are registered but not executed
Lesson 1014ONBUILD: Triggered Instructions
Parent layers
→ Any layers between the base and your current layer
Lesson 978Base Images and Parent Layers
Parent template structure
Lesson 881Nested Stacks
Parquet
or **ORC** that compress well and enable column pruning—reading only the fields you need.
Lesson 2625Batch Processing OptimizationLesson 2632File Formats for AnalyticsLesson 2662Athena Performance Optimization
parse
them into structured fields and **enrich** them with additional context.
Lesson 2010Log Parsing and EnrichmentLesson 2040Fluent Bit for Kubernetes Logging
Parser
Converts unstructured log text into structured JSON.
Lesson 2026Fluentd Configuration and Parsing
Parser plugins
Extract structured data from raw text
Lesson 2024Fluentd Architecture and Design
Parses
them into structured formats you can query
Lesson 665Log Aggregation Pipelines
Parsing
Transform unstructured text into structured fields.
Lesson 665Log Aggregation PipelinesLesson 1438Fluentd and Fluent Bit
Parsing Efficiency
Parse logs only when necessary.
Lesson 1442Logging Performance and Overhead
Partial mitigation
Issue credit instead of refund
Lesson 2735Compensating Transactions
Partial Restores
test specific components without full environment rebuilds—like restoring a single table from a database backup or a critical configuration file.
Lesson 2428Backup Validation and Testing
Participant accounts
get permission to launch resources (like EC2 instances) into specific subnets
Lesson 230Shared VPCs and Multi-Account Networking
Partition first
(coarse filter), **then cluster** (fine filter).
Lesson 2665BigQuery Data Organization
partition key
is a single attribute that DynamoDB uses both to identify your item *and* to decide which physical server (partition) stores it.
Lesson 431DynamoDB Primary Keys and Partition KeysLesson 438Cosmos DB Partitioning and Request UnitsLesson 2607Stream Partitioning and Parallelism
Partition keys
solve this by dividing events into separate lanes (partitions).
Lesson 578Event Ordering and PartitioningLesson 2718Message Ordering and Partitioning
Partition on filter columns
Use columns frequently in your `WHERE` clauses.
Lesson 2661Athena Partitioning Strategies
Partition Tolerance
The system continues operating despite network splits
Lesson 2466Stateful Services: Challenges and Trade-offs
Partition-based versioning
New data lands in versioned partitions (e.
Lesson 2638Schema Evolution and Versioning
Partitioning strategy
deciding which partition receives each message (round-robin, key-based hashing, or custom)
Lesson 2609Kafka Producers and Consumers
Pass surveillance audits
(periodic checks to maintain certification)
Lesson 2325ISO 27001 Information Security
Pass traffic to VirtualServices
that bind to the Gateway
Lesson 1583Gateway Resource for Ingress
Pass/fail binary
Either works or doesn't
Lesson 2491Chaos Engineering vs Traditional Testing
Pass/fail results
for specific compliance controls
Lesson 2348Compliance Reporting and Evidence
Past tense verbs
Events describe something that already happened
Lesson 569Event Types and Naming Conventions
Patching and updates
– Security fixes and version upgrades applied automatically
Lesson 396Introduction to Managed Relational Databases
Path pattern
Which URLs this rule applies to (e.
Lesson 595Cache Behavior Configuration
Path patterns
(`/api/*` goes to API servers, `/images/*` to image servers)
Lesson 245Introduction to Application Load Balancers (ALB)Lesson 600Cache Invalidation and Purging
Path-based
is easiest to understand and cache.
Lesson 548API Versioning Strategies
Path-Based Routing
you've already learned, advanced routing combines *multiple* content attributes:
Lesson 275Content-Based Routing and Path RulesLesson 1219Ingress Resource Fundamentals
Path-based separation
(`/envs/dev`, `/envs/prod`)
Lesson 1867Branching Strategies for GitOps
Paths
let you route different URL endpoints to different backend Services—all through a single external entry point.
Lesson 1223Basic Ingress Rules and PathsLesson 1624Request-Level Authorization
Pattern across dimensions
→ Heatmap
Lesson 2103Visualization Types and Best Practices
Pattern choice
Active-Active Multi-Region works beautifully
Lesson 2445DR for Stateful vs Stateless Apps
Pattern complexity
Warm Standby or Hot Standby typically required
Lesson 2445DR for Stateful vs Stateless Apps
Pattern detection
Track which keys get high request rates
Lesson 2701Refresh-Ahead Caching Pattern
Pattern example
`{organization}-{environment}-{service}-{resource-type}-{region}`
Lesson 713Naming Conventions and Standards
Pattern matching
Use regular expressions or grok patterns to extract fields like IP addresses, timestamps, or HTTP status codes
Lesson 660Log Parsing and EnrichmentLesson 1443Log Sampling and FilteringLesson 2685Redis Pub/Sub and Messaging
Pattern recognition
and anomaly detection
Lesson 2355Audit Log Analysis and Search
Pauses execution
at that point in the pipeline
Lesson 1844Manual Approval Actions
Paved Roads
(covered in previous lessons), you create pre-approved, automated workflows.
Lesson 2918Self-Service vs. Full Autonomy
Pay-As-You-Go
Only pay for what you use—storage space, compute hours, and network bandwidth.
Lesson 13Infrastructure as a Service (IaaS) OverviewLesson 1820Pricing Model for AWS Code Services
pay-as-you-go pricing model
you learned earlier, the cost benefits become clear:
Lesson 32Elasticity and Cost Benefits of Auto-ScalingLesson 40Elasticity and Auto-Scaling Concepts
Pay-per-GB pricing
– dramatically cheaper than traditional storage
Lesson 2630Object Storage as Data Lake Foundation
Pay-per-query model
You're charged based on data scanned or compute resources used per query, not for idle infrastructure sitting around 24/7.
Lesson 2656Serverless Query Engine Overview
Payload optimization
Returning only fields the specific frontend needs
Lesson 2577Backend for Frontend (BFF) Pattern
Payload Size Restrictions
limit how much data you can pass into or return from a function.
Lesson 469Function Timeouts and Limits
Payload/Data
The actual event information
Lesson 570Event Schema Design
Payment gateway
Mission-critical → RTO: 15 min, RPO: 0 (real-time replication)
Lesson 2410Business Impact Analysis (BIA)
Payment option
All upfront, partial upfront, or no upfront (all upfront = biggest discount)
Lesson 74Reserved Instance Pricing
PCI-DSS
, and **SOC 2** mandate specific log retention periods, encryption standards, and data handling practices.
Lesson 2014Log Security and Compliance
Peer discovery
for clustered applications (e.
Lesson 1210Headless Services
Peer group comparison
Behavior inconsistent with similar roles (e.
Lesson 2858Behavioral Analytics and Anomaly Detection
Peer reviews
of infrastructure changes through pull requests
Lesson 693IaC and the DevOps Culture
Per-attempt timeouts
within the overall timeout window
Lesson 1611Timeouts and Retry Policies
Per-client limits
(by IP, API key, or token)
Lesson 2385Rate Limiting and Throttling
Per-GB fee
for data processed through them
Lesson 199Internet Connectivity Costs
Per-instance deployment
Each service instance gets its own sidecar, ensuring distributed control
Lesson 1566The Sidecar Proxy Pattern
Per-IP limits
100 requests per minute from any single IP
Lesson 282Rate Limiting and Throttling at Load Balancer
Per-namespace
annotations or mesh config
Lesson 1588Istio Proxy Configuration
Per-object keys
Multi-tenant scenarios or varying data sensitivity
Lesson 2303Object Storage Encryption Options
Per-pod
annotations on your Deployments
Lesson 1588Istio Proxy Configuration
Per-user limits
1,000 API calls per hour per authenticated user
Lesson 282Rate Limiting and Throttling at Load Balancer
Percentage sampling
Keep 10% of all traces randomly
Lesson 2083Sampling Strategies in OpenTelemetry
Percentage-based
Keep 5% of debug logs randomly
Lesson 2056Log Sampling and Filtering
Perfect for auto-scaling
Works beautifully with the elasticity patterns you've learned
Lesson 42Stateless Application Design
Perfect Forward Secrecy (PFS)
groups
Lesson 2199VPN Gateway Configuration
Performance analysis
Study traffic patterns without adding overhead to production workloads
Lesson 229VPC Traffic MirroringLesson 1638Log Formats and Customization
Performance and Availability
Applications experience minimal write latency since they're not blocked waiting for distant replicas.
Lesson 2480Asynchronous Replication Patterns
performance baselines
the "normal" behavior you compare against when investigating issues.
Lesson 2235Network Performance MonitoringLesson 2908Application Recovery Testing
Performance Benchmarking
Measure response times, throughput, and resource utilization across clouds.
Lesson 2776Portability Testing and Validation
Performance characteristics
vary widely:
Lesson 483Function Runtime Selection
Performance Dashboard
(packet loss and latency metrics), and **Firewall Insights** (identifies shadowed or unused firewall rules).
Lesson 2194Provider-Specific Network Insights
Performance data
Request/limit compliance, resource bottlenecks
Lesson 1500AKS Monitoring with Azure Monitor
Performance debugging
becomes nearly impossible when you can't see how a request flows through five different services.
Lesson 2004Why Centralized Logging
Performance degradation
happens when Terraform must evaluate thousands of resources in a single state file.
Lesson 831Scaling Challenges and Patterns
Performance flexibility
Combine similar instance types (same vCPU/memory ratios) to maintain consistent performance.
Lesson 309Mixed Instance Policies
Performance improvements
– Kubernetes doesn't need to watch for changes, reducing API server load (significant in clusters with thousands of ConfigMaps)
Lesson 1255Immutable ConfigMaps
Performance isolation
is critical—you don't want "noisy neighbors" affecting your workload
Lesson 108GCP Sole-Tenant Nodes
Performance Metrics
Remember IOPS, throughput, and latency from earlier lessons?
Lesson 136Volume Monitoring and MetricsLesson 1324Volume Metrics and Monitoring
Performance requirements
You need faster build times with more powerful machines or persistent caching across runs
Lesson 1690Self-hosted Runners OverviewLesson 2794Refactor/Re-architect Strategy
Performance thresholds
Is response time degraded beyond acceptable limits?
Lesson 2482Failover Detection Mechanisms
Performance Tier
(`fast-ssd`): High-IOPS SSDs for databases, caching layers, and latency-sensitive applications.
Lesson 1314Multiple StorageClasses Strategy
Performance tuning
Adjust IOPS or throughput limits independently of size on certain volume types, fine-tuning for your workload's access patterns.
Lesson 133Volume Resizing and ModificationLesson 1315StorageClass Mount Options
Performant
Low latency and sufficient bandwidth
Lesson 2195Hybrid Cloud Connectivity Overview
Periodic Test Restores
Actually restore data from the DR site to a test environment and run application-level integrity checks.
Lesson 2444Data Consistency Validation
Permanent
Legacy systems that can't refresh credentials, certain service-to-service authentication (though even this is moving away)
Lesson 341Temporary vs Permanent Credentials
Permanent credentials
are like having a master key that never expires.
Lesson 341Temporary vs Permanent Credentials
Permanent Deletion
– After the waiting period, the key is irreversibly destroyed.
Lesson 2291Key Deletion and Recovery
Permission changes
Rapid privilege escalations or role modifications
Lesson 2858Behavioral Analytics and Anomaly Detection
Permission Scopes
define granular access:
Lesson 1680Artifact Repository Access Control
Permissions
Pod security context conflicts with volume ownership
Lesson 1302Troubleshooting PV and PVC Issues
Permissions policy
– what the role can do once assumed
Lesson 379AWS IAM Roles and Trust Policies
Permissive mode
allows both mTLS and plain-text traffic.
Lesson 1621Enabling mTLS in IstioLesson 1622mTLS Migration Strategies
Persistent hostname
that remains constant across pod restarts
Lesson 1178Pod Identity in StatefulSets
Persistent storage binding
PersistentVolumeClaims are created per-pod and survive pod deletion, preserving state even during reschedules.
Lesson 2470Stateful Set Patterns in Kubernetes
Persistent volumes
(block storage like AWS EBS, Azure Managed Disks, or GCP Persistent Disks) exist independently from your VM.
Lesson 121Ephemeral vs Persistent Volumes in Cloud
PersistentVolume (PV)
is a piece of storage in your Kubernetes cluster that has been provisioned by an administrator or created dynamically using Storage Classes.
Lesson 1289PersistentVolume (PV) Fundamentals
PersistentVolumeClaim (PVC)
is a user's request for storage in Kubernetes.
Lesson 1290PersistentVolumeClaim (PVC) Fundamentals
PersistentVolumeClaims
Validates binding status
Lesson 1900Health Assessment
PersistentVolumeClaims (PVCs)
are requests for storage by users.
Lesson 1288Kubernetes Storage Abstractions
PersistentVolumes
mechanisms that attach external, durable storage to containers.
Lesson 1287Storage Challenges in Containers
PersistentVolumes (PVs)
are cluster-level storage resources that exist independently of Pods.
Lesson 1288Kubernetes Storage AbstractionsLesson 1528Uninstalling Releases
Personal learning and experimentation
Lesson 1062Public vs Private Registries
Personal resource isolation
Each user accesses only their own storage bucket prefix
Lesson 367Policy Variables and Dynamic Policies
Personalization
Show user-specific content (like greetings or recommendations) without a full origin round-trip
Lesson 610Edge Computing Concepts and Use CasesLesson 619Request and Response Manipulation
Personnel
System administrators, network engineers, facilities staff
Lesson 2799TCO Analysis for Migration
PgBouncer
(for PostgreSQL) or **ProxySQL** (for MySQL) sit between your app and the database, managing connections and providing a stable interface.
Lesson 2770Database Abstraction Strategies
Phase 1
Report and notify owners (via tags) with grace periods
Lesson 2986Idle Resource Detection and Cleanup
Phase 2
Automatic snapshot and termination for non-critical resources
Lesson 2986Idle Resource Detection and Cleanup
Phase 3
Policy enforcement preventing creation without proper tagging
Lesson 2986Idle Resource Detection and Cleanup
Phishing-resistant MFA
requires cryptographic proof that can't be socially engineered or forwarded to attackers.
Lesson 2850Multi-Factor Authentication Strategies
Physical circuits
Different fiber paths from your telco provider
Lesson 2220Private Connectivity Redundancy
Physical Distance
The fundamental speed-of-light limit means data traveling from AWS US-East to GCP Europe takes ~80-100ms minimum, regardless of bandwidth.
Lesson 2789Network Performance and Latency Considerations
Physical tamper protection
that destroys keys if attacked
Lesson 2283Key Hierarchy and Root of Trust
Physical Tamper Resistance
HSMs are built with sensors that detect physical intrusion attempts.
Lesson 2285Key Storage and Hardware Security Modules
PID namespace
Each container sees its own process tree, starting from PID 1.
Lesson 963Process Isolation with Namespaces
Pie charts
for distribution (log levels, services)
Lesson 2028Kibana Dashboard Creation
Pilot
(traffic management), **Citadel** (certificate authority for mTLS), and **Galley** (configuration validation).
Lesson 1577Istio Control Plane Components
Pilot Light
pattern takes its name from the small, always-on flame in a gas furnace that's ready to ignite the main burners instantly.
Lesson 2432Pilot Light Pattern
Ping of Death
Send malformed packets that crash systems
Lesson 2378DDoS Attack Types and Vectors
Pipeline
A workflow that defines how your code moves from source to production.
Lesson 1814CodePipeline: Orchestration Service OverviewLesson 2602Streaming Architecture Patterns
Pipeline capabilities
(Blue Ocean UI, Pipeline syntax extensions)
Lesson 1775Jenkins Plugins and Extensibility
Pipeline Configuration (`.gitlab-ci.yml`)
Lesson 1727GitLab CI/CD Architecture Overview
Pipeline Jobs
use a declarative or scripted approach where you define your entire build process as code in a `Jenkinsfile`.
Lesson 1774Freestyle Projects vs Pipeline Jobs
Pipeline Plugin
Enables declarative and scripted pipelines
Lesson 1775Jenkins Plugins and Extensibility
Pipeline state is clear
(you always know exactly where code is in the process)
Lesson 1657Linear Pipeline Pattern
Pipeline Status Monitoring
Query `/projects/:id/pipelines/:pipeline_id` to check if a pipeline succeeded, failed, or is still running.
Lesson 1769GitLab CI API and Automation
Pipeline triggers
and **parent-child pipelines** let you break complex workflows into manageable, reusable pieces —like calling functions from a main program.
Lesson 1756Pipeline Triggers and Parent-Child Pipelines
Pipeline-level notifications
Get alerts when the entire pipeline starts, succeeds, or fails
Lesson 1849Pipeline Notifications and EventBridge
Pivot
Compare behavior across endpoints or regions
Lesson 1955Labels and Dimensionality
Pivot analysis
lets you cross-reference multiple dimensions simultaneously.
Lesson 2174Azure Cost Analysis and Views
Placement control
AWS Placement Groups vs Azure Availability Sets vs GCP Instance Groups
Lesson 109Cross-Provider Compute Feature Comparison
Placement groups
let you tell AWS exactly *how* you want your instances positioned relative to each other—whether tightly packed for speed, separated for safety, or organized for large-scale distributed systems.
Lesson 106AWS Placement Groups
Plan for growth
Choose names that scale (not `Dev-Team-3-People`)
Lesson 350Creating and Organizing Groups
Plan migrations
Understand dependencies before making changes
Lesson 1639Service Dependency Mapping
Plan/preview generation
What changes will actually happen?
Lesson 721Continuous Integration for IaC
Planned Migration
When moving workloads to a new region or changing database configurations, you can set up a read replica in the target location, let it sync, then promote it during a maintenance window with minimal downtime.
Lesson 420Promoting Read Replicas
Planning
Generate and display preview of infrastructure changes
Lesson 709Workflow Automation and CI/CD Integration
Platform as Product Mindset
flips this: your internal platform *is* a product, and your developers are your customers.
Lesson 2915Platform as Product Mindset
Platform Flexibility
While Istio and Linkerd focus primarily on Kubernetes, Consul natively supports mixed environments—containerized workloads alongside traditional VMs or bare metal.
Lesson 1593Consul Service Mesh Fundamentals
Platform information
Target architecture (amd64, arm64) and operating system
Lesson 980Image Manifest and Metadata
Platform Product Manager
Defines vision, prioritizes features, measures success
Lesson 2937Platform Team Structure and Responsibilities
Platform-level cost optimization
(negotiating enterprise discounts, Reserved Instances, Savings Plans)
Lesson 2954Shared Responsibility Model
Platforms have roadmaps
Prioritize features, track adoption, deprecate unused services—just like any product team.
Lesson 2915Platform as Product Mindset
Plugin Installation
Jenkins offers suggested plugins (version control, build tools, notifications) or lets you pick custom ones.
Lesson 1772Installing and Configuring Jenkins
plugins
(custom extensions), and enable **shell completion** (auto-finish commands) to work faster and with fewer errors.
Lesson 1144kubectl Aliases, Plugins, and Productivity TipsLesson 1775Jenkins Plugins and Extensibility
Pod
is the smallest deployable unit in Kubernetes—think of it as a wrapper around one or more containers that need to work closely together.
Lesson 1145Pod Definition and AnatomyLesson 2566Microservices on Kubernetes
pod anti-affinity
does the opposite—it pushes pods *apart*.
Lesson 1352Pod Anti-Affinity BasicsLesson 1917ArgoCD High Availability Setup
Pod CIDR (secondary range)
IP addresses allocated to pods across all nodes
Lesson 1480GKE Networking Fundamentals
Pod crashes
Use `kubectl logs <pod-name>` to view the final messages before termination.
Lesson 1444Troubleshooting with Logs
Pod disruption budgets
Ensure safe scale-downs
Lesson 2984Container Cost Optimization
Pod resource requests matter
Cluster Autoscaler uses your pod's `requests` (not limits) to calculate how many nodes are needed
Lesson 1458Cluster Autoscaler Integration
Pod Security Admission Controller
is a built-in Kubernetes feature that automatically validates pods against these standards when they're created or updated.
Lesson 1399Pod Security Admission Controller
Pod Security Context
is a set of security configurations you attach to an entire pod—not just one container.
Lesson 1389Pod Security Context OverviewLesson 1390Container Security ContextLesson 1391Running as Non-Root Users
Pod template
The blueprint for creating new Pods (with labels, container specs, etc.
Lesson 1155ReplicaSet Purpose and Architecture
Pod template spec
Defines the container(s) to run, just like in Deployments
Lesson 1191Kubernetes Job Resource Fundamentals
PodDisruptionBudgets are respected
The scheduler won't violate PDBs during preemption when possible.
Lesson 1371Pod Preemption Behavior
Pods 3 and 4
will update to the new template immediately
Lesson 1183Partition-Based Rolling Updates
Point of Presence (PoP)
is a physical data center location where CDN infrastructure exists.
Lesson 583CDN Architecture and Points of Presence
Point your DNS records
(like a CNAME or A record) to the API Gateway domain name
Lesson 541Custom Domain Names and TLS
Point-in-Time Recovery (PITR)
, you can rewind your database to 2:46 PM — exactly one minute before the mistake — and recover your data without losing any other changes made that day.
Lesson 423Point-in-Time RecoveryLesson 444NoSQL Backup, Point-in-Time Recovery, and TTL
Point-to-Point Ethernet
Dedicated layer 2 connection from your datacenter
Lesson 2215Azure ExpressRoute Fundamentals
Points of Presence (PoPs)
is the broader term that includes edge locations plus network connection points where cloud providers connect to internet service providers.
Lesson 10Edge Locations and Points of Presence
Policies and procedures
define *what* you do and *how*.
Lesson 2333Compliance Documentation and Evidence
Policy
"Can access patient records, administer medication, but cannot approve surgeries" (the permissions document)
Lesson 352Roles vs PoliciesLesson 2338Open Policy Agent (OPA) FundamentalsLesson 2890Open Policy Agent (OPA) Introduction
Policy compliance
Does your infrastructure meet organizational standards?
Lesson 721Continuous Integration for IaCLesson 1409Validating Admission Webhooks
Policy Consistency
Security policies, network rules, and RBAC should be standardized where possible
Lesson 1513Multi-Cluster Management
Policy control
– You define who can use your keys via IAM and key policies
Lesson 2300Server-Side Encryption with Customer-Managed Keys
Policy Coverage
Percentage of infrastructure under policy enforcement
Lesson 2901Policy Reporting and Remediation
policy definition
(templates) from **policy enforcement** (constraints), enabling reusability and governance at scale.
Lesson 1413OPA Gatekeeper ArchitectureLesson 2335Introduction to Compliance as CodeLesson 2343Azure Policy for Compliance Automation
Policy Denied Logs
capture when GCP denies an action due to security policy violations.
Lesson 2360Google Cloud Audit Logs Types
Policy Enforcement Levels
Policies can be `advisory` (warning only), `soft-mandatory` (blockable by override), or `hard- mandatory` (absolute block).
Lesson 2341Terraform Sentinel Overview
Policy interactions
How multiple policies affect the same resource
Lesson 2899Policy Testing and Validation
Policy Language
Sentinel uses its own domain-specific language designed for expressing rules.
Lesson 2341Terraform Sentinel Overview
Policy libraries
are centralized collections of pre-written, tested compliance policies that multiple teams can import and apply to their infrastructure.
Lesson 2347Policy Libraries and Reusability
Policy organization patterns
keep your policies maintainable as your cluster grows.
Lesson 1246NetworkPolicy Best Practices
Policy syntax
follows this pattern:
Lesson 1890ArgoCD RBAC and User Management
Policy variables
are placeholders in your IAM policies that get replaced with actual values at request time.
Lesson 367Policy Variables and Dynamic Policies
Policy violations
Resources in wrong regions, unapproved instance types, missing tags
Lesson 695IaC Security and Compliance Benefits
policy-as-code framework
integrated with Terraform Cloud and Terraform Enterprise.
Lesson 837Policy Enforcement with SentinelLesson 2894Sentinel for Terraform Introduction
Policy-based routing
that considers application requirements and SLAs
Lesson 2209SD-WAN Integration with Cloud
Policy-driven scheduling
enforcing your retention rules automatically
Lesson 2423VM and Volume Backup Strategies
Pool Size
Set minimum and maximum connections based on your workload.
Lesson 450Connection Pooling and ManagementLesson 2548Connection Pooling and Reuse
Poor user experience
during deployments or after cache invalidation
Lesson 2707Cache Warming Strategies
PoP
The physical facility housing infrastructure
Lesson 583CDN Architecture and Points of Presence
Popular stale content
Consider adjusting `stale-while-revalidate` policies
Lesson 2680CDN Cache Analytics and Hit Rates
Port fees
– Fixed monthly cost for the physical connection itself (varies by bandwidth: 1Gbps, 10Gbps, 100Gbps)
Lesson 2224Private Connectivity Cost Management
portable
it works the same way locally, in Kubernetes, on EC2, or anywhere containers run.
Lesson 666Cloud-Native Logging StandardsLesson 867Pseudo ParametersLesson 973What is a Container Image?
Portal Usage Metrics
tell you *who* is using *what*:
Lesson 2936Portal Metrics and Adoption
Portfolio management
treats all your commitments holistically, optimizing coverage and utilization enterprise-wide.
Lesson 2976Reserved Instance Portfolio Management
Ports
Which protocol (TCP/UDP) and port numbers are allowed
Lesson 1237Ingress Rules Basics
Post-build
Tag the image appropriately and push it to your ECR repository
Lesson 1830CodeBuild with Docker and ECR
post-build actions
are what you do after cooking (garnish, plate, clean up).
Lesson 1776Build Steps and Post-Build ActionsLesson 1780Workspace Management and Build Artifacts
Post-cutover
After applications connect, verifying read/write operations
Lesson 2830Data Validation and Consistency Checks
Post-deployment verification
confirms runtime state matches policies
Lesson 2345Continuous Compliance Scanning
Post-incident time off
Grant recovery time after major incidents
Lesson 2127On-Call Rotation Structures
PostSync
Executes after all resources sync successfully.
Lesson 1899Resource Hooks
Powerful query language
(PromQL) for flexible analysis
Lesson 1946What is Prometheus and Why It Matters
PowerShell
act as the deployment engines that understand Bicep natively.
Lesson 922Bicep Tooling and CLI
PR-Based Workflows
Developers submit infrastructure requests via pull requests to a central repository.
Lesson 2926Self-Service Infrastructure Patterns
Practical impact
If a user updates their profile on the primary, then immediately refreshes the page (hitting a replica), they might see their old data for a few seconds.
Lesson 419Read Replica Lag and Consistency
Pre-aggregate with Recording Rules
If you repeatedly run complex queries, use recording rules to pre-compute them.
Lesson 1976Query Optimization and Best Practices
Pre-allocates
a pool of Elastic Network Interfaces (ENIs) to the node
Lesson 1470Amazon VPC CNI Plugin
Pre-build
Authenticate to ECR and pull any base images needed
Lesson 1830CodeBuild with Docker and ECR
Pre-commit hooks
catch obvious violations locally
Lesson 2345Continuous Compliance Scanning
Pre-configured images
Supports multiple languages and runtimes out-of-the-box
Lesson 1812CodeBuild: Managed Build Service Overview
Pre-configured templates
that follow security and compliance policies
Lesson 2917Golden Paths and Paved RoadsLesson 2940Golden Paths and Paved Roads
Pre-cutover
During replication lag monitoring
Lesson 2830Data Validation and Consistency Checks
Pre-defined permissions
You cannot modify the policy attached to these roles
Lesson 357Service-Linked Roles
Pre-deployment gate
blocks releases that fail compliance checks
Lesson 2345Continuous Compliance Scanning
Pre-production focus
Primarily in dev/staging environments
Lesson 2491Chaos Engineering vs Traditional Testing
Pre-production validation
where your staging environment processes actual request shapes.
Lesson 1609Traffic Mirroring (Shadowing)
pre-signed URL
is a special web address that includes temporary authorization credentials embedded directly in the URL itself.
Lesson 154Object URLs and Pre-Signed URLsLesson 165Pre-Signed URLs and Temporary Access
Pre-warmed applications
Keep applications loaded in memory for faster activation without full boot cycles
Lesson 88VM Hibernation
Precise attribution
Map costs to teams, projects, or customers using tags at the finest grain
Lesson 2172AWS Cost and Usage Reports
Predefined
Your default choice (90%+ of cases)
Lesson 392GCP IAM Roles: Basic, Predefined, Custom
Predefined roles
handle common scenarios:
Lesson 2319GCP Cloud KMS IAM and Permissions
Predictable endpoints
Hard-coded integrations remain stable
Lesson 266Static IP and Elastic IP Support
Predictable initialization
Database replicas can initialize in order, with replicas waiting for the primary
Lesson 1179Ordered Deployment and Scaling
Predictable performance
No "noisy neighbors" competing for resources
Lesson 21Private Cloud Deployment ModelLesson 1334Setting CPU Limits
Predictable pod names
following the pattern `<statefulset-name>-<ordinal>` (e.
Lesson 1178Pod Identity in StatefulSets
Predictable schedules
Publish rotations weeks in advance
Lesson 2127On-Call Rotation Structures
Predictable throughput
Guaranteed bandwidth from 50 Mbps to 100+ Gbps
Lesson 2811Network Optimization for Migration
Predictable traffic
patterns
Lesson 2532DynamoDB Capacity Modes
Predictable variable costs
Your bill reflects actual business activity
Lesson 30Pay-as-You-Go Pricing Model Fundamentals
Predictive Refresh
) pattern solves a problem with traditional caching: when popular data expires, the next request suffers a cache miss and must fetch from the slower backend.
Lesson 2701Refresh-Ahead Caching Pattern
Predictive scaling
flips this model by using machine learning to analyze historical traffic patterns and predict future demand, then scaling resources **proactively** before traffic spikes hit.
Lesson 302Predictive Scaling Fundamentals
Predictive warm-up
involves invoking functions just before anticipated load spikes—for example, warming up 30 seconds before a known batch job or traffic surge.
Lesson 2544Cold Start Mitigation Strategies
Preemptible VMs
(older model) and **Spot VMs** (newer, more flexible model).
Lesson 104GCP Preemptible and Spot VMs
Preemption is not immediate
There's a delay while lower-priority pods terminate gracefully.
Lesson 1371Pod Preemption Behavior
Prefect
modernizes this with better error handling and simpler state management.
Lesson 2626Workflow Orchestration Tools
Preferences
("I'd prefer SSD, but HDD is acceptable")
Lesson 1346Node Affinity vs Node Selector
Preferred rules
guide optimization while maintaining cluster utilization
Lesson 1354Required vs Preferred Pod Affinity
Prefix
Matches if the URL path *begins* with the specified path
Lesson 1223Basic Ingress Rules and PathsLesson 1228Path Types and Matching
Premium
Enterprise-grade tier offering geo-replication across multiple Azure regions, content trust for image signing, private link support for VNet integration, and highest throughput limits for large- scale deployments.
Lesson 1090Azure Container Registry (ACR) OverviewLesson 2691Azure Cache for Redis
Premium network connectivity
for rapid data synchronization
Lesson 2409Relationship Between RTO, RPO, and Cost
Premium_LRS
Premium SSD, locally redundant, production workloads
Lesson 1311Azure Disk StorageClasses
Preserved across service boundaries
through trace context propagation
Lesson 2069Correlation with Logs and Metrics
Presto
, and **Spark SQL** read directly from Parquet, ORC, or CSV files organized in your data lake zones, executing SQL queries without copying data into a separate database.
Lesson 2640Query Engines for Data LakesLesson 2657Amazon Athena Fundamentals
PreSync
Runs before the sync operation starts.
Lesson 1899Resource Hooks
Prevent abuse
from malicious actors attempting DDoS attacks or scraping
Lesson 2385Rate Limiting and Throttling
Prevent backend overload
before expensive compute resources get hit
Lesson 282Rate Limiting and Throttling at Load Balancer
Prevent deletion
of stateful resources during updates
Lesson 856Stack Policies for Update Protection
Prevention
Stop violations before they're deployed rather than detecting them afterward
Lesson 2888Policy as Code Fundamentals
Prevention mode
Actively blocks malicious requests
Lesson 2370Azure WAF Overview
Prevention Mode (Block)
The WAF actively blocks traffic matching your rules.
Lesson 2367WAF Rule Types and Modes
Prevents accidental exposure
in logs or screenshots
Lesson 766Sensitive Outputs
Prevents cascading failures
during rollouts
Lesson 1173MinReadySeconds and Stability
Prevents Configuration Drift
When administrators manually modify running systems, configurations diverge from the documented baseline.
Lesson 2838Immutable Infrastructure for Security
Prevents runtime tampering
with binaries or scripts
Lesson 1392Read-Only Root Filesystem
preview
before making any real changes to your infrastructure.
Lesson 698Planning and PreviewLesson 941Deployment Lifecycle Operations
Previous stage results
(deploy only if tests passed)
Lesson 1661Conditional Execution Pattern
Price-capacity-optimized
Balances cost and interruption risk
Lesson 2978Spot Instance Fleet Management
Pricing data
The rates applied to your resources
Lesson 2178GCP Billing Exports to BigQuery
Pricing Model
You pay based on two factors:
Lesson 2664Google BigQuery as Serverless Query Engine
Primary controller
Handles all active requests and orchestrates builds
Lesson 1802Jenkins High Availability Architecture
Primary instance hardware failure
– Server crashes or becomes unresponsive
Lesson 416Multi-AZ Failover Process
Primary subnet range
IP addresses for nodes themselves
Lesson 1480GKE Networking Fundamentals
Primary-Replica Architecture
, changes written to the primary database must propagate to replica servers.
Lesson 2477Replication Lag and Consistency
Principals
Define *who* gets access—IAM users, service accounts, applications, or roles.
Lesson 2289Key Policies and Access Control
Prioritize
vulnerabilities by risk and business context
Lesson 2868Vulnerability Scanning and Management
Prioritize local zone
– Route to instances in the same availability zone first
Lesson 1615Locality-Aware Load Balancing
Prioritize weaknesses
by business impact (does this affect revenue-critical paths?
Lesson 2500Measuring and Improving Resilience
Priority 0
Block known malicious IPs (immediate defense)
Lesson 2369AWS WAF Rules and Rule Groups
Priority 10
Apply AWS Managed Core Rule Set
Lesson 2369AWS WAF Rules and Rule Groups
Priority 100
Count suspicious patterns (monitoring)
Lesson 2369AWS WAF Rules and Rule Groups
PriorityClass
is a cluster-level Kubernetes resource that assigns a numeric priority value to pods.
Lesson 1369PriorityClass Resources
Privacy
GDPR (Europe) and CCPA (California) dictate personal data handling
Lesson 2322Introduction to Compliance in Cloud
private
(requiring authentication) or **public** (accessible to anyone).
Lesson 154Object URLs and Pre-Signed URLsLesson 988Container Registry Fundamentals
Private by default
All ECR repositories are private unless you explicitly configure public access through ECR Public.
Lesson 1086AWS ECR Fundamentals
Private connectivity
paths (Direct Connect, ExpressRoute)
Lesson 2229MTU and Jumbo Frames
Private connectivity redundancy
means architecting multiple independent paths so that if one circuit, router, or even an entire data center fails, your traffic automatically reroutes through backup connections without disruption.
Lesson 2220Private Connectivity Redundancy
private endpoints
or **VPC endpoints** (in cloud environments).
Lesson 1081Network Security for RegistriesLesson 1517Cluster Security Hardening
Private Hosted Zone
is like an internal phone book that only works inside your virtual network.
Lesson 224Private Hosted Zones
Private Hosted Zones
(custom internal domain names), you must **associate the zone with both VPCs**.
Lesson 225DNS Resolution Between VPCs
Private images
are custom snapshots you create from configured VMs for your organization's exclusive use.
Lesson 55Public vs Private Images
Private infrastructure access
Your workflows must reach internal databases, on-premises systems, or private networks that aren't internet-accessible
Lesson 1690Self-hosted Runners Overview
Private key
Stays securely on your local machine (never share this!
Lesson 57SSH Key Pairs for Linux VMs
Private Link
(similar concepts in Azure/GCP) allows you to access cloud services—whether provider-managed (like S3, databases) or third-party SaaS—using private IP addresses from your VPC.
Lesson 221PrivateLink and Service EndpointsLesson 2397Private Link and Endpoint Services
Private network access
Jobs that must reach internal databases, APIs, or services not exposed to the internet
Lesson 1720Self-Hosted Runners
Private Registry
(Terraform Cloud/Enterprise): For organization-internal modules that shouldn't be public
Lesson 805Publishing Modules to Terraform Registry
Private Service Connect
or **VPC peering**, allowing secure communication without crossing the public internet.
Lesson 516Google Cloud Functions: VPC Connectivity and Networking
private subnet
houses resources that should remain isolated from direct internet access.
Lesson 176Public vs Private SubnetsLesson 182Subnet Route Table AssociationsLesson 189Public vs Private Subnets
Private Subnet in AZ-A
→ routes to → **NAT Gateway in AZ-A**
Lesson 194NAT Gateway High Availability
Private Subnet in AZ-B
→ routes to → **NAT Gateway in AZ-B**
Lesson 194NAT Gateway High Availability
PrivateLink
(AWS terminology) or **Private Link** (similar concepts in Azure/GCP) allows you to access cloud services—whether provider-managed (like S3, databases) or third-party SaaS—using private IP addresses from your VPC.
Lesson 221PrivateLink and Service Endpoints
Privilege creep
Users accumulating permissions they no longer need
Lesson 360Auditing Group and Role Membership
Privilege escalation
Unexpected `AttachUserPolicy` or role assumption
Lesson 2865CloudTrail and Audit Logging for Security
Privilege escalation attempts
– Someone adding admin permissions to their account or creating new privileged identities deserves immediate attention.
Lesson 2356Real-Time Audit Log Monitoring
Privilege escalation controls
(allowPrivilegeEscalation)
Lesson 1389Pod Security Context Overview
Privileged Access Management
and **Multi-Factor Authentication**, federation becomes a cornerstone of Zero Trust architecture, treating **identity as the security perimeter**.
Lesson 2852Identity Federation and SSO
privileged container
runs with nearly all the capabilities of the host machine—essentially running as root on the underlying node.
Lesson 1394Privileged ContainersLesson 1395Linux Capabilities
Proactive monitoring and alerting
is like having sensors that notify you when the temperature starts climbing, giving you time to pull over safely.
Lesson 457Monitoring and Alerting for Performance
Proceeds or stops
based on the reviewer's decision (approve/reject)
Lesson 1844Manual Approval Actions
Process checks
Is the database process running?
Lesson 2482Failover Detection Mechanisms
Process CPU usage
(which processes are consuming resources)
Lesson 411Enhanced Monitoring
Process events
to build read models or projections
Lesson 2508Event Sourcing with Functions
Process Inspection
Environment variables are visible to any process inspection tool (`ps`, `/proc` filesystem).
Lesson 2270Environment Variables for Secrets
Processing complexity imbalance
A producer sends lightweight JSON messages instantly, while the consumer performs database writes or external API calls
Lesson 2740Understanding Backpressure in Distributed Systems
Processing data locally
near IoT devices, sensors, or users
Lesson 25Edge and Distributed Cloud
Processing happens
Consumer works on the task
Lesson 2713Message Visibility and Acknowledgment
Processing Power
The Collector can batch data for efficiency, sample high-volume traces, enrich spans with additional context, filter sensitive information, and transform data formats before export.
Lesson 2081OpenTelemetry Collector Fundamentals
Processing Time
is when your streaming system receives and processes that event.
Lesson 2604Event Time vs Processing Time
Processing time variance
How much work time fluctuates
Lesson 2742Queue Depth and Capacity Planning
Processing timeouts
Messages that consistently take too long
Lesson 553Dead Letter Queues
producer
) needs to send work to another service (the **consumer**), it doesn't call the consumer directly.
Lesson 550Message Queue FundamentalsLesson 568Event Producers and Consumers
Producer function
receives the request, validates it, writes a message to a queue, and returns immediately
Lesson 2505Async Processing with Queues
Producer rate
Messages/second being added
Lesson 2742Queue Depth and Capacity Planning
producers
are services or components that detect something meaningful happening and publish an event to notify other parts of the system.
Lesson 568Event Producers and ConsumersLesson 2609Kafka Producers and ConsumersLesson 2710Message Queue Fundamentals Revisited
Produces deployment artifacts
(JAR files, Docker images, ZIP archives)
Lesson 1822CodeBuild Overview and Core Concepts
Product Catalog Service
– manages product information
Lesson 2560Service Boundaries and Decomposition
Product categories
for retail datasets
Lesson 2622Batch Data Partitioning
Product launches
– Major releases where traffic spikes immediately
Lesson 2676Cache-Warming and Preloading
Production data
in your primary region
Lesson 2418The 3-2-1 Backup Rule
Production databases
from accidental replacement
Lesson 880Stack Policies
Production environment
The same container image that passed all tests gets deployed to production, guaranteeing consistency.
Lesson 965Container Portability BenefitsLesson 1667Multi-Environment PromotionLesson 1672Artifact Lifecycle
Production mindset
Often runs in production with safety guardrails
Lesson 2491Chaos Engineering vs Traditional Testing
Production parity
Development containers can mirror production configurations closely, catching environment- specific bugs early.
Lesson 970Developer Workflow Improvements
Production Profile
(similar to default, but hardened)
Lesson 1586Istio Configuration Profiles
Production promotion
happens after staging validation (often requires manual gate)
Lesson 1651Environment Promotion Strategies
Production stacks
with critical resources
Lesson 885Stack Termination Protection
Production systems
Token-based auth with automatic rotation
Lesson 1068Registry Authentication Methods
Production with moderate traffic
General-purpose medium or large
Lesson 399Database Instance Classes
Programmatic access
Use billing APIs to pull data into your own systems
Lesson 2151Custom Cost Reports and Export
Progressive Disclosure
Show high-level summaries prominently; drill-down details can be smaller or lower on the page.
Lesson 2101Information Hierarchy and LayoutLesson 2943Platform Documentation and Onboarding
Progressive rollout
Activate for 5% of users, then 25%, then 100%
Lesson 1666Feature Flag Integration
Progressive rollouts
combine canary principles with automated rollback triggers based on metrics, which you can implement with **workflow APIs** and external monitoring integration.
Lesson 1725Deployment Strategies and Blue-Green Patterns
Progressive security policies
Add authorization policies service-by-service
Lesson 1601Service Mesh Adoption Patterns
Progressive validation
Test in lower environments before production
Lesson 1868Environment Promotion Patterns
Project level
and apply to all applications within that project.
Lesson 1898Sync Windows
Project scope
Limited to specific folders or projects
Lesson 1777Jenkins Credentials Management
Project teams
Detailed task status, blockers, dependencies
Lesson 2818Migration Progress Tracking and Reporting
Project-based Matrix
combines both: global permissions plus per-job overrides.
Lesson 1781Jenkins User Management and Security
Project/Group level
Through GitLab's UI settings
Lesson 1736Environment Variables in GitLab CI
Prometheus Operator
transforms this operational burden into declarative, Kubernetes-native workflows.
Lesson 1989Prometheus Operator for Kubernetes
Prometheus scrapes metrics
it actively pulls them from HTTP endpoints at regular intervals.
Lesson 1953Scraping and Service Discovery
Prometheus URL
for metadata queries
Lesson 1983Thanos Sidecar and Object Storage
Promotion Logic
Move the artifact by updating its tags/metadata, not by copying or rebuilding
Lesson 1676Artifact Promotion Patterns
Prompts for confirmation
before proceeding
Lesson 780terraform destroy Workflow
PromQL
(Prometheus Query Language) returns data in two forms:
Lesson 1962PromQL Basics and Data Model
PromQL expression
to evaluate
Lesson 1957Recording Rules
Proof of ongoing operation
demonstrates continuous compliance.
Lesson 2333Compliance Documentation and Evidence
Properties/Attributes
Specifications for each resource (size, region, name)
Lesson 697Configuration Files and Syntax
Protect backend resources
from being overwhelmed by legitimate traffic spikes
Lesson 2385Rate Limiting and Throttling
Protect databases
from accidental replacement or deletion
Lesson 856Stack Policies for Update Protection
Protect downstream systems
Prevent cascading delays in event-driven architectures
Lesson 476Function Timeout Configuration
Protected deletion
You can only delete them when no resources are using the service
Lesson 357Service-Linked Roles
Protected Health Information (PHI)
any individually identifiable health data such as medical records, diagnoses, treatment plans, or billing information.
Lesson 2327HIPAA for Healthcare Data
Protected media streaming
Distribute video content that expires after viewing
Lesson 165Pre-Signed URLs and Temporary Access
Protected variables
only expose to pipelines running on protected branches (like `main` or `production`).
Lesson 1763Custom CI/CD Variables and Inheritance
Protection against accidental changes
– Prevents unintended updates that could disrupt running applications
Lesson 1255Immutable ConfigMaps
Protection against runaway processes
that could monopolize resources
Lesson 1334Setting CPU Limits
Protocol agnostic
works with any TCP/UDP traffic
Lesson 263Layer 4 vs Layer 7 Load Balancing
Protocol compatibility
Forwards seamlessly to Fluentd using the Forward protocol
Lesson 2027Fluent Bit for Edge Collection
Protocol hints
Indicating the original visitor's protocol with `X-Forwarded-Proto: https`
Lesson 599Custom Headers and Origin Requests
Protocol Overhead
Chatty protocols that require multiple round-trips amplify latency problems.
Lesson 2789Network Performance and Latency Considerations
Protocol Support
NLBs work with any TCP or UDP traffic—not just HTTP/HTTPS.
Lesson 235Network Load Balancers (Layer 4)
Protocol types
(HTTP, gRPC, TCP)
Lesson 1639Service Dependency Mapping
Protocol validation
to block malformed requests
Lesson 2388Anycast and Traffic Scrubbing
Prototyping
Quickly spinning up multi-container architectures
Lesson 1059Compose Best Practices and Limitations
Prove value incrementally
before committing fully
Lesson 2514Strangler Fig Pattern for Migration
Provide a second verification
from one of these methods:
Lesson 342Multi-Factor Authentication (MFA) Basics
Provider approves
the connection (optional)
Lesson 2397Private Link and Endpoint Services
Provider console
Verify VM health, security groups (EKS), firewall rules (GKE), or NSG rules (AKS)
Lesson 1519Troubleshooting Common Cluster Issues
Provider locations
Different cloud provider edge sites (PoPs)
Lesson 2220Private Connectivity Redundancy
Provider plugins
for each secrets backend (Vault, AWS, Azure, GCP)
Lesson 2276Secrets Store CSI Driver
Provider secures
Physical datacenters, network infrastructure, hypervisor, hardware
Lesson 2842Shared Responsibility Model
Provider type
(AWS Secrets Manager, Vault, Azure Key Vault, etc.
Lesson 1278SecretStore Resource
Provider verifies
The provider team runs the contract against their service, proving they satisfy all consumer expectations
Lesson 2585Contract Testing and API Contracts
Provider-agnostic interface
across multiple secret backends
Lesson 2276Secrets Store CSI Driver
Provider-Managed Keys
The cloud platform generates, stores, and manages encryption keys for you automatically.
Lesson 130Volume Encryption
Providers
AWS Route 53, Azure Traffic Manager, Google Cloud DNS, and third-party services like Cloudflare or NS1.
Lesson 2783Global Load Balancing Across Clouds
Provides pre-built dashboards
Out-of-the-box views for cluster health, workload performance, and resource utilization
Lesson 1487GKE Monitoring with Cloud Monitoring
Providing an identifier
(like the resource's physical ID or ARN)
Lesson 891Stack Import Operations
Providing better tooling
Built-in IntelliSense and validation
Lesson 920Introduction to Bicep
Provision a machine
(physical, VM, or container) running Linux, Windows, or macOS
Lesson 1720Self-Hosted Runners
Provision green environment
Creates new instances with your updated application
Lesson 1835Blue/Green Deployments with CodeDeploy
Provisioned capacity mode
requires you to specify exactly how many read and write operations per second your table will handle.
Lesson 432DynamoDB Capacity Modes: Provisioned vs On-Demand
Provisioned Concurrency
goes further: it keeps a specified number of function instances *initialized and ready* at all times.
Lesson 479Reserved and Provisioned ConcurrencyLesson 493Provisioned ConcurrencyLesson 2544Cold Start Mitigation StrategiesLesson 2550Concurrency Management
Provisioned IOPS SSD
Guarantees consistent high IOPS for demanding applications (think e-commerce during peak hours)
Lesson 454Database Storage Performance
Provisioning
is the actual process of allocating and configuring resources.
Lesson 699Apply and Provisioning
Provisioning EC2 instances
with the right instance types
Lesson 96AWS Elastic Beanstalk Introduction
Provisions
a clean build environment using a Docker image
Lesson 1812CodeBuild: Managed Build Service Overview
Proxy injector
Automates sidecar injection into pods
Lesson 1591Linkerd Overview and Architecture
ProxySQL
(for MySQL) sit between your app and the database, managing connections and providing a stable interface.
Lesson 2770Database Abstraction Strategies
Prune
tells ArgoCD to delete resources from the cluster when they're removed from Git.
Lesson 1886Self-Heal and Prune Options
Pub/Sub
publishes a message to initiate rotation
Lesson 2247GCP Secret Manager Rotation Strategies
Pub/Sub Triggers
Messages published to a Pub/Sub topic automatically invoke your function.
Lesson 515Google Cloud Functions: Event-Driven Architecture
Public Bicep Registries
host community-maintained modules that anyone can use.
Lesson 929Module Registries
public images
provided by cloud vendors or the community, or create **custom images** with your specific software stack pre-configured for faster deployments.
Lesson 54Operating System Images and AMIsLesson 55Public vs Private Images
Public IP addresses
or **endpoints** for accessing deployed services
Lesson 899Outputs for Template Results
Public key
Stored on the VM you want to access
Lesson 57SSH Key Pairs for Linux VMs
Public peering
Multiple networks connect to a shared switch fabric at an IXP, exchanging traffic via BGP
Lesson 2222Private Peering and Exchange Points
Public registries
like Docker Hub's public repositories allow anyone on the internet to pull (download) your images.
Lesson 991Public vs Private Registries
Public vs. Private
Internet-facing resources isolated from internal systems
Lesson 2390Network Segmentation Fundamentals
Publish test results
Display JUnit reports in Jenkins
Lesson 1776Build Steps and Post-Build Actions
Publish-Subscribe (pub-sub) pattern
is an event-driven messaging model where publishers send events to a topic without knowing who (if anyone) will receive them, and multiple subscribers can independently receive copies of the same event.
Lesson 571Publish-Subscribe Pattern
Publisher
sends an event to a **topic** (a named channel)
Lesson 571Publish-Subscribe PatternLesson 2578Event-Driven Communication
Pull (read)
Download images—most restrictive, suitable for production workloads
Lesson 1080Registry Access Control and RBAC
Pull delivery
Your application actively fetches messages when ready.
Lesson 562Google Cloud Pub/Sub
pull model
, your monitoring system periodically connects to your services and scrapes metrics from an exposed endpoint.
Lesson 636Metric Collection MethodsLesson 1727GitLab CI/CD Architecture OverviewLesson 2609Kafka Producers and Consumers
Pull request generator
Creates temp apps for each PR
Lesson 1907ApplicationSets for Dynamic Applications
Pull Request Workflow
Accept contributions through standard PR processes with clear review criteria.
Lesson 2944Inner Source and Contribution Models
Pull request workflows
Review dashboard changes like code
Lesson 2111Dashboard as Code and Version Control
Pull requests
become the standard way to propose infrastructure changes, creating accountability and reducing errors.
Lesson 687IaC Benefits: Version Control and Collaboration
pull-based
deployment, unlike traditional CI/CD that pushes changes.
Lesson 1854The Four Principles of GitOpsLesson 1865Pull-Based vs Push-Based GitOps
pull-based model
is considered more aligned with GitOps principles because it implements **continuous reconciliation** (principle #4 we learned earlier).
Lesson 1865Pull-Based vs Push-Based GitOpsLesson 1869GitOps Reconciliation LoopLesson 1877What is ArgoCD and GitOps CDLesson 1919Introduction to Flux and GitOps Philosophy
Pull-based scraping
that works well with Kubernetes service discovery
Lesson 1946What is Prometheus and Why It Matters
pull-through cache
(or **registry mirror**) acts as a local intermediary between your container hosts and the upstream registry.
Lesson 997Registry Mirroring and CachingLesson 1097Registry Mirroring and Caching
Pulls only missing layers
from the registry
Lesson 994Pulling Images from Registries
Pulls your source
from repositories like CodeCommit, GitHub, or S3
Lesson 1822CodeBuild Overview and Core Concepts
Purchase options
Percentage split between on-demand and spot (e.
Lesson 309Mixed Instance Policies
Purge
Fast, reliable, but can cause origin stampedes if many users request simultaneously
Lesson 2675Cache Invalidation Strategies
Purge protection
settings can prevent even administrators from bypassing recovery windows
Lesson 2291Key Deletion and Recovery
Purpose Limitation
Data collected for one purpose can't be repurposed without consent.
Lesson 2328GDPR Data Protection Requirements
Push (write)
Upload new images or tags—needed by build pipelines
Lesson 1080Registry Access Control and RBAC
Push delivery
Pub/Sub sends messages to a webhook endpoint you configure (like an HTTP endpoint or Cloud Function).
Lesson 562Google Cloud Pub/Sub
Push receivers
Accept logs pushed via HTTP
Lesson 2037Promtail Log Collection and Pipelines
pushes
changes into your infrastructure—a CI server authenticates to your cluster, runs `kubectl apply`, and forces the new state.
Lesson 1857Pull-Based Deployment ModelLesson 1865Pull-Based vs Push-Based GitOps
Pushgateway
acts as a **holding area**—these jobs push their metrics here, and Prometheus scrapes the gateway.
Lesson 1947Prometheus Architecture ComponentsLesson 1959Pushgateway for Short-Lived Jobs
PUT operation
uploads data to create or replace an object in a bucket.
Lesson 153Basic Object Operations
PySpark
(the Python API for Apache Spark).
Lesson 2647Glue ETL Script Development

Q

Quality control
Only tested, reviewed modules are published
Lesson 843Module Registry and Versioning
Quality of Service class
(from lesson 1336): BestEffort pods go first, then Burstable, and finally Guaranteed pods are evicted only as a last resort.
Lesson 1341OOMKilled and Memory Pressure
Quality of Service Classes
, you saw how individual pods get priority.
Lesson 1337Resource Quota Basics
quantiles
(like "95% of requests completed within X seconds") using functions like `histogram_quantile()`.
Lesson 1951Metric Types: HistogramLesson 1973Histogram and Quantile Queries
Quarantine instances
by applying restrictive tags or moving them to isolated subnets
Lesson 2871Automated Incident Response
Quarantine Pattern
Route invalid records to a separate "dead letter" location (like an S3 bucket or database table) for investigation rather than failing the entire job.
Lesson 2624Data Quality in Batch Pipelines
Quarterly
Reassess architectural patterns, renegotiate commitments, adjust showback/chargeback
Lesson 2167Continuous Optimization Process
Quarterly reviews
Remove unused policies
Lesson 375Policy Documentation and Governance
Quay.io
, and **GitHub Container Registry** allow anyone to pull (download) images without authentication.
Lesson 1062Public vs Private Registries
Querier
Provides a **unified query interface** that aggregates data from multiple Sidecars and Store Gateways.
Lesson 1982Thanos Architecture OverviewLesson 2035Loki Components and Deployment Modes
Queries your cloud provider
(AWS, Azure, GCP) to check the current real-world status
Lesson 774What is Terraform State
Query API
Flexible queries against cost and usage data with filters, grouping, and aggregation
Lesson 2176Azure Cost Exports and APIs
Query Cache
(where supported) stores results of frequently executed queries.
Lesson 451Database Parameter Tuning
Query caching
Repeated queries return cached results instantly
Lesson 1984Thanos Query and Query Frontend
Query Capabilities
KQL (Kibana Query Language) and Elasticsearch queries provide rich, flexible searching across all log content.
Lesson 2045Comparing Logging Solution Trade-offs
Query existing infrastructure
that's managed elsewhere or already exists
Lesson 753When to Use Resources vs Data Sources
Query layer
Implement role-based access control (RBAC) so users can only query their tenant's data
Lesson 2058Multi-Tenancy and Log IsolationLesson 2088Tracing Backend Architecture
Query mode
– Exposes an API that Thanos Query can use to retrieve historical data from object storage
Lesson 1983Thanos Sidecar and Object Storage
Query Performance Insight
for similar visibility, and Google Cloud provides **Query Insights** for Cloud SQL.
Lesson 456Performance Insights and Diagnostics Tools
Query processing
Cost per TB of data scanned by your queries
Lesson 2664Google BigQuery as Serverless Query Engine
Query response time
Slow storage means queries take longer, even with perfect indexes
Lesson 454Database Storage Performance
Query results
List all Kubernetes namespaces, AWS regions, or service names from your metrics
Lesson 2107Dashboard Variables and Filters
Query Rewriting
means restructuring SQL to achieve the same result more efficiently.
Lesson 449Query Optimization Techniques
Query service
and **UI** provide trace retrieval and visualization
Lesson 2090Jaeger Deployment Models
Query specific fields
Find all logins for a particular user instantly
Lesson 654Structured vs Unstructured LogsLesson 2047Structured Logging in Applications
Query splitting
Large time-range queries are broken into smaller chunks, processed in parallel, and reassembled
Lesson 1984Thanos Query and Query Frontend
Query String Forwarding
determines which parameters are passed to your origin.
Lesson 598Query String and Cookie Forwarding
Query string handling
Whether to include query parameters in cache keys
Lesson 595Cache Behavior Configuration
Query string sorting
Alphabetize parameters so `?
Lesson 607Cache Key Normalization
Query variables
Populated by running a query against your data source (e.
Lesson 1998Variables and Templating
Query-based
Pull events from a data source (like Prometheus) that match certain conditions
Lesson 2000Annotations and Time Range Controls
Query/Pattern
What you're searching for
Lesson 2016Log Alerting Basics
Queue Depth
How many I/O operations are waiting to be processed.
Lesson 136Volume Monitoring and MetricsLesson 1950Metric Types: Gauge
Queue length
Monitor for sustained growth indicating under-provisioning
Lesson 1806Performance Tuning and Resource Management
Queue messages
– A task is added to a queue
Lesson 462Event-Driven Execution Model
Queue triggers
React to messages in Azure Storage Queues or Service Bus
Lesson 511Azure Functions: Bindings and Triggers
queued
(delayed until capacity frees up), depending on the invocation type and configuration.
Lesson 478Function Concurrency LimitsLesson 1694Workflow Status and Logs
Quick action
Drain and replace problematic nodes with fresh ones from your node pool.
Lesson 1519Troubleshooting Common Cluster Issues
Quick cloud benefits
You immediately gain cloud advantages like improved hardware, better disaster recovery options, and pay-as-you-go pricing.
Lesson 2792Rehost (Lift-and-Shift) Strategy
Quick Deployment Cycles
Push a new version of your app and have it running in production within seconds, not minutes.
Lesson 967Fast Startup and Scaling
Quick fixes
Update a single broken component
Lesson 781Targeting Specific Resources
Quick rollback
if metrics degrade
Lesson 1665Canary Deployment Pattern
Quick rollback path
Can you demote and re-promote?
Lesson 2484Manual Failover Procedures
Quick Tasks
let you build an image on-demand in Azure without local Docker installed:
Lesson 1091ACR Tasks and Automated Builds
Quick testing
during development
Lesson 1261Creating Secrets from Literals
Quick testing environments
Clone production data for debugging
Lesson 1321Volume Cloning
Quota
total requests allowed per day/week/month
Lesson 2540Serverless API Rate Limiting and Throttling
Quota limits
Total requests allowed over a time period (e.
Lesson 540API Keys and Usage Plans
Quoted Strings
are your everyday text values wrapped in double quotes:
Lesson 732String Literals and String Interpolation

R

Race conditions
where two operations interfere with each other
Lesson 777State Locking Fundamentals
Rack-level domains
Servers sharing physical power/networking
Lesson 2452Fault Domains and Isolation Boundaries
Random
Selects instances randomly.
Lesson 1569Load Balancing in Service Mesh
Random access
means jumping to different locations unpredictably—like flipping through a dictionary to look up specific words.
Lesson 119Storage Access Patterns and Workload Types
Random Port Publishing
When you run `docker container run -P` (capital P), Docker will publish all `EXPOSE`d ports to random host ports
Lesson 1007EXPOSE: Port Documentation
Random read/write patterns
dominate your workload
Lesson 123Comparing Storage Types: When to Use What
Random selection
If still tied, pick randomly
Lesson 319ASG Termination Policies
Random small reads/writes
(database operations) stress IOPS
Lesson 134Volume Performance Optimization
Range partitioning
Divide keys into ranges (A-M goes to partition 1, N-Z to partition 2)
Lesson 2607Stream Partitioning and Parallelism
Range requests
let clients ask for specific byte ranges of a file instead of the entire thing, and the server responds with **partial content** (HTTP 206 status).
Lesson 606Range Requests and Partial Content
Range vector
Time-series data over a specified time window.
Lesson 1962PromQL Basics and Data Model
Range-based
Orders from 2020-2022 on Shard A, 2023-2024 on Shard B
Lesson 455Partitioning and Sharding Strategies
Ransomware isolation
Attackers who compromise your primary cloud account won't automatically have access to backups in a different provider with separate credentials.
Lesson 2788Multicloud Backup and Archive
Rapid detection
Use aggressive health check intervals (every 5-10 seconds)
Lesson 2456Failover Mechanisms and Automation
Rapid environment creation
With IaC, creating identical environments becomes trivial.
Lesson 688IaC Benefits: Speed and Efficiency
Rapid Horizontal Scaling
Need to handle a traffic spike?
Lesson 967Fast Startup and Scaling
Rate profiles
Legitimate bots follow predictable patterns; malicious ones spike irregularly
Lesson 2372Rate Limiting and Bot Management
Rate-based
Limit to 100 logs per second per service
Lesson 2056Log Sampling and Filtering
Raw disk access
When applications need direct control over storage layout
Lesson 124Block Storage Overview
Raw/Landing Zone
Ingested data lands here untouched
Lesson 2627Data Lake Concepts and Architecture
RBAC
(Role-Based Access Control) is Kubernetes' built-in authorization mechanism that determines whether a user, service account, or application can perform specific actions on cluster resources.
Lesson 1374Introduction to Kubernetes RBACLesson 1404Pod Security Best PracticesLesson 1918RBAC and Project-Based Access Control
RBAC policies
(covered earlier in lesson 1269) to restrict which ServiceAccounts can read specific Secrets.
Lesson 1274Secret Security Best Practices
RDB
creates point-in-time snapshots of your entire dataset at configurable intervals (e.
Lesson 2686Redis Persistence and Durability
RDB (snapshots)
Periodic dumps of the entire dataset to disk — fast recovery, but you might lose recent writes
Lesson 2684Redis Architecture and Data Structures
RDP client software
Windows includes Remote Desktop Connection built-in; Mac and Linux users need a client like Microsoft Remote Desktop
Lesson 58Windows VMs and RDP Access
RDS architecture
is the kitchen, staff, and storage system working behind the scenes so you can simply order your meal (run queries) without worrying about ingredients, cooking equipment, or cleanup.
Lesson 397RDS Architecture and Components
Re-run all jobs
Retries the entire workflow (useful for transient failures)
Lesson 1696Workflow Run History and Re-runs
Re-run failed jobs
Only re-executes jobs that failed (saves time and resources)
Lesson 1696Workflow Run History and Re-runs
Re-run failed workflows
automatically
Lesson 1724GitHub Actions APIs and Webhooks
Re-run the same experiment
after fixes to validate improvement
Lesson 2500Measuring and Improving Resilience
Reachability Analyzer
and **Network Access Analyzer**.
Lesson 2194Provider-Specific Network Insights
Reachability Verification
Before deploying a new service or updating firewall rules, you can verify whether your database will be reachable from your application servers, or if your load balancer can connect to backend instances.
Lesson 2188Network Path Analysis Tools
Read Capacity Units (RCUs)
and **Write Capacity Units (WCUs)** in advance.
Lesson 432DynamoDB Capacity Modes: Provisioned vs On-DemandLesson 2532DynamoDB Capacity Modes
Read Model (Queries)
Event consumers listen for events and update specialized query databases optimized for fast reads (e.
Lesson 574CQRS Pattern with Events
read replica
is a separate, continuously updated copy of your primary database instance that handles read- only queries.
Lesson 418Read Replicas for ScalabilityLesson 419Read Replica Lag and Consistency
Read Replica Scaling
takes the replication concepts you've learned and uses them as a performance strategy, not just availability.
Lesson 2481Read Replica Scaling
Read-only access
Users can pull images but not push
Lesson 992Registry Authentication and Authorization
Read-only analysts
view dashboards but can't modify indices
Lesson 2031ELK/EFK Stack Security
Read-Only Auditors
– View-only access for compliance teams
Lesson 349Groups Fundamentals
read-through
patterns solve this by introducing a cache layer, but they differ in *who* manages that cache.
Lesson 2595Cache-Aside and Read-Through PatternsLesson 2681Multi-Tier Caching with CDN
Read-write access
Users can pull and push images
Lesson 992Registry Authentication and Authorization
Read/Write Operations
Tracking the balance of read and write operations helps you understand usage patterns and optimize volume type selection.
Lesson 136Volume Monitoring and Metrics
Read/write ratio
High read volumes justify accepting some staleness to reduce database load
Lesson 2709Cache Consistency and Trade-offs
Readability
Declarative is more structured and self-documenting
Lesson 1783Declarative vs Scripted Pipeline Syntax
Readability First
Use high contrast between text and backgrounds.
Lesson 2105Color Theory and Accessibility
Readiness
Control traffic flow during temporary unavailability
Lesson 1419The Three Types of Probes
Reading transaction logs
or using database triggers to detect changes
Lesson 2809Continuous Data Replication and CDC
README files
Overview of what infrastructure the code provisions, prerequisites, and how to use it
Lesson 717Documentation and Comments
Reads the desired state
from your configuration files
Lesson 699Apply and Provisioning
Reads your configuration
– Parses all `.
Lesson 771terraform plan Explained
Real-Time Alerting
When correlation rules trigger, SIEM generates alerts for security teams to investigate immediately.
Lesson 2861Security Information and Event Management (SIEM)
Real-time alerts
Notify admins when sensitive files are accessed
Lesson 168Event Notifications
Real-time chat applications
where messages appear instantly
Lesson 525WebSocket API Support
Real-time comparison
Current spending is continuously compared against predictions
Lesson 2987Cost Anomaly Detection Systems
Real-Time Data Processing
Applications that need to hold and analyze streaming data in memory.
Lesson 68Memory Optimized Instance Types
Real-time enrichment
Join streaming data with reference tables in external databases
Lesson 2668Query Federation and External Data
Real-time notifications
Chat applications, live dashboards, user activity feeds
Lesson 2685Redis Pub/Sub and Messaging
Real-Time Subscriptions
Clients subscribe to data changes (like chat messages or live updates).
Lesson 2537Serverless GraphQL APIs
Real-Time vs. Historical Data
Visibility requires both live dashboards showing current burn rates and historical trends to identify patterns and anomalies.
Lesson 2961Cost Visibility Fundamentals
Real-world conditions
Network partitions, latency spikes, resource exhaustion
Lesson 2491Chaos Engineering vs Traditional Testing
Real-world validation
under actual production traffic
Lesson 1665Canary Deployment Pattern
Reality Check
If your RTO is 4 hours but your MTTR is 8 hours, you're not meeting your recovery objectives.
Lesson 2412Mean Time to Recovery (MTTR)
Reason
– Why it happened (especially useful for failures)
Lesson 850Stack Creation Process and Events
Rebalancing
automatic reassignment of partitions when consumers join or leave
Lesson 2609Kafka Producers and Consumers
Rebuild current state
by replaying events from the beginning
Lesson 573Event Sourcing Fundamentals
Receiver
(optional): Accepts remote-write data directly, eliminating the need for Prometheus servers in some scenarios.
Lesson 1982Thanos Architecture Overview
Receives instructions
The kubelet watches the API Server for pod specifications assigned to its node
Lesson 1109Kubelet: The Node Agent
Recent burn rate
Has the error budget consumption accelerated in the last hour?
Lesson 2124SLO-Based Deployment Gating
Recommendation engine
Generates specific resize actions (e.
Lesson 2979Right-Sizing at Scale with Automation
Recommendation engines
(like AWS Cost Explorer or third-party tools) analyze usage history to suggest:
Lesson 2976Reserved Instance Portfolio Management
Recommender
Analyzes historical resource usage and generates recommendations
Lesson 1455Vertical Pod Autoscaler (VPA) Basics
Reconcile
The controller automatically applies changes to bring the cluster back to the desired state
Lesson 1869GitOps Reconciliation Loop
Recording rules
are pre-computed queries that Prometheus evaluates at regular intervals and stores the results as new time series.
Lesson 1957Recording RulesLesson 1958Alerting RulesLesson 1961Federation for Multi-Cluster MonitoringLesson 1979Prometheus Federation Basics
Recovering
After consecutive successful checks, restore to active rotation
Lesson 2465Stateless Service Health Checks
Recovery
If a consumer crashed or a database was corrupted, replay events from a specific point to rebuild the correct state without manual intervention.
Lesson 579Event Replay and Time TravelLesson 650Alarm Testing and ValidationLesson 1919Introduction to Flux and GitOps Philosophy
Recovery granularity
Restore to any point in time, not just backup windows
Lesson 2429Continuous Data Protection (CDP)
Recovery is simple
Spin up new instances anywhere
Lesson 2445DR for Stateful vs Stateless Apps
Recovery requirements
determine how far back you need to restore from.
Lesson 2420Backup Retention Policies
Recovery time
How long until normal operation resumed?
Lesson 2500Measuring and Improving Resilience
Recovery Time Objective (RTO)
is the maximum amount of time your application or service can be offline after a disaster before the impact becomes unacceptable to your business.
Lesson 2407Recovery Time Objective (RTO)Lesson 2416Compliance and Regulatory DR RequirementsLesson 2902DR Testing Fundamentals and Objectives
Recovery Window
– Before the waiting period expires, authorized users can **cancel the deletion** and restore the key to active status.
Lesson 2291Key Deletion and Recovery
Recycle
(deprecated): This policy was intended to scrub data (`rm -rf /volume/*`) and make the PV available again.
Lesson 1294PV Reclaim Policies
Red
Critical threshold breached (CPU > 85%, response time > 500ms)
Lesson 2106Threshold Indicators and Alerts
Red light
(explicit deny) → Stop immediately
Lesson 364Policy Evaluation Logic
Redirects
Detect old URL patterns in requests and redirect to new paths without a round-trip to your origin server.
Lesson 619Request and Response Manipulation
Redis ACLs
(Access Control Lists): Define users with specific command permissions—e.
Lesson 2696Cache Security and Access Control
Redis AUTH
Requires a password before any commands execute
Lesson 2696Cache Security and Access Control
Redis Cluster mode
For datasets exceeding single-instance limits, Memorystore for Redis Cluster shards data across nodes (similar to Redis Cluster you learned earlier)
Lesson 2692Google Cloud Memorystore
Redrive policy
Points to the DLQ and sets `maxReceiveCount` (typically 3-5 attempts)
Lesson 2743Dead Letter Queues for Failed Messages
Reduce
Implement safeguards like pilot migrations, comprehensive testing, rollback procedures
Lesson 2803Risk Assessment and Mitigation
Reduce attack surface
by never exposing vulnerable configurations
Lesson 2836Security by Design
Reduce blast radius
Only the targeted resources can be affected
Lesson 708Targeted Operations
Reduce Cardinality
High cardinality (many unique label combinations) creates exponentially more time series.
Lesson 1976Query Optimization and Best Practices
Reduce dependencies
Smaller deployment packages = faster cold starts
Lesson 2983Serverless Cost Optimization Patterns
Reduce deployment package size
Your function code stays small; dependencies live separately
Lesson 507AWS Lambda: Layers and Dependencies
Reduce idle capacity
One tenant's peak usage might occur during another's quiet period
Lesson 2164Multi-Tenancy and Resource Sharing
Reduce mistakes
Consistent permissions across similar users
Lesson 378AWS IAM Groups
Reduce MTTR
through practice and improved monitoring
Lesson 2490Introduction to Chaos Engineering
Reduce planned downtime
during maintenance windows
Lesson 414RDS High Availability Overview
Reduce time ranges
Avoid querying years of data when minutes suffice.
Lesson 2003Grafana Best Practices and Performance
Reduce total invocations
100 records in 10 batches of 10 vs.
Lesson 502Batch Processing Pattern
Reduced Attack Surface
No public DNS resolution or internet-facing endpoints
Lesson 1098Private Registry EndpointsLesson 2397Private Link and Endpoint Services
Reduced blast radius
through tested, safe procedures
Lesson 2130Runbooks and Playbooks
Reduced complexity
No need for dozens of VPC peering connections
Lesson 230Shared VPCs and Multi-Account Networking
Reduced CPU load
on your application servers (no encryption overhead)
Lesson 253SSL/TLS Termination at ALB
Reduced downtime
Problems caught at 80% capacity are easier to fix than total failures
Lesson 639Introduction to Alarms and Alerting
Reduced duplication
No need to copy credentials or endpoint URLs into every namespace.
Lesson 1279ClusterSecretStore Resource
Reduced execution time
is the most obvious win.
Lesson 1658Parallel Execution Pattern
Reduced financial risk
No expensive equipment becoming obsolete
Lesson 29CapEx vs OpEx: Financial Models in Cloud Computing
Reduced image size
Faster pulls, lower storage costs
Lesson 987Scratch and Distroless Images
Reduced Latency
Content travels shorter distances, loading in milliseconds instead of seconds.
Lesson 582What is a CDN and Why Use One
Reduced load
Less strain on Prometheus during peak usage
Lesson 1957Recording Rules
Reduced network overhead
Changes affect only the relevant slice, not all endpoints
Lesson 1212EndpointSlices
Reduced operational overhead
No control plane maintenance
Lesson 1460Introduction to Amazon EKS
Reduced origin load
Most requests served from edge; origin handles only cache misses
Lesson 584Origin Servers and Edge Caching
Reduced processing overhead
Consumers skip irrelevant messages
Lesson 2715Message Attributes and Filtering
Reduced risk
Problems never reach production
Lesson 277Blue-Green Deployments with Load Balancers
Reduced staffing needs
Less time managing physical infrastructure
Lesson 28Understanding Total Cost of Ownership (TCO) in the Cloud
Reduced throughput
Fewer transactions per second
Lesson 1340CPU Throttling Behavior
Reduces noise
Subscribers get only relevant messages
Lesson 558SNS Message Filtering
Reducing bandwidth
requirements (less data travels to central clouds)
Lesson 25Edge and Distributed Cloud
Reducing boilerplate
Less typing, fewer errors
Lesson 920Introduction to Bicep
Reducing cognitive load
developers don't reinvent security, monitoring, or deployment patterns
Lesson 2935Golden Paths and Paved Roads
Reducing latency
Images are served from the geographically closest replica
Lesson 1093ACR Geo-Replication
Redundancy
By spreading your application across multiple availability zones, you protect against hardware failures, power outages, or natural disasters.
Lesson 9Regions and Availability ZonesLesson 1071Registry High Availability Basics
Redundant, geographically distributed resources
ready to activate instantly
Lesson 2409Relationship Between RTO, RPO, and Cost
Reference Documentation
API specs, configuration schemas, and service catalog details.
Lesson 2943Platform Documentation and Onboarding
Reference runners in workflows
using the `runs-on` key with your custom labels
Lesson 1720Self-Hosted Runners
Reference security groups
from target instances to only accept traffic from the ALB
Lesson 260ALB Security Features and WAF Integration
Reference values
from infrastructure you don't control in this configuration
Lesson 753When to Use Resources vs Data Sources
References
let you use values from one resource when configuring another.
Lesson 949Template Properties and ReferencesLesson 2528Workflow Best Practices
Refill rate
How many tokens are added per time unit (e.
Lesson 2745Token Bucket Algorithm
Refine monitoring and alerting
to ensure you can detect the chaos you're introducing
Lesson 2494Chaos Experiments in Non-Production
Refined/Curated Zone
Cleaned, validated, processed data
Lesson 2627Data Lake Concepts and Architecture
Refresh-Ahead
(or **Predictive Refresh**) pattern solves a problem with traditional caching: when popular data expires, the next request suffers a cache miss and must fetch from the slower backend.
Lesson 2701Refresh-Ahead Caching Pattern
Refreshes automatically
before expiration
Lesson 1401Service Account Token Projection
Refreshes current state
– Queries your cloud provider APIs to see what actually exists right now
Lesson 771terraform plan Explained
Regex
extracts values from log lines into temporary key-value pairs.
Lesson 2037Promtail Log Collection and Pipelines
region
is a specific geographic area (like "US East" or "Europe West") where a cloud provider has multiple data centers.
Lesson 9Regions and Availability ZonesLesson 1492Creating an AKS Cluster via Azure PortalLesson 2786Data Transfer Costs and Optimization
Region and Availability Zone
Physical location information
Lesson 86Instance Metadata Service
Region selection
Deploy resources only in compliant regions
Lesson 2332Geographic and Regional Compliance
Regional clusters
Geographic distribution with shared configurations
Lesson 1871Multi-Cluster GitOps
Regional compliance
Keep data in specific geographic regions
Lesson 1313StorageClass Topology Constraints
Regional Consolidation
Since cloud providers log events regionally, aggregation means copying logs from all regions into one central location.
Lesson 2354Centralized Audit Log Aggregation
Regional disasters
(natural disasters, power grid failures)
Lesson 2426Cross-Region and Cross-Account Backup
Regional Edge Caches
Mid-tier caches serving multiple edge locations (not all CDNs have this tier)
Lesson 583CDN Architecture and Points of Presence
Regional MIG
Instances spread across multiple zones within a region (e.
Lesson 326GCP Managed Instance Groups (MIG) Overview
Regional restrictions
Limit deployments to approved regions only
Lesson 837Policy Enforcement with Sentinel
Register the runner
using a unique token, assigning it labels (like `self-hosted`, `linux`, `gpu`)
Lesson 1720Self-Hosted Runners
Registry host
Where the image lives (e.
Lesson 1064Image Naming and Tagging Conventions
Registry hostname
Where the image lives (e.
Lesson 990Image Naming and Tagging Conventions
Rego code
– Contains the actual validation logic
Lesson 1414Writing Constraint Templates
Regular audits
Review and prune unused permissions quarterly
Lesson 2834Principle of Least Privilege
Regular Cadences
create predictable cycles for review and action:
Lesson 2989Continuous Optimization Programs
Regular maintenance
Archive unused dashboards, review slow queries, and update deprecated features.
Lesson 2003Grafana Best Practices and Performance
Regular office hours
where developers can discuss pain points directly with platform teams
Lesson 2946Feedback Loops and User Research
Regular, scheduled testing
validates that your DR plan remains effective as your infrastructure evolves.
Lesson 2415DR Testing and Validation Frequency
Regulated industries
requiring access controls
Lesson 1062Public vs Private Registries
Regulatory compliance
Enforce GDPR, HIPAA, or financial regulations dynamically
Lesson 1626External Authorization Integration
Regulatory requirements
demanding geographic data distribution
Lesson 2426Cross-Region and Cross-Account Backup
Regulatory requirements demand multicloud
Data residency or sovereignty rules force distribution
Lesson 2777Lock-In vs Portability Trade-offs
Reject early
Analytics tracking, non-essential reporting, preview features
Lesson 2593Load Shedding and Graceful Degradation
Relative paths
Imported files are resolved relative to the main configuration file's location.
Lesson 950Template Imports and OrganizationLesson 1004WORKDIR: Setting Working Directory
Relatively static data
or data where slight staleness is acceptable (product catalogs, configuration settings)
Lesson 2694Database Query Result Caching
Reliable
High availability with redundant paths
Lesson 2195Hybrid Cloud Connectivity Overview
Remediation
Enable default encryption with approved KMS key
Lesson 2337Compliance Requirements Translation
Remediation actions
taken post-test
Lesson 2447Compliance and DR Documentation
Remediation steps
Numbered actions with exact commands
Lesson 2130Runbooks and Playbooks
Remediation Workflows
Build automated processes to identify untagged resources and either apply default tags or notify owners for correction.
Lesson 2964Cost Allocation Tags
Remote backends
like S3 with DynamoDB or Terraform Cloud provide built-in locking capabilities, making them essential for team environments.
Lesson 786State Locking Fundamentals
Remote Desktop Protocol (RDP)
is Microsoft's proprietary protocol that lets you remotely access and control a Windows computer over a network.
Lesson 58Windows VMs and RDP Access
Remote Execution
means `terraform apply` runs in Terraform Cloud's infrastructure—not your laptop.
Lesson 836Terraform Cloud for Team Collaboration
Remote Read
allows Prometheus to fetch older data from those external systems when executing queries.
Lesson 1981Remote Write and Remote Read
Remote state
means storing your state file in a centralized, shared location — like an S3 bucket, Azure Blob Storage, or a specialized backend service.
Lesson 703Local vs Remote StateLesson 834State File Partitioning
Remote state data sources
let configurations reference outputs from other state files, maintaining separation while enabling necessary cross-references.
Lesson 831Scaling Challenges and PatternsLesson 835Dependency Management Between Stacks
Remote Write
lets Prometheus continuously stream scraped metrics to external storage backends (like Thanos, Cortex, or cloud-native solutions).
Lesson 1981Remote Write and Remote Read
Remove instances
without losing critical data or breaking user sessions
Lesson 2462Stateless Services and Horizontal Scaling
Remove PSPs
Once confident, delete the old PodSecurityPolicy objects
Lesson 1400Migrating from PodSecurityPolicy
Remove unused dependencies
– Only include libraries your function actually needs.
Lesson 485Function Packaging and Deployment Size
Removing users
revokes their access to that group's permissions immediately.
Lesson 351Assigning Users to Groups
Render templates
to verify generated manifests
Lesson 1548Chart Testing and Validation
Rendering
farms and scientific simulations
Lesson 2154Spot Instances and Preemptible VMs
Renders templates
locally by combining your chart files with values
Lesson 1521Helm Architecture: Client and Library
Reno
is conservative but predictable.
Lesson 2228TCP Performance Optimization
Repeat Incidents
How many incidents are "reruns" of previous problems.
Lesson 2135Incident Metrics and Learning
Repeatability
You can destroy and recreate entire environments instantly—perfect for disaster recovery or creating temporary test environments.
Lesson 47Infrastructure as Code PhilosophyLesson 686IaC Benefits: Consistency and Repeatability
Repeated labels or annotations
across resources
Lesson 1557Advanced Templating with Named Templates
Replace
when only the latest execution matters (e.
Lesson 1198CronJob Concurrency Policies
Replace failed instances
immediately with identical copies
Lesson 2462Stateless Services and Horizontal Scaling
Replaced
(resources that must be deleted and recreated)
Lesson 851Stack Updates and Change Sets
Replay events
to reconstruct state from any point
Lesson 2508Event Sourcing with Functions
Replica controller(s)
Standby instance(s) ready to take over if the primary fails
Lesson 1802Jenkins High Availability Architecture
Replica lag time
How far behind is the replica?
Lesson 419Read Replica Lag and Consistency
Replica Promotion
The system selects a replica—typically the one with the least replication lag—and promotes it to primary status, enabling writes
Lesson 2483Automatic Failover Process
ReplicaFailure
The rollout encountered problems creating Pods
Lesson 1169Deployment Rollout Status
ReplicaSet
is a Kubernetes controller that ensures a specified number of identical Pod replicas are always running in your cluster.
Lesson 1155ReplicaSet Purpose and Architecture
ReplicaSet Controller
ensures the right number of pod replicas exist.
Lesson 1105Controller Manager: Maintaining Desired State
Replication
is the practice of maintaining multiple copies of your registry data across different storage backends or geographic locations.
Lesson 1071Registry High Availability Basics
Replication focus
Configuration and container images only
Lesson 2445DR for Stateful vs Stateless Apps
Replication Lag Monitoring
Track timestamps to ensure data isn't falling dangerously behind real-time operations.
Lesson 2444Data Consistency ValidationLesson 2817Disaster Recovery During Migration
Replication status
Is copying active or stalled?
Lesson 419Read Replica Lag and Consistency
Replication/availability
– Multi-region secrets cost more than single-region
Lesson 2251Secrets Management Cost Optimization
Reply-To Addresses
The request message specifies which queue the response should be sent to.
Lesson 2579Request-Reply over Message Queues
Reporting
Dashboards showing compliance status and violations
Lesson 2335Introduction to Compliance as Code
Reports status
Sends heartbeat signals and pod/container status back to the API Server
Lesson 1109Kubelet: The Node Agent
Reports telemetry
for observability
Lesson 1594Consul Connect and Sidecar Proxies
Repository access levels
(read/write/admin) determine who can even propose changes
Lesson 1874GitOps Access Control
Repository name
The path and name identifying the image (e.
Lesson 990Image Naming and Tagging Conventions
Repository Proxies
act like local mirrors of your remote artifact repositories.
Lesson 1681Artifact Distribution and Caching
Repository separation
(one repo per environment)
Lesson 1867Branching Strategies for GitOps
Reprocessing capability
Fix the bug, then replay failed events
Lesson 500Dead Letter Queues
Reproducible
Deploy identical environments instantly
Lesson 684What is Infrastructure as Code?
Repurchase
strategy (sometimes called "Replace" or "Drop and Shop") means abandoning your current application entirely and moving to a different product—typically a cloud-native SaaS solution.
Lesson 2795Repurchase Strategy
Reputation databases
(maintained by security vendors and cloud providers) provide dynamic, continuously-updated intelligence about IP addresses showing malicious patterns across the internet.
Lesson 2373Geo-Blocking and IP Reputation
Request and response mapping
lets you transform data structures, headers, and parameters as they flow through your API Gateway.
Lesson 529Request and Response Mapping
Request Arrival
Your browser connects to this nearby edge server, typically within milliseconds.
Lesson 586CDN Request Flow and Routing
Request Body
Inspect POST data for malicious payloads, especially in JSON or form submissions.
Lesson 2375Custom Rules and Request Inspection
request context
metadata about who's making the call, when, how, and where.
Lesson 366Condition Keys and ContextLesson 367Policy Variables and Dynamic Policies
Request manipulation
means altering incoming HTTP details before they reach your origin:
Lesson 619Request and Response Manipulation
Request Mapping
modifies incoming data before it reaches your backend:
Lesson 529Request and Response Mapping
Request metadata
timestamp, source IP, HTTP method, URI, headers
Lesson 2374WAF Logging and Monitoring
Request method
`POST` requests → write-optimized backend
Lesson 275Content-Based Routing and Path Rules
Request queuing
Prevents overloading downstream Query components
Lesson 1984Thanos Query and Query Frontend
Request rate
(requests per second)
Lesson 1632Automatic Metrics Collection
Request rate limits
exist per bucket or per prefix.
Lesson 155Object Storage Performance Characteristics
Request retries
and circuit breaking
Lesson 1566The Sidecar Proxy Pattern
Request Units (RUs)
to measure throughput.
Lesson 438Cosmos DB Partitioning and Request Units
Request volume and frequency
between services
Lesson 1639Service Dependency Mapping
Request-based
Evaluates multiple parameters (headers, query strings, context)
Lesson 544API Gateway Authorization StrategiesLesson 2115Request-Based vs. Window-Based SLIs
Request/response transformation
to adapt formats
Lesson 2502API Gateway Integration Pattern
RequestAuthentication
resource validates these tokens automatically at the sidecar proxy level, ensuring only requests with valid JWTs reach your services.
Lesson 1627JWT Authentication and Validation
Requester
sends a message to `service-request-queue` with `correlationId: "abc123"` and `replyTo: "my- reply-queue"`
Lesson 2579Request-Reply over Message Queues
Requester DNS resolution
– allows VPC-A to resolve private DNS names in VPC-B
Lesson 225DNS Resolution Between VPCs
Require approval
for expensive changes
Lesson 2885Cost Estimation Testing
Require manual overrides
for sensitive changes
Lesson 856Stack Policies for Update Protection
Required arguments
Values you *must* provide for the resource to be created.
Lesson 740Resource Arguments and Attributes
Required fields
Does the request include all mandatory parameters?
Lesson 538Request ValidationLesson 1558Helm Schema Validation
Required labels example
Enforce that all namespaces have an "owner" label:
Lesson 1415Implementing Constraints
Required rules
reduce scheduling flexibility and can cause pod starvation
Lesson 1354Required vs Preferred Pod Affinity
Required vs preferred rules
(hard requirements vs soft preferences)
Lesson 1346Node Affinity vs Node Selector
Requires route table updates
After establishing the peering connection, you must add routes in each VPC's route tables pointing to the other VPC's CIDR range via the peering connection.
Lesson 216VPC Peering Fundamentals
Requires stable, persistent storage
tied to specific Pod identities
Lesson 1177StatefulSet vs Deployment Use Cases
Reserved Capacity
for predictable workloads, and applying the **OpEx model** where you only pay for what you actually consume.
Lesson 33Cloud Cost Optimization: Right-Sizing ResourcesLesson 2224Private Connectivity Cost Management
Reserved Concurrency
allocates a dedicated portion of your account's concurrency limit to a specific function.
Lesson 479Reserved and Provisioned ConcurrencyLesson 2550Concurrency ManagementLesson 2983Serverless Cost Optimization Patterns
Reserved Instance recommendations
based on your usage patterns
Lesson 2175Azure Budgets and Advisor
Reserved Instances (RIs)
and **Savings Plans** like buying in bulk or signing a gym membership.
Lesson 2153Reserved Instances and Savings Plans
Reserved/Committed
AWS Reserved Instances = Azure Reserved VMs = GCP Committed Use Discounts
Lesson 109Cross-Provider Compute Feature Comparison
Reset tolerance
Prometheus can detect and handle counter resets automatically when calculating rates
Lesson 1949Metric Types: Counter
Resilience and redundancy
Distributing workloads across providers protects against provider-specific outages or regional failures.
Lesson 2751What is Multicloud and Why Organizations Adopt It
Resize
pools by adjusting node count (manual or autoscaling)
Lesson 1479GKE Node Pools and Machine Types
Resizing
means switching your VM to a different instance type or size—like upgrading from a `t3.
Lesson 89Instance Resize and Type Changes
Resolution
refers to the granularity of time intervals at which metrics are stored or queried—higher resolution means more frequent data points, lower resolution means broader time windows.
Lesson 634Metric Aggregation and Resolution
Resolvers
These are the serverless functions that fetch data when a GraphQL field is requested.
Lesson 2537Serverless GraphQL APIs
Resource attributes
Tag traces with `k8s.
Lesson 2086OpenTelemetry in Kubernetes Environments
Resource consumption
Each sidecar proxy requires its own CPU and memory allocation.
Lesson 1573Service Mesh Performance OverheadLesson 1599Cilium Service Mesh with eBPF
Resource count
Distribute based on number of instances, containers, or services each team runs
Lesson 2149Shared Services Cost Allocation
Resource deletion events
– Deleting audit logs themselves, removing backup snapshots, or terminating critical infrastructure warrants instant investigation.
Lesson 2356Real-Time Audit Log Monitoring
Resource dependencies
Connect resources by referencing one resource's ID in another's configuration
Lesson 863Intrinsic Function Ref
Resource exhaustion
– memory, CPU, or connection pools depleting
Lesson 2744Rate Limiting Fundamentals
resource group
is a logical container that holds related Azure resources.
Lesson 904Resource Groups and Template ScopeLesson 1492Creating an AKS Cluster via Azure Portal
Resource grouping
through Resource Groups (logical containers)
Lesson 893Introduction to Azure Resource Manager (ARM)
Resource Groups
– Logical containers holding related resources.
Lesson 386Azure RBAC Fundamentals
Resource ID
– Which resource is affected
Lesson 850Stack Creation Process and Events
Resource IDs
needed for linking resources across deployments
Lesson 899Outputs for Template Results
Resource isolation
Log processing overhead doesn't compete with your application's CPU and memory.
Lesson 2050Sidecar Pattern for Logging
Resource leaks
(unclosed connections, memory issues)
Lesson 1816CodeGuru: AI-Powered Code Review
Resource Lifecycle Manager
ARM tracks every resource from creation through updates to deletion, maintaining consistency and relationships between resources.
Lesson 893Introduction to Azure Resource Manager (ARM)
Resource limits too low
Pods hit limits before HPA triggers
Lesson 1459Autoscaling Best Practices and Troubleshooting
Resource management
across namespaces and clusters
Lesson 1130What is kubectl and Its Role
Resource Mappings
– These connect your IaC configuration (what you *wrote* in code) to real cloud resources (what actually *exists*).
Lesson 701State File Contents and Structure
Resource metadata
identifying what was tested
Lesson 2348Compliance Reporting and Evidence
Resource naming
Do resources follow your team's naming conventions?
Lesson 715Code Review and Peer Validation
Resource naming conventions
you want to standardize
Lesson 898Variables for Template Simplification
Resource Normalization
ArgoCD can normalize resources before comparison—like converting equivalent YAML representations or handling known Kubernetes quirks (e.
Lesson 1901Diff Customization
Resource overcommitment
occurs when the *sum of all resource requests* across Pods scheduled on a node exceeds the node's actual capacity.
Lesson 1339Resource Overcommitment
Resource permissions
Lambda needs permission to access both Secrets Manager and your target system
Lesson 2240AWS Secrets Manager Rotation
Resource reallocation
Calculate engineering hours currently wasted on manual cost management
Lesson 2956Executive Buy-in and Sponsorship
Resource requirements
Does the node have enough CPU and memory available?
Lesson 1104Scheduler: Pod Placement Logic
Resource Risks
Skill gaps in cloud technologies, insufficient team capacity, budget overruns.
Lesson 2803Risk Assessment and Mitigation
Resource scope
All S3 buckets with tag `DataClassification=Customer`
Lesson 2337Compliance Requirements Translation
Resource standards
Mandate naming conventions, require specific tags
Lesson 837Policy Enforcement with Sentinel
Resource tampering
Deletion of security groups, logging configs, or encryption keys
Lesson 2865CloudTrail and Audit Logging for Security
Resource targeting
reduces graph complexity but should not replace proper module boundaries
Lesson 839Parallel Execution and Performance
Resource Throttling
Under load, reduce resource-intensive features first.
Lesson 2458Graceful Degradation Patterns
Resource usage
Sudden access to sensitive data repositories never touched before
Lesson 2858Behavioral Analytics and Anomaly Detection
Resource variations
(high-CPU for compilations, GPU for ML tasks)
Lesson 1798Distributed Builds and Agent Architecture
Resource whitelist/blacklist
What Kubernetes resources are allowed (or forbidden)?
Lesson 1887ArgoCD Projects for Multi-Tenancy
Resource-based
A special collection room has a sign on the door: "Only faculty members and researchers may enter.
Lesson 336Identity-Based vs Resource-Based PoliciesLesson 394GCP IAM ConditionsLesson 2967Shared Cost Allocation
Resource-based example
"Bucket-X allows reads from Alice's account"
Lesson 336Identity-Based vs Resource-Based Policies
Resource-intensive tasks
that don't share dependencies
Lesson 1792Parallel Stage Execution
Resource-level decisions
(instance types, scaling policies, storage tiers)
Lesson 2954Shared Responsibility Model
Resource-limited or service-mesh-only needs
→ `minimal`
Lesson 1586Istio Configuration Profiles
ResourceName
Grant access to only specific Secret names
Lesson 1269RBAC for Secrets
ResourceQuota
is like a spending limit on a shared credit card for an entire team.
Lesson 1337Resource Quota Basics
Resources array
The heart of the file—a list of all managed resources
Lesson 775State File Contents and Structure
Resources deployed
(Pods, Services, etc.
Lesson 1531Release History and Status
Resources generated dynamically
(same timestamp, different output)
Lesson 2674ETag and Conditional Requests
Resources it affects
Which buckets, instances, or services
Lesson 375Policy Documentation and Governance
Resources modified
during that sync
Lesson 1904Application Tracking and History
Resources section
(required): Defines the GCP resources to create
Lesson 947Template Structure and YAML Syntax
Resources to add
(marked with `+`)
Lesson 771terraform plan Explained
Resources to be created
(new infrastructure)
Lesson 698Planning and Preview
Resources to be destroyed
(removed infrastructure)
Lesson 698Planning and Preview
Resources to be modified
(updated settings)
Lesson 698Planning and Preview
Resources to change
(marked with `~`)
Lesson 771terraform plan Explained
Resources to destroy
(marked with `-`)
Lesson 771terraform plan Explained
Response
The API server returns the result to you
Lesson 1102API Server: The Cluster Gateway
Response Aggregation
The gateway can call multiple services and combine their responses into one payload, reducing client-side complexity and round trips.
Lesson 2576API Gateway Pattern
Response behavior
(reject with HTTP 429, queue, or delay)
Lesson 2385Rate Limiting and Throttling
Response formatting
Transforming data structures to match frontend expectations
Lesson 2577Backend for Frontend (BFF) Pattern
Response manipulation
means changing what comes back from the origin:
Lesson 619Request and Response Manipulation
response time
and **processing duration** reveal performance degradation.
Lesson 2187Load Balancer Health and MetricsLesson 2554Performance Testing and Benchmarking
Response time expectations
(minutes for critical, hours for warnings, review as-time-permits for info)
Lesson 649Alert Severity and Prioritization
Responsibilities
Declare severity, assign roles, make final decisions, approve communications.
Lesson 2133Incident Command System
REST APIs
(often 70% cheaper) for basic routing needs.
Lesson 549API Gateway Cost Optimization
Restart
happens when live migration isn't possible (certain instance types or older hardware).
Lesson 91VM Maintenance and Updates
Restart failing containers
automatically
Lesson 1418Understanding Kubernetes Health Checks
RESTful Interface
Exposes all Kubernetes resources via HTTP/HTTPS endpoints
Lesson 1116Kubernetes API Server Overview
Restore Testing
is the gold standard: actually restoring data to a test environment and validating functionality.
Lesson 2428Backup Validation and Testing
Restrict access
using strict identity and access management
Lesson 704State File Security Concerns
Restrict access tightly
Use backend IAM policies that follow least privilege.
Lesson 797Remote State Best Practices
Result
Any web server can connect to the database; no manual IP management needed
Lesson 205Security Group Chaining and ReferencesLesson 2350Cloud Trail Services Overview
Resumability
You can pause and resume large uploads without starting over
Lesson 151Object Size Limits and Multipart UploadsLesson 166Multipart Upload
Resume Normal Replication
Re-establish primary-to-DR replication for future protection.
Lesson 2443Failback Procedures
Retain full lifecycle control
over key material for compliance auditing
Lesson 2293Key Import and External Key Stores
Retention
is how long you keep logs before deleting them.
Lesson 656Log Retention and Storage Requirements
Retention period impact
The longer you retain backups (7 days?
Lesson 426Backup Storage and Costs
Retention pressure
keeping months of high-resolution data requires terabytes
Lesson 1977Challenges of Running Prometheus at Scale
Retire
(decommissioning) and **Retain** (keeping on-premises).
Lesson 2796Retire and Retain Strategies
Retries and idempotence
ensuring messages arrive despite network issues without duplication
Lesson 2609Kafka Producers and Consumers
Retries failures
with backoff strategies
Lesson 2626Workflow Orchestration Tools
Retrieve the RoleID
(static identifier, low sensitivity)
Lesson 2258AppRole Authentication for Applications
Retrieving a secret
requires appropriate IAM permissions.
Lesson 2239AWS Secrets Manager Fundamentals
Retry
Flaky integration tests, network-dependent operations, external API calls
Lesson 1751Job Retry and TimeoutLesson 2583Bulkhead Pattern for Isolation
Retry attempts
How many times to retry (0-2 is common)
Lesson 488Function Error Handling and Retries
Retry budgets
to prevent retry storms
Lesson 1611Timeouts and Retry Policies
Retry configuration
and whether retries were exhausted
Lesson 2526Workflow Monitoring and Debugging
Retry with backoff
Requeue failed tasks with increasing delays
Lesson 2723Delay Queues and Message Timers
Return quickly
Use appropriate timeouts.
Lesson 1427Designing Effective Health Check Endpoints
Reusable modules
in a dedicated directory, versioned independently
Lesson 833Repository Structure for Large Projects
Reusable templates
– Define a permission set once, then bind it to different namespaces as needed
Lesson 1382Creating a ClusterRole
Reusable workflows
let you define a workflow once and call it from other workflows like a function.
Lesson 1716Workflow Templates and Reusable Workflows
Reuse configurations
Write once, deploy many times across environments or projects
Lesson 798What Are Terraform Modules
Reuse connections carefully
While connection pooling helps in origin functions, edge functions often don't persist long enough to benefit.
Lesson 622Edge Function Performance Optimization
Revenue enabled
by global reach across multiple Regions
Lesson 37Measuring Cloud Business Value: KPIs and Metrics
Revenue impact
Show how cost efficiency improves profit margins or enables competitive pricing
Lesson 2956Executive Buy-in and Sponsorship
Revert in Git
Use `git revert` or merge a rollback PR to restore previous manifests
Lesson 1873Rollback and Recovery
Review detected anomalies
in the AWS Cost Explorer interface
Lesson 2171AWS Cost Anomaly Detection
Review Gates
Require human approval before applying changes to production
Lesson 709Workflow Automation and CI/CD Integration
Review logs and metrics
after each test.
Lesson 307Scaling Policy Testing
Review regularly
Remove rules that are no longer needed
Lesson 212Least Privilege Network Access
Review resource requests
Ensure pods have appropriate CPU/memory requests
Lesson 1519Troubleshooting Common Cluster Issues
Review route entries
Look at destination CIDR blocks and their targets.
Lesson 2190Route Table Verification
Review the change set
carefully for unexpected modifications or replacements
Lesson 878Stack Updates and Change Sets
Review the changes
CloudFormation presents a detailed breakdown of the impact
Lesson 851Stack Updates and Change Sets
Review the output
carefully with your team
Lesson 718Change Management and Planning
Revision-based deployments
that let you run multiple control plane versions side-by-side, testing new versions gradually before full rollout.
Lesson 1590Istio Upgrade and Version Management
Revocation power
– Delete or disable keys to make encrypted data inaccessible
Lesson 2300Server-Side Encryption with Customer-Managed Keys
Revoke credentials
by deactivating IAM access keys or disabling user accounts
Lesson 2871Automated Incident Response
RFC 1918
defines three special IP ranges reserved exclusively for private networks—these addresses can be reused by anyone inside their own network without conflict, because they never appear on the public internet.
Lesson 173Private IP Address Spaces (RFC 1918)
Rich Marketplace
Thousands of pre-built actions (reusable components) are available for common tasks—from Docker builds to cloud deployments—saving you from writing everything from scratch.
Lesson 1682What is GitHub Actions and Why Use It
Rich plugin ecosystem
(500+ plugins)
Lesson 2038Fluentd and Fluent Bit Overview
Richer routing rules
(header-based, weighted traffic splits, redirects)
Lesson 1233Gateway API Introduction
Right to Access
Users can request copies of their data
Lesson 2328GDPR Data Protection Requirements
Right to Data Portability
Receive data in a structured, machine-readable format
Lesson 2328GDPR Data Protection Requirements
Right to Erasure
("Right to be Forgotten"): Deletion under certain circumstances
Lesson 2328GDPR Data Protection Requirements
Right to Rectification
Correction of inaccurate data
Lesson 2328GDPR Data Protection Requirements
right-size
each execution environment without installing everything everywhere.
Lesson 1785Agent Directive and Execution EnvironmentsLesson 2160Idle Resource Detection
Right-size resource requests
Set accurate CPU/memory requests—not too high (wastes space) or too low (causes throttling)
Lesson 1489GKE Cost Optimization and Bin Packing
Right-size your capacity limits
Set your minimum capacity to the absolute lowest number of instances that can handle baseline traffic.
Lesson 311Scaling for Cost Optimization
right-sizing
your resources (covered in step 2152), analyze your steady-state workloads—services running 24/7 or predictably.
Lesson 2153Reserved Instances and Savings PlansLesson 2155Auto Scaling for Cost Efficiency
Right-sizing bandwidth
– Don't pay for 10Gbps if 1Gbps suffices
Lesson 2224Private Connectivity Cost Management
Rightsizing opportunities
Oversized Compute Engine instances that could drop tiers
Lesson 2180GCP Recommender and Cost Insights
Rising latency
Check network, add cluster nodes, or optimize data structures
Lesson 2695Cache Monitoring and Performance Metrics
Risk of loss
If someone's laptop crashes or they delete the file, you lose track of your infrastructure
Lesson 776Local State Storage
Risk signals
Unusual login times, impossible travel scenarios, threat intelligence feeds
Lesson 2399Context-Aware Access Controls
Risk tolerance
– Your organization's appetite for disruption determines wave size and timing
Lesson 2812Migration Wave Planning and Execution
Risk treatment
Implement controls from Annex A (114 security controls across 14 domains)
Lesson 2325ISO 27001 Information Security
Role assumptions
Which identities (users, services, accounts) can assume each role?
Lesson 360Auditing Group and Role Membership
Role-based access controls
and **multi-tenancy** let organizations segregate data by department or security level—critical for compliance in regulated industries.
Lesson 2042Splunk Cloud and Enterprise Logging
Role-Based Authorization Strategy
enable this.
Lesson 1805Folder-Based Organization and RBAC
Role-Based Strategy
(via the Role-Based Authorization Strategy plugin) lets you define roles (like "developer," "viewer," "admin") with bundled permissions, then assign users to roles.
Lesson 1781Jenkins User Management and Security
Role-oriented design
(infrastructure admins manage Gateways; developers manage Routes)
Lesson 1233Gateway API Introduction
RoleBinding
Binds a Role (or ClusterRole) to subjects *within a specific namespace*.
Lesson 1375RBAC API Objects OverviewLesson 1381RoleBinding Fundamentals
RoleBindings
and **ClusterRoleBindings** define *who* can do it.
Lesson 1375RBAC API Objects Overview
RoleID
= username (less sensitive, can be baked into images)
Lesson 2258AppRole Authentication for Applications
roleRef
Points to the Role you want to assign (the "what")
Lesson 1381RoleBinding FundamentalsLesson 1383ClusterRoleBinding Usage
Roll back easily
if a migration fails
Lesson 2514Strangler Fig Pattern for Migration
Roll back immediately
if you detect problems, affecting only the canary group
Lesson 1665Canary Deployment Pattern
Roll back instantly
if problems arise by reverting traffic weights
Lesson 1606Canary Deployments with Service Mesh
Roll out sidecars gradually
New connections automatically use mTLS when both sides support it
Lesson 1622mTLS Migration Strategies
Rollback
Traditional ops requires re-running old pipelines.
Lesson 1853GitOps vs Traditional Operations
Rollback procedure
How to undo changes safely
Lesson 2130Runbooks and Playbooks
Rollback procedures
Define exactly how to abort and reverse the experiment instantly
Lesson 2493Blast Radius and Safety Controls
Rollback readiness
Always maintain the ability to route back to the monolith
Lesson 2569Microservices Migration Strategies
Rollback safety
Instantly revert percentages if issues arise
Lesson 1605Traffic Splitting and Weighted Routing
ROLLBACK_COMPLETE
– All partial resources cleaned up after failure
Lesson 850Stack Creation Process and Events
ROLLBACK_IN_PROGRESS
– Failed creation, deleting partial resources
Lesson 850Stack Creation Process and EventsLesson 877Stack Creation and Lifecycle
RollbackTriggers
List of CloudWatch alarm ARNs to monitor
Lesson 890Stack Rollback Configuration
Rolling back
to a previous version if something breaks:
Lesson 1526Helm Releases: Managing Deployments
Rolling Deployment
Updates instances in batches, gradually replacing old versions while maintaining partial availability.
Lesson 1831CodeDeploy Overview and Deployment Types
RollingUpdate
(default) gradually replaces old DaemonSet pods with new ones, node by node.
Lesson 1188DaemonSet Update Strategies
root account
(sometimes called the master account or superuser) is the very first account created when you set up a cloud provider account.
Lesson 339Root Account and Administrative AccessLesson 377AWS IAM Users and Root Account
Rotate credentials
For any external system access
Lesson 519Provider-Specific Security and IAM
Rotation fairness
Balance weekend/holiday coverage equitably
Lesson 2127On-Call Rotation Structures
Rotation flexibility
– Enable automatic key rotation on your schedule
Lesson 2300Server-Side Encryption with Customer-Managed Keys
Rotation happens transparently
(apps get new values automatically)
Lesson 2248Secrets in Application Code
Rotation lag
Cached keys continue encrypting new data even after rotation begins
Lesson 2305Data Key Caching Pattern
Rotation schedule
Days between rotations (e.
Lesson 2240AWS Secrets Manager Rotation
Rotation success rate
Are renewals completing successfully?
Lesson 1628Certificate Rotation and Expiry
Rotation windows
Implement a grace period where both old and new secrets work simultaneously, allowing services to transition smoothly.
Lesson 2247GCP Secret Manager Rotation Strategies
Round Robin
Distributes requests evenly across all healthy instances in sequence.
Lesson 1569Load Balancing in Service Mesh
Round-trip time (RTT)
measures the full journey there and back.
Lesson 2185Latency and Performance Metrics
Route
different log types to different backends
Lesson 1435Logging with Sidecar Containers
Route all traffic
through an API Gateway initially pointing to the monolith
Lesson 2514Strangler Fig Pattern for Migration
Route controller
Configures network routes in the cloud for pod-to-pod communication across nodes
Lesson 1107Cloud Controller Manager
Route filters
act like selective gatekeepers for Microsoft peering.
Lesson 2204ExpressRoute Routing and BGP
Route only private ranges
(`private-ranges-only`): Only RFC 1918 private IP traffic uses the connector; internet traffic goes direct—optimizes performance and connector costs
Lesson 516Google Cloud Functions: VPC Connectivity and Networking
Route priority conflicts
More specific routes overriding your intended path
Lesson 2190Route Table Verification
Route selectively
Use an API Gateway or routing layer to direct requests for that feature to the new service
Lesson 2598Strangler Fig Pattern for Migration
Router/gateway address
(often second IP) - Where traffic exits the subnet
Lesson 179Reserved IP Addresses in Subnets
Routing asymmetry
when paths differ in each direction
Lesson 2227Network Path Analysis and Traceroute
Routing configuration
Which CIDR blocks should traverse the tunnel
Lesson 2779Cross-Cloud VPN Connections
Routing inefficiencies
(traffic taking circuitous paths instead of direct routes)
Lesson 2227Network Path Analysis and Traceroute
Routing messages
based on connection ID or custom routing keys
Lesson 525WebSocket API Support
Routing policies
(failover, weighted, geoproximity) that specify primary and secondary targets
Lesson 2437DNS-Based Failover
Row Count Validation
The simplest check—compare table row counts between source and target.
Lesson 2830Data Validation and Consistency Checks
RPO (Recovery Point Objective)
How much data loss is acceptable?
Lesson 2405What is Disaster Recovery (DR)?
RPO > 0
is acceptable (seconds to minutes of potential loss)
Lesson 2480Asynchronous Replication Patterns
RPO is near-zero
No data loss concerns for the app itself
Lesson 2445DR for Stateful vs Stateless Apps
RPO of 1 hour
→ Hourly snapshots or continuous replication required
Lesson 2408Recovery Point Objective (RPO)
RPO of 24 hours
→ Daily backups are sufficient
Lesson 2408Recovery Point Objective (RPO)
RPO of near-zero
→ Real-time synchronous replication to standby systems
Lesson 2408Recovery Point Objective (RPO)
RTO
needs (restore speed) against **RPO** requirements (data loss tolerance)
Lesson 2424Database Backup ApproachesLesson 2428Backup Validation and Testing
RTO (Recovery Time Objective)
How quickly must systems be restored?
Lesson 2405What is Disaster Recovery (DR)?
RTO includes data validation
Must verify consistency
Lesson 2445DR for Stateful vs Stateless Apps
RTO is minimal
Launch replacements in seconds
Lesson 2445DR for Stateful vs Stateless Apps
RTO of days
Cold standby or backup-restore approaches become acceptable—you can restore from snapshots or backups when needed.
Lesson 2407Recovery Time Objective (RTO)
RTO of hours
Warm standby environments may suffice—pre-provisioned infrastructure that's running but not serving production traffic.
Lesson 2407Recovery Time Objective (RTO)
Rule 100
DENY all traffic from 203.
Lesson 207NACL Rule Ordering and Evaluation
Rule 200
ALLOW all HTTP traffic (port 80)
Lesson 207NACL Rule Ordering and Evaluation
Rule effectiveness
which custom rules generate the most blocks
Lesson 2374WAF Logging and Monitoring
Rule Groups
Collections of related rules you can manage together
Lesson 2368AWS WAF Fundamentals
Rule match details
which rules triggered (allow, block, count mode)
Lesson 2374WAF Logging and Monitoring
Rule number
(determines evaluation order)
Lesson 208NACL Allow and Deny Rules
Rule refinement
involves adjusting rule sensitivity without disabling protection entirely:
Lesson 2376WAF Tuning and False Positive Management
Rule-based filtering
using signatures for known attack patterns
Lesson 2364What is a Web Application Firewall (WAF)
Ruler
Evaluates recording and alerting rules across the global dataset (optional, but useful for global alerts).
Lesson 1982Thanos Architecture Overview
Rules/Filters
Criteria that determine which messages each subscription receives
Lesson 561Azure Service Bus Topics
Run in parallel
Both old and new systems handle their respective requests
Lesson 2598Strangler Fig Pattern for Migration
Run states in parallel
(fan-out multiple operations simultaneously)
Lesson 2516Step Functions and State Machines
Run test hooks
to confirm functionality
Lesson 1548Chart Testing and Validation
Run tests continuously
as part of CI/CD pipelines
Lesson 2346Compliance Testing and Validation
Run the plan command
to preview changes
Lesson 718Change Management and Planning
Runbook link
Direct path to troubleshooting steps
Lesson 2128Alerting Best Practices for Incidents
Runbooks
Step-by-step operational procedures for common tasks
Lesson 717Documentation and CommentsLesson 2130Runbooks and Playbooks
Runs tests
you've defined (unit tests, integration tests, etc.
Lesson 1822CodeBuild Overview and Core Concepts
Runtime arguments
When users run your container with arguments, those replace `CMD` but still go to `ENTRYPOINT`.
Lesson 1009ENTRYPOINT: Container Executable
Runtime environments
pre-installed languages, frameworks, and libraries
Lesson 14Platform as a Service (PaaS) Overview
Runtime initialization
– Starting the language runtime (Node.
Lesson 463Cold Starts and Warm Starts
Runtime language
(compiled languages like Go start faster than interpreted ones)
Lesson 491Cold Start FundamentalsLesson 2543Cold Start Fundamentals
RuntimeDefault
The container runtime's default profile (blocks ~44 risky syscalls)
Lesson 1397Seccomp Profiles
Rust
(compiled to WebAssembly)
Lesson 616Cloudflare Workers
Rust-based micro-proxies
instead of general-purpose proxies, making its data plane extremely fast and resource-efficient.
Lesson 1591Linkerd Overview and Architecture

S

S3 (and object storage)
provides incredibly cheap, durable storage.
Lesson 2096Backend Storage Considerations
S3 backends
, you enable server-side encryption in your backend configuration:
Lesson 792State Encryption at RestLesson 794State Versioning and History
S3 buckets
containing critical data from deletion
Lesson 880Stack Policies
S3 caching
when builds might run on different instances or when you need persistent, project-wide cache storage—especially valuable after auto-scaling events or when using multiple build projects that share dependencies.
Lesson 1829Build Caching Strategies
S3 Cross-Region Replication (CRR)
automatically replicates objects from a source bucket to one or more destination buckets in different AWS regions.
Lesson 2439Storage Replication Strategies
S3 destination
Where AWS deposits the files (often integrated with Athena or Glue)
Lesson 2172AWS Cost and Usage Reports
S3-managed keys (SSE-S3)
by default, or you can specify **AWS KMS keys (SSE-KMS)** for enhanced key management and audit logging—critical for compliance requirements.
Lesson 1828Artifact Management and S3 Integration
Safe but realistic
, using your Chaos Engineering safety controls and blast radius limits from previous lessons
Lesson 2499GameDays and Chaos Testing Practices
Safe scaling
Removing the newest replica first protects established cluster members
Lesson 1179Ordered Deployment and Scaling
Saga pattern
breaks a long-running business transaction into a sequence of local transactions, each handled by a different service or function.
Lesson 2513Saga Pattern for Distributed TransactionsLesson 2587Compensating TransactionsLesson 2735Compensating Transactions
SageMaker-specific Savings Plans
first—they offer deeper discounts (up to 64%) than Compute Plans for ML services, but only apply to SageMaker.
Lesson 2977Savings Plans Optimization Strategies
Same-Region Replication (SRR)
is a feature that automatically duplicates objects from one bucket to another bucket *within the same geographic region*.
Lesson 162Same-Region Replication
SAML/OAuth
– single sign-on with providers like Google or GitHub
Lesson 1781Jenkins User Management and Security
Sample Data Comparison
Select random samples (e.
Lesson 2830Data Validation and Consistency Checks
Samples
files to infer schema (column names, data types)
Lesson 2646Glue Crawlers
Sampling and Alerts
Check quality on data samples before processing full batches.
Lesson 2624Data Quality in Batch Pipelines
Sampling options
full logging vs.
Lesson 2374WAF Logging and Monitoring
Sandbox
Contains a container's network stack (IP address, routing table, DNS settings).
Lesson 1041Docker Network Architecture
Sandbox environments
where developers can experiment safely
Lesson 2943Platform Documentation and Onboarding
Sandbox First
Begin with a non-production namespace to validate configuration
Lesson 1601Service Mesh Adoption Patterns
Save
your view with a meaningful name like "Production DB Costs by Month"
Lesson 2174Azure Cost Analysis and Views
Save report configurations
Reuse common views without rebuilding them
Lesson 2151Custom Cost Reports and Export
Saved queries
Template common compliance checks
Lesson 2355Audit Log Analysis and Search
Savings Plans
Flexible across instance families, sizes, and sometimes regions
Lesson 76Savings Plans and Committed Use DiscountsLesson 2153Reserved Instances and Savings Plans
Scalability and agility
Provisioning resources in minutes instead of weeks, scaling automatically to handle demand spikes, and launching new services faster.
Lesson 2790Introduction to Cloud Migration
Scalable bandwidth
Automatically adjusts to your traffic needs
Lesson 192NAT Gateway Overview
Scale
Built on object storage systems (like AWS S3, Azure Data Lake Storage, or Google Cloud Storage), they can grow to petabytes or exabytes economically.
Lesson 2627Data Lake Concepts and Architecture
Scale down
Nodes that are underutilized for an extended period
Lesson 1502Scaling AKS Node Pools
Scale independently
handle millions of reads without impacting write throughput
Lesson 2597CQRS Pattern
Scale up
Pods that can't be scheduled due to insufficient resources
Lesson 1502Scaling AKS Node Pools
Scale-down is cautious
Cluster Autoscaler waits ~10 minutes before removing underutilized nodes to avoid thrashing
Lesson 1458Cluster Autoscaler Integration
Scale-Down Policies
control how carefully you remove replicas.
Lesson 1451HPA Scaling Behavior
Scale-Down Settings
Tune when and how nodes are removed.
Lesson 1510Cluster Autoscaler Configuration
Scale-down triggers
Nodes running below a utilization threshold (typically 50%) for a sustained period, with workloads that can be safely moved elsewhere
Lesson 1483GKE Cluster Autoscaling
Scale-in protection
lets you flag specific instances as "do not terminate" until you're ready.
Lesson 308Scale-In Protection and TerminationLesson 2155Auto Scaling for Cost Efficiency
Scale-Up Behavior
Configure how quickly new nodes are added when pods are pending.
Lesson 1510Cluster Autoscaler Configuration
Scale-up is reactive
Nodes typically take 2-5 minutes to provision, creating temporary lag
Lesson 1458Cluster Autoscaler Integration
Scale-Up Policies
control how aggressively you add replicas.
Lesson 1451HPA Scaling Behavior
Scale-up triggers
Pods stuck in "Pending" state because no node has enough CPU, memory, or other resources
Lesson 1483GKE Cluster Autoscaling
scales automatically
running one build or hundreds simultaneously without configuration.
Lesson 1822CodeBuild Overview and Core ConceptsLesson 2640Query Engines for Data Lakes
Scales easily
Support for thousands of VPC attachments
Lesson 218Transit Gateway Concepts
Scales in
(removes instances) when demand drops
Lesson 40Elasticity and Auto-Scaling Concepts
Scales out
(adds more instances) when traffic increases
Lesson 40Elasticity and Auto-Scaling Concepts
Scaling increment
How much to add each time (e.
Lesson 401Storage Autoscaling
Scaling Out
When CPU usage exceeds 70%, add 2 more servers
Lesson 286What is Auto ScalingLesson 291Scaling Out vs Scaling In
Scaling policy
Manual, metric-based (CPU, memory), or schedule-based
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
Scaling policy monitoring
means actively observing how your scaling policies behave in real-world conditions, reviewing their history, and adjusting them based on what you learn.
Lesson 312Scaling Policy Monitoring
Scaling rules
Policies that trigger scale-out or scale-in based on metrics like CPU usage or custom telemetry
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
Scaling thresholds
Define when to add/remove capacity (e.
Lesson 2155Auto Scaling for Cost Efficiency
Scenario-based
, simulating real-world disasters (network failures, compute crashes, state corruption)
Lesson 2499GameDays and Chaos Testing Practices
Schedule for Deletion
– You mark a key for deletion but it enters a "pending deletion" state instead of disappearing immediately.
Lesson 2291Key Deletion and Recovery
Schedule large transfers
during off-peak times if using NAT Instances instead
Lesson 199Internet Connectivity Costs
Schedule regular reviews
(monthly or quarterly) with stakeholders including engineering, product, and support teams.
Lesson 2125Iterating and Refining SLOs Over Time
Schedule triggers
Run at specific times (daily, hourly)
Lesson 2620Azure Data Factory Pipelines
Schedule workloads wisely
Use AKS virtual nodes (lesson 1503) for burst traffic rather than permanently sizing for peak load.
Lesson 1504AKS Cost Management and Cluster Sizing
Schedule-based scaling
adjusts capacity at predetermined times.
Lesson 322VMSS Scaling Policies and Rules
Scheduled
Production deployments only during maintenance windows
Lesson 1651Environment Promotion Strategies
Scheduled CI/CD jobs
that run `terraform plan -detailed-exitcode` (exits with code 2 if drift detected)
Lesson 842Drift Detection and Remediation
Scheduled Deletion
Grace period before permanent destruction
Lesson 2280Introduction to Key Management Systems
Scheduled events
Use cron-like schedules as events to run periodic maintenance tasks.
Lesson 2501Event-Driven Invocation PatternLesson 2676Cache-Warming and Preloading
Scheduled exports
Automate daily or monthly dumps of detailed line-item data
Lesson 2151Custom Cost Reports and Export
Scheduled for destruction
awaiting 24-hour minimum deletion window
Lesson 2320GCP Cloud KMS Key Rotation and Versions
Scheduled high-traffic events
(product launches, sales)
Lesson 493Provisioned Concurrency
Scheduled in advance
with clear start/end times
Lesson 2499GameDays and Chaos Testing Practices
Scheduled maintenance windows
Pre-configure recurring or one-time windows
Lesson 648Alarm Suppression and Maintenance Windows
Scheduled re-scans
Registry periodically re-analyzes the same image layers against updated vulnerability databases
Lesson 1085Continuous Vulnerability Monitoring
Scheduled reminders
Send a notification 24 hours after user signup
Lesson 2723Delay Queues and Message Timers
Scheduled retrieval
Run Lambda functions, Azure Functions, or Cloud Run jobs daily to fetch yesterday's costs and update dashboards.
Lesson 2973Cost Allocation APIs and Automation
Scheduled Scaling
Add capacity every Monday at 9 AM for expected workload
Lesson 286What is Auto ScalingLesson 694Cost Optimization Through IaC
Scheduled Scaling action
(adding capacity at 9 AM) on the same Auto Scaling group.
Lesson 305Multiple Scaling Policy Coordination
Scheduled tasks
Run nightly reports, cleanup jobs, or periodic backups without maintaining always-on servers
Lesson 470FaaS Use Cases and Anti-Patterns
Scheduled times
– A cron-like timer fires
Lesson 462Event-Driven Execution Model
Scheduled triggers
Run jobs on a cron-like schedule (daily at 2 AM, every 6 hours, etc.
Lesson 2648Glue Job Triggers and Workflows
Scheduled warm-ups
use scheduled job patterns (previously covered) to invoke functions periodically, keeping them warm.
Lesson 2544Cold Start Mitigation Strategies
Scheduler
(`scheduler`): Pod scheduling decisions
Lesson 1473EKS Logging and CloudWatch Integration
Scheduling the winner
Once resources are freed, the high-priority pod is scheduled.
Lesson 1371Pod Preemption Behavior
schema
is a blueprint that defines what inputs your template expects, their data types, and any constraints.
Lesson 953Template Schemas and ValidationLesson 2573GraphQL in MicroservicesLesson 2658Athena Data Catalogs and Databases
Schema autonomy
Each service can evolve its data model without coordination
Lesson 2561Database per Service Pattern
Schema enforcement and evolution
without moving data
Lesson 2629Data Lakehouse Architecture
Schema evolution
is the art of changing your data structure without breaking existing consumers.
Lesson 2638Schema Evolution and VersioningLesson 2654Schema Evolution and Versioning
Schema Management
Track column names, types, and relationships automatically
Lesson 2637Data Catalog and Metadata Management
Schema migration
Converting table structures, indexes, and constraints
Lesson 2806Database Migration Service Fundamentals
Schema Registry
Tools like AWS Glue Data Catalog or Apache Hudi store schema versions centrally.
Lesson 2638Schema Evolution and VersioningLesson 2732Event Schema Evolution
Schema translation
Convert table definitions, indexes, constraints, and data types
Lesson 2824Schema Conversion Tools
Schema Validation
Ensure incoming data matches expected types, column names, and structures.
Lesson 2624Data Quality in Batch Pipelines
Schema versioning
Include a `schemaVersion` field in every event.
Lesson 2732Event Schema Evolution
Scientific modeling
and simulations
Lesson 67Compute Optimized Instance Types
Scientific simulations
Physics modeling, genomics research, computational chemistry
Lesson 70Accelerated Computing Instance Types
SCM Polling
Jenkins regularly checks the repository for changes (e.
Lesson 1773Jenkins Jobs and Build TriggersLesson 1789Triggers and Automated Execution
SCM provider generator
Queries GitHub/GitLab for repositories
Lesson 1907ApplicationSets for Dynamic Applications
Scope their ISMS
(which services, regions, and data centers)
Lesson 2325ISO 27001 Information Security
Scrape configs
define individual monitoring jobs and their targets:
Lesson 1956Prometheus Configuration Basics
Scrape interval optimization
is the art of finding the sweet spot for each job.
Lesson 1988Scrape Interval Optimization
Scrapes
metrics from kubelets every 60 seconds (default)
Lesson 1445Metrics Server Architecture
Scratch space
for computations or intermediate processing
Lesson 1326Ephemeral Inline Volumes
Script content
Inline or from a file URI
Lesson 909Deployment Scripts in ARM Templates
Scripted recovery procedures
execute the actual DR steps: restoring databases, failing over DNS, activating standby systems.
Lesson 2906Automated DR Test Frameworks
Scripts and Infrastructure-as-Code
Lesson 2440Automated DR Orchestration
SDK
is the *implementation* of the API.
Lesson 2074OpenTelemetry Architecture and Components
SDP Client
Installed on user devices, initiates authentication before any network traffic flows
Lesson 2400Software-Defined Perimeter (SDP)
SDP Controller
Authenticates users and devices, verifies authorization policies
Lesson 2400Software-Defined Perimeter (SDP)
SDP Gateway
Acts as the enforcement point, creating encrypted tunnels only to verified users
Lesson 2400Software-Defined Perimeter (SDP)
Seal wrap
adds encryption on top of already-encrypted secrets.
Lesson 2267Vault Auto-Unseal and Seal Wrap
Sealed
Vault cannot decrypt data or serve requests
Lesson 2253Vault Architecture and Components
Sealed Secrets
(commonly used with Kubernetes) lets you encrypt secrets into "SealedSecret" resources that can safely live in Git.
Lesson 1870Handling Secrets in GitOpsLesson 1941Secrets Management in FluxLesson 2277Sealed Secrets for GitOpsLesson 2278Container Registry Authentication
Seamless scaling
You can add or remove servers instantly without worrying about "lost" user sessions
Lesson 42Stateless Application DesignLesson 2474Designing for Stateless-First Architecture
Search and analytics
engines indexing massive document sets
Lesson 69Storage Optimized Instance Types
Search and filtering
Quickly find all production VMs or all VMs owned by a specific team
Lesson 63VM Tags and Resource Organization
Search bar
Type field queries like `level:ERROR` or `service.
Lesson 2029Kibana Index Patterns and Discover
Search Heads
provide the query interface.
Lesson 2042Splunk Cloud and Enterprise Logging
Seasonal trends
Increased traffic during holidays or special events
Lesson 302Predictive Scaling Fundamentals
Seccomp/AppArmor/SELinux
add kernel-level protection
Lesson 1404Pod Security Best Practices
SecondLevelKey
– the nested key (the specific value you want)
Lesson 871Fn::FindInMap Function
Secret
containing your TLS certificate and private key
Lesson 1225TLS Termination with Ingress
Secret management
Use Vault, Sealed Secrets, or SOPS instead of cloud-native vaults
Lesson 2773Configuration Management Portability
Secret management services
Use tools like AWS Secrets Manager, Azure Key Vault, or HashiCorp Vault to store and retrieve secrets programmatically
Lesson 714Secrets Management in IaC
secret management systems
like AWS Secrets Manager, HashiCorp Vault, Azure Key Vault, or Google Secret Manager.
Lesson 1275External Secrets OverviewLesson 2828Connection String and Configuration Updates
Secret scanning
hunts for accidentally embedded sensitive data like API keys, passwords, database credentials, or private keys hardcoded in your image layers.
Lesson 1083Malware and Secret Scanning
Secret Text
for API tokens or passwords
Lesson 1777Jenkins Credentials Management
Secret types
signal to Kubernetes (and administrators) what kind of sensitive data you're storing and how it should be handled.
Lesson 1264Secret Types and Use Cases
SecretID
= password (highly sensitive, delivered securely at runtime)
Lesson 2258AppRole Authentication for Applications
SecretProviderClass
resources that define *what* to fetch and *where* to mount it
Lesson 2276Secrets Store CSI Driver
Secrets Manager
stores sensitive credentials with automatic rotation support, encryption at rest, and fine-grained access control.
Lesson 508AWS Lambda: Environment Variables and Secrets
Secrets or ConfigMaps
created outside the Helm chart
Lesson 1528Uninstalling Releases
Secrets passing
Securely share secrets without exposing them
Lesson 1716Workflow Templates and Reusable Workflows
Secrets stay secure
State files aren't scattered across laptops where they might be committed to version control
Lesson 783Why Remote State Matters
Secrets Store CSI Driver
takes a different approach: it uses Kubernetes' Container Storage Interface (CSI) to mount secrets from external stores (like Vault, AWS Secrets Manager, or Azure Key Vault) *directly as files* in your pods—without creating Kubernetes Secret objec...
Lesson 2276Secrets Store CSI DriverLesson 2279Secrets Rotation in Containers
Secure
Encrypted tunnels protect data in transit
Lesson 2195Hybrid Cloud Connectivity Overview
Secure by Default Configuration
means cloud resources should start their life with the strongest possible security settings automatically enabled—not as an afterthought.
Lesson 2844Secure by Default Configuration
Secure file downloads
Share a private document with a customer for 24 hours
Lesson 165Pre-Signed URLs and Temporary Access
Secure Score
A numerical rating of your security posture with prioritized recommendations
Lesson 2863Azure Security Center and Sentinel
Security Analyst
Investigates alerts, determines scope and impact
Lesson 2870Incident Response Planning
Security and compliance
Your organization requires workflows to run within your security perimeter or meet specific regulatory requirements
Lesson 1690Self-hosted Runners OverviewLesson 1811CodeCommit: Git Repository ServiceLesson 1815CodeArtifact: Artifact Repository ServiceLesson 1821When to Use AWS Native CI/CD
Security and compliance gates
Execute Open Policy Agent checks and security scanning before provisioning
Lesson 2887CI/CD Integration for IaC Tests
Security at scale
Implementing authentication and encryption between dozens or hundreds of services becomes unmanageable
Lesson 1576Istio Overview and Core Value Proposition
Security auditing
and compliance requirements
Lesson 1637Access Logging in Service Mesh
Security Baseline and Hardening
by embedding those standards into provisioning workflows rather than applying them manually afterward.
Lesson 2844Secure by Default ConfigurationLesson 2863Azure Security Center and Sentinel
Security breaches
If an account is compromised, attackers gain only limited access
Lesson 334The Principle of Least Privilege
Security by Default
IAM operates on the principle of least privilege—users and services only get the minimum permissions they need.
Lesson 331What is IAM and Why It Matters
Security checks
Verify environment prerequisites
Lesson 1149Init Containers
Security compliance
Require encryption for storage, enforce network rules
Lesson 837Policy Enforcement with Sentinel
Security concerns
Are credentials hardcoded?
Lesson 715Code Review and Peer Validation
Security contexts
restrict container capabilities
Lesson 1404Pod Security Best Practices
Security controls
Raw data needs stricter access; consumption can be more open
Lesson 2631Data Lake Zones and Organization
Security defaults
Authentication, secrets management, and policy compliance
Lesson 2929Software Templates and Scaffolding
Security exposure
If compromised, an attacker gains total control
Lesson 339Root Account and Administrative Access
security filtering
directly at the load balancer layer—before requests ever hit your servers.
Lesson 250HTTP Header and Method-Based RoutingLesson 610Edge Computing Concepts and Use Cases
Security gaps
Open ports, weak encryption, overly permissive access rules
Lesson 695IaC Security and Compliance Benefits
security group
is a virtual firewall that protects individual cloud instances (virtual machines) by controlling which network traffic is allowed to reach them and which traffic they can send out.
Lesson 202Security Group FundamentalsLesson 406Security Groups for Database Access
Security group configuration
and networking
Lesson 96AWS Elastic Beanstalk Introduction
Security group restrictions
limiting which sources can reach your load balancer
Lesson 284Load Balancer Security Best Practices
Security group rules
If policy evaluation fails, block all traffic
Lesson 2837Fail Secure Principles
Security hardening
Add `X-Frame-Options: DENY` to prevent clickjacking attacks, or `Content-Security-Policy` to restrict resource loading.
Lesson 604Response Header CustomizationLesson 1315StorageClass Mount Options
Security headers
enforcement (HSTS, X-Frame-Options)
Lesson 284Load Balancer Security Best Practices
Security investigations
Identify suspicious activity or attack patterns
Lesson 257ALB Access Logs and Monitoring
Security is mandatory
, but you select additional criteria based on your service's commitments.
Lesson 2324SOC 2 Trust Service Criteria
Security misconfigurations
Open ports, public S3 buckets, or disabled encryption
Lesson 722IaC Security ScanningLesson 2877Static Analysis and Linting
Security monitoring
Detect intrusions, malware, or suspicious patterns using intrusion detection systems (IDS)
Lesson 229VPC Traffic Mirroring
Security or compliance rationale
Why certain restrictions exist
Lesson 717Documentation and Comments
Security patches
(older runtimes lose support)
Lesson 471Function Runtime Environments
Security placeholders
to avoid exposing backend details
Lesson 1229Default Backend Configuration
security policy
that defines which TLS versions and cipher suites are acceptable—think of this as setting the "strength requirement" for secure connections.
Lesson 253SSL/TLS Termination at ALBLesson 2371Google Cloud Armor Fundamentals
Security realm
How users authenticate (local database, LDAP, SSO)
Lesson 1772Installing and Configuring Jenkins
Security requirements
Keep source code and artifacts within your controlled infrastructure
Lesson 1720Self-Hosted Runners
Security rules
Block privileged containers or host path mounts beyond what built-in controllers check
Lesson 1409Validating Admission Webhooks
Security Scan Results
from tools that check for vulnerabilities, license violations, or policy breaches should be attached as metadata.
Lesson 1677Artifact Metadata and Traceability
Security scanning
Are there exposed secrets or insecure configurations?
Lesson 721Continuous Integration for IaC
Security teams
might require: Policy enforcement points and audit capabilities
Lesson 2920Abstraction Levels and User Personas
Security vulnerabilities
(hardcoded credentials, injection risks)
Lesson 1816CodeGuru: AI-Powered Code Review
Security-sensitive environments
where image content must stay confidential
Lesson 1062Public vs Private Registries
Select a workflow run
to see all jobs
Lesson 1694Workflow Status and Logs
Select specific dimensions
Filter by tags, services, regions, or accounts
Lesson 2151Custom Cost Reports and Export
Selective backups
Target only `jobs/`, `config.
Lesson 1808Backup and Disaster Recovery
Selective Logging
Enable verbose access logs only for critical services or during troubleshooting.
Lesson 1643Observability Performance Impact
Selector blocks
that must match exactly
Lesson 1557Advanced Templating with Named Templates
Selectors in PersistentVolumeClaims
specify which labels to match:
Lesson 1300Volume Selectors and Labels
Self-contained
Minimal dependencies on other parts
Lesson 2569Microservices Migration Strategies
Self-heal
enables ArgoCD to automatically revert manual changes back to what's defined in Git.
Lesson 1886Self-Heal and Prune Options
Self-hosted control
You own your data and infrastructure
Lesson 1770Introduction to Jenkins and CI/CD Automation
Self-hosted proxies
Harbor, JFrog Artifactory, and similar tools
Lesson 997Registry Mirroring and Caching
Self-Managed Node Groups
You control the upgrade strategy (rolling update, blue/green deployment)
Lesson 1471EKS Cluster Upgrades
Self-Managed Nodes
are EC2 instances you provision and maintain yourself, then register with your EKS cluster.
Lesson 1464EKS Node Groups: Managed vs Self-Managed
Self-service actions
Provision environments, deploy applications, request resources
Lesson 2924Introduction to Developer Portals
Self-service catalog
Predefined templates for common infrastructure patterns (databases, compute, storage)
Lesson 2914Internal Developer Platform (IDP) Fundamentals
Self-service storage
for developers
Lesson 1303StorageClass Fundamentals
Self-service with governance
provides a middle ground.
Lesson 2918Self-Service vs. Full Autonomy
SELinux
(Security-Enhanced Linux) and **AppArmor** are Linux kernel security modules that enforce **mandatory access control**.
Lesson 1396SELinux and AppArmor Profiles
Semantic conventions
are OpenTelemetry's standardized naming rules for span attributes, metrics, and resource information.
Lesson 2077Semantic Conventions and Standard Attributes
Semantic undo
May not restore identical state, but achieves equivalent business outcome
Lesson 2735Compensating Transactions
Semantics
All support at-least-once; Flink excels at exactly-once across diverse sources
Lesson 2611Stream Processing Frameworks
Send both
the encrypted data and the encrypted DEK to the recipient
Lesson 2307Hybrid Encryption for Large Data
Send enriched alerts
to incident response teams with context and recommended actions
Lesson 2871Automated Incident Response
Send notifications
Email teams about build results
Lesson 1776Build Steps and Post-Build Actions
Send the encrypted DEK
to KMS to decrypt it with the master key
Lesson 2296Envelope Encryption Pattern
Sends notifications
(via SNS topic) to designated reviewers
Lesson 1844Manual Approval Actions
Sends those manifests
to the Kubernetes API server via the standard API
Lesson 1521Helm Architecture: Client and Library
sensitive
so their values are hidden from logs and console output, protecting secrets like passwords and API keys from accidental exposure.
Lesson 763Sensitive VariablesLesson 791Partial Backend Configuration
Sensitive data
Passwords, API keys, temporary tokens
Lesson 1039tmpfs MountsLesson 1260Kubernetes Secrets Overview
Sentinel Imports
Pre-built libraries give you access to Terraform plan data, state, and configuration—letting you inspect proposed resources, check naming conventions, verify tags, or ensure approved AMIs are used.
Lesson 2341Terraform Sentinel Overview
Separate by function
Create individual template files for logical components (networking, compute, storage).
Lesson 950Template Imports and Organization
Separate environments completely
Different S3 buckets (or storage accounts) per environment prevents accidental production overwrites during development.
Lesson 797Remote State Best Practices
Separate infrastructure
Each AZ operates its own power grid connections, generators, and cooling
Lesson 2454Availability Zones and Data Center Distribution
Separate repositories
for each application, team, or environment (e.
Lesson 1916GitOps Repository Patterns
Separate state files
by environment or service to reduce blast radius
Lesson 833Repository Structure for Large Projects
Separation of Duties
influences how you design deployment pipelines and access boundaries.
Lesson 2836Security by DesignLesson 2837Fail Secure Principles
Separation of Duties (SoD)
means dividing sensitive operations so that no single person can complete a critical action alone.
Lesson 2835Separation of Duties
Sequential access
means reading or writing data in a continuous, ordered fashion—like reading a book from start to finish.
Lesson 119Storage Access Patterns and Workload Types
Sequential operations
(spans that follow one after another from the same parent)
Lesson 2063Spans and Span RelationshipsLesson 2068Trace Analysis Patterns
Sequential reads
(reading large files in order) maximize throughput
Lesson 134Volume Performance Optimization
sequentially
and must each complete successfully before the next one starts.
Lesson 1149Init ContainersLesson 1845Parallel and Sequential Stage Execution
SerDe
(Serializer/Deserializer) that tells Athena how to interpret the raw bytes.
Lesson 2660Querying Data Formats in Athena
Server B
suddenly your cart looks empty!
Lesson 242Session Affinity (Sticky Sessions)
Server health and capacity
to avoid overloaded nodes
Lesson 586CDN Request Flow and Routing
Server presents its certificate
to the client
Lesson 1618Mutual TLS (mTLS) Fundamentals
Server provisioning and scaling
no need to choose VM types or configure autoscaling
Lesson 14Platform as a Service (PaaS) Overview
Server validates
Checks if current resource still has ETag `"v1"`.
Lesson 2674ETag and Conditional Requests
Server-side encryption
(provider manages the keys)
Lesson 122Storage Security Basics
Serverless Architecture
No clusters to manage, no capacity planning.
Lesson 2636Google BigQuery Fundamentals
Serverless functions
(like AWS Lambda, Azure Functions, Google Cloud Functions) follow a **pay-per-invocation** model.
Lesson 2163Serverless vs Containers Cost Analysis
Serverless orchestration
uses Step Functions or similar tools to coordinate complex workflows across multiple services, handling retries and error paths declaratively rather than in code.
Lesson 2567Microservices on Serverless
Serverless SQL pools
– On-demand SQL queries directly against data lake files (Parquet, JSON, CSV) with zero infrastructure management
Lesson 2635Azure Synapse Analytics
Serverless VPC Connector
as a bridge between your function and your VPC network.
Lesson 516Google Cloud Functions: VPC Connectivity and Networking
ServerSpec
tests infrastructure from a server configuration perspective, verifying services, packages, and system settings.
Lesson 2346Compliance Testing and Validation
Service account key files
JSON keys for programmatic access (CI/CD pipelines)
Lesson 1096GCP Registry Authentication and IAM
Service account permissions
Grant rotation functions only the minimum IAM permissions needed (`secretmanager.
Lesson 2247GCP Secret Manager Rotation Strategies
Service Account Token Projection
solves this by allowing you to request tokens with explicit lifetimes and intended audiences.
Lesson 1401Service Account Token Projection
Service Adoption Rates
measure *how fast* teams embrace platform capabilities:
Lesson 2936Portal Metrics and Adoption
Service Boundaries and Decomposition
(lesson 2560) aimed to achieve.
Lesson 2562Shared Database Anti-Pattern
Service catalogues
help clarify ownership boundaries—every service has a clear owner team, documented responsibilities, and communication channels.
Lesson 2565Microservices Team Organization
Service CIDR (secondary range)
Virtual IP addresses for Kubernetes Services
Lesson 1480GKE Networking Fundamentals
Service Control Policies (SCPs)
are the permission boundaries you attach to your AWS Organizations structure.
Lesson 384AWS Organizations and SCPsLesson 2361Cloud Governance Tools Overview
Service controller
Creates, updates, and deletes cloud load balancers when you create LoadBalancer-type Services
Lesson 1107Cloud Controller Manager
Service count matters
If you're running 5-10 microservices, you can likely manage traffic routing, security, and observability with simpler tools.
Lesson 1574When to Use a Service Mesh
Service dependencies
Grouping tightly-coupled microservices together
Lesson 1351Pod Affinity Fundamentals
Service Discovery Integration
Consul's native service catalog means services register themselves automatically.
Lesson 1593Consul Service Mesh Fundamentals
Service Graph
Generates dependency maps automatically from trace data
Lesson 2092Tempo by Grafana
Service Health Check
Trigger when `HighCPU AND HighMemory AND HighLatency` all fire — indicating a genuine service degradation, not just a temporary spike.
Lesson 645Composite Alarms
Service independence
means each component can be updated, scaled, or even fail without bringing down the entire system.
Lesson 41Loose Coupling and Service Independence
Service Key
a GUID that identifies your circuit.
Lesson 2216ExpressRoute Circuit Configuration
Service Level Agreements (SLAs)
, which are promises the provider makes about how reliable the service will be.
Lesson 414RDS High Availability Overview
Service Mesh Interface (SMI)
specification—a community-driven standard that ensures portability and consistency across different mesh implementations.
Lesson 1596Open Service Mesh (OSM) BasicsLesson 1598Service Mesh Interface (SMI) Standard
Service mesh proxies
Handle authentication, encryption, and traffic routing (like Envoy in Istio)
Lesson 2599Sidecar Pattern for Cross-Cutting Concerns
Service meshes
Istio, Linkerd for cross-cluster service communication
Lesson 1514Cluster Federation Basics
Service metadata
Include version numbers or deployment IDs
Lesson 660Log Parsing and Enrichment
Service outages
affecting entire AWS/Azure/GCP regions
Lesson 2426Cross-Region and Cross-Account Backup
Service port
(what clients connect to) and the **target port** (where your container is actually listening).
Lesson 1213Service Ports and Target Ports
Service Principals
are application identities that allow automated systems (CI/CD pipelines, build servers) to authenticate without human interaction.
Lesson 1092ACR Authentication and RBACLesson 1283Azure Key Vault Integration
Service Registries
Consul, etcd, Eureka, AWS Cloud Map
Lesson 2575Service Discovery Patterns
Service role
IAM permissions for CodeDeploy to access your resources
Lesson 1832CodeDeploy Application and Deployment Groups
Service startup order
Do databases come up before application servers that depend on them?
Lesson 2908Application Recovery Testing
Service verification
Some cloud services process data globally—confirm each service's data flow
Lesson 2332Geographic and Regional Compliance
Service-Linked Roles
and **Temporary Security Credentials** provide secure, time-limited access?
Lesson 358Instance Profiles and Metadata
Service-specific
Each role is tied to one service and includes that service in its name
Lesson 357Service-Linked Roles
Service-specific parameters
(cluster names, function names, stack names)
Lesson 1843Deploy Stages and Deployment Actions
Service-specific rates
Custom pricing for high-consumption services like compute, storage, or data transfer
Lesson 2166Discount Negotiation and EDP
Service-to-Service
A Lambda function's execution role grants access to specific secrets.
Lesson 2249Cross-Service Secrets Integration
Service/Project
`api`, `frontend`, `database`
Lesson 713Naming Conventions and Standards
ServiceNow
for ticket creation and SLA tracking
Lesson 2869Security Alerts and Notification Workflows
Session
Within a single user session, reads reflect that session's writes.
Lesson 437Cosmos DB Consistency Levels
Session affinity
(also called **sticky sessions**) is a load balancer feature that "remembers" which backend server handled your first request, then routes all your subsequent requests to that **same server** for the duration of your session.
Lesson 242Session Affinity (Sticky Sessions)Lesson 278Session Affinity and Sticky SessionsLesson 1215Session AffinityLesson 2467Sticky Sessions and Affinity
Session management
ensures users can seamlessly move between regions without losing state
Lesson 2435Active-Active Multi-Region
Session storage
Temporary user state across distributed services
Lesson 2682In-Memory Caching Fundamentals
Set
a secret, key, or certificate
Lesson 2242Azure Key Vault Fundamentals
Set alarms
when DLQ depth exceeds thresholds
Lesson 2714Dead Letter Queues
Set appropriate expiration
Short-lived artifacts for temporary debug files, longer for releases
Lesson 1746Job Artifacts
Set Appropriate Timeouts
Some resources take time to provision.
Lesson 919ARM Template Best Practices and Validation
Set file ownership
with `--chown` in `COPY` instructions so your user can access files
Lesson 1011USER: Running as Non-Root
Set meaningful thresholds
Don't alarm on arbitrary numbers.
Lesson 651Alarm Best Practices and Anti-Patterns
Set realistic limits
based on actual application behavior
Lesson 1335Setting Memory Limits
Set your alert threshold
(dollar amount or percentage deviation)
Lesson 2171AWS Cost Anomaly Detection
sets
when uniqueness matters, **maps** for simple lookups, and **objects** when you need structured configuration with mixed types.
Lesson 757Variable Types: Complex TypesLesson 2684Redis Architecture and Data Structures
Sets context
automatically switches kubectl to use this new cluster
Lesson 1497Connecting to AKS with kubectl
Setting Boundaries
You define minimum and maximum node counts per node pool.
Lesson 1510Cluster Autoscaler Configuration
Setting resource count conditionally
Lesson 737Conditional Expressions
Severity Level
Critical, warning, or info
Lesson 2016Log Alerting Basics
Severity levels
provide a shared language for your team to quickly assess impact and mobilize the appropriate resources.
Lesson 2129Incident Severity LevelsLesson 2869Security Alerts and Notification Workflows
Severity rating
Vulnerabilities are scored (Critical, High, Medium, Low) based on their exploitability and impact
Lesson 1073Image Scanning Fundamentals
Shadow traffic
Route copies of requests to new services without affecting production
Lesson 2569Microservices Migration Strategies
Shallow vs. Deep Checks
Shallow checks (like "is the web server responding?
Lesson 2455Health Checks and Failure Detection
Shape and Icons
reinforce the message: checkmarks for healthy, warning triangles for caution, exclamation marks or X symbols for critical.
Lesson 2106Threshold Indicators and Alerts
Share code across functions
One layer can serve multiple functions
Lesson 507AWS Lambda: Layers and Dependencies
Share dashboards as snapshots
For reports or historical views, use snapshots instead of live dashboards.
Lesson 2003Grafana Best Practices and Performance
Shared
Default choice for standard web apps, microservices
Lesson 1728GitLab Runners: Shared vs Specific
Shared compute clusters
Multiple services running on the same Kubernetes cluster instead of dedicated clusters per team
Lesson 2164Multi-Tenancy and Resource Sharing
Shared connections
– Use Direct Connect Gateway or ExpressRoute Global Reach to share one connection across multiple VPCs/VNets
Lesson 2224Private Connectivity Cost Management
Shared Ownership
Shift from centralized control to distributed accountability.
Lesson 2952Building a FinOps Culture
Shared responsibility
for system stability
Lesson 693IaC and the DevOps Culture
Shared runners
(available to all projects)
Lesson 1727GitLab CI/CD Architecture Overview
Shared secrets
Pre-shared keys for authentication
Lesson 2779Cross-Cloud VPN Connections
Shared storage
Both controllers access the same `JENKINS_HOME` directory containing jobs, configurations, and build history
Lesson 1802Jenkins High Availability Architecture
Shared storage scenarios
in tightly-coupled workloads
Lesson 135Multi-Attach Volumes
Shared tenancy
(default) means your VMs run on physical hardware shared with other AWS customers—but always isolated at the hypervisor level.
Lesson 94AWS EC2 Launch Types and Tenancy
Shared VPCs
solve this by letting one central account own and manage network infrastructure, while other accounts can use those networks without owning them.
Lesson 230Shared VPCs and Multi-Account Networking
Sharing
Multiple containers can safely use the same volume
Lesson 1035Introduction to Docker Volumes
Sharing files
When you need precise control over *which* host directory to use
Lesson 1038Bind Mounts
Sharing tools and utilities
with the community
Lesson 1062Public vs Private Registries
Shell scripts
– Start with `#!
Lesson 87User Data and Cloud-Init
Shield
Medium TTLs, shields dynamic content from repeated origin hits
Lesson 2681Multi-Tier Caching with CDN
Shield Advanced
is a premium service offering enhanced capabilities for mission-critical applications.
Lesson 2382AWS Shield Advanced
Shielded GKE Nodes
Verify boot integrity using Secure Boot and vTPM
Lesson 1488GKE Security: Private Clusters and Hardening
Shift time
Move forward or backward without changing the range duration
Lesson 2000Annotations and Time Range Controls
Shift-Left Enforcement
Policies run during development and CI/CD pipelines—catching violations before resources reach production.
Lesson 2888Policy as Code Fundamentals
Ship logs externally
because local storage disappears
Lesson 2046Cloud-Native Logging Overview
Shipper level
Rate-limit per-source before aggregation
Lesson 2013Log Volume Management
Shipping Service
– coordinates deliveries
Lesson 2560Service Boundaries and Decomposition
Short polling
is like quickly peeking into your mailbox every few seconds.
Lesson 564Long Polling vs Short Polling
Short timeout, long task
If your processing takes 60 seconds but visibility timeout is 30 seconds, the message becomes visible again mid-processing.
Lesson 554Message Visibility and Timeouts
Short TTL (60-300s)
Good for frequent, disposable tasks where you don't need logs
Lesson 1194Job TTL and Automatic Cleanup
Short windows (5-15 minutes)
Real-time troubleshooting, catching spikes
Lesson 2104Time Series and Temporal Context
Short-lived
(ACI charges per-second, ideal for quick tasks)
Lesson 1503AKS Virtual Nodes and Serverless Bursting
Short-term projects
Run a data analysis job for three days without long-term planning
Lesson 73On-Demand Pricing Model
Show cost diffs
in pull requests, just like code diffs
Lesson 2885Cost Estimation Testing
Show scope
`dev-ec2-admin` vs `prod-ec2-admin`
Lesson 375Policy Documentation and Governance
Showback
and **chargeback** are two approaches for distributing cloud cost visibility internally, but they serve different purposes.
Lesson 2146Showback vs Chargeback ModelsLesson 2958Showback vs ChargebackLesson 2966Showback vs Chargeback Models
Showback or Chargeback models
(lesson 2146) to track which teams or business units drive costs.
Lesson 2147Multi-Account Cost Consolidation
Side output
Route late data to a separate stream for manual inspection
Lesson 2606Watermarks and Late Data
Sidecar collection
A dedicated container in the pod ships logs to a central system
Lesson 2046Cloud-Native Logging Overview
sidecar container
is an additional container running in the same pod as your application, sharing the same volumes and network namespace.
Lesson 1435Logging with Sidecar ContainersLesson 2049Kubernetes Logging ArchitectureLesson 2275Vault Agent Injector for Kubernetes
Sidecar containers
are the most common use case: a helper container that enhances the main container.
Lesson 1148Multi-Container PodsLesson 2275Vault Agent Injector for Kubernetes
Sidecar Injection
Service meshes like Istio automatically inject proxy containers into every Pod without you manually adding them.
Lesson 1410Mutating Admission WebhooksLesson 1579Sidecar Injection Mechanisms
sidecar pattern
a lightweight proxy container (`linkerd-proxy`) automatically injected alongside each application container.
Lesson 1591Linkerd Overview and ArchitectureLesson 2050Sidecar Pattern for Logging
sidecar proxy pattern
(typically Envoy) to handle inter-service communication, providing mTLS encryption, traffic management, and observability.
Lesson 1593Consul Service Mesh FundamentalsLesson 1595AWS App Mesh Overview
SIEM
(Security Information and Event Management) system, enriching your centralized security monitoring with AWS-specific threat intelligence.
Lesson 2862AWS GuardDuty
Signing in
to the Terraform Registry with your GitHub account and authorizing access to your repository
Lesson 805Publishing Modules to Terraform Registry
Silver
Cleaned, validated, deduplicated data
Lesson 2615Batch Processing Architectures
Simple compute
AWS Lightsail vs Azure App Service vs GCP App Engine
Lesson 109Cross-Provider Compute Feature Comparison
Simple scalable mode
Components grouped into read, write, and backend services.
Lesson 2035Loki Components and Deployment Modes
Simple Scaling
is the most basic approach.
Lesson 316ASG Scaling Policies in AWS
Simpler architecture
No need for downstream filtering logic in every consumer
Lesson 558SNS Message Filtering
Simpler compliance
and auditing
Lesson 253SSL/TLS Termination at ALB
Simpler deployment
One component instead of three
Lesson 1577Istio Control Plane Components
Simpler troubleshooting
Only one version runs at any time
Lesson 1168Recreate Strategy
Simplicity
Memcached has fewer moving parts, making it easier to reason about and debug
Lesson 2689Memcached Fundamentals
Simplification
Hide complexity from deployment consumers
Lesson 955Creating Custom Composite Types
Simplified architecture
No need for NAT gateways for private subnet resources accessing services
Lesson 221PrivateLink and Service Endpoints
Simplified configurations
High-level building blocks instead of low-level details
Lesson 954Introduction to Composite Types
Simplified consistency
No partial updates or file corruption during writes
Lesson 145Object Immutability Concepts
Simplified Cost Management
Single AWS bill, predictable pricing tied to usage, and no separate vendor contracts to manage.
Lesson 1821When to Use AWS Native CI/CD
Simplified queries
Complex aggregations become simple metric lookups
Lesson 1957Recording Rules
Simplified RBAC
Control who can create cluster-wide resources separately from namespace-scoped ones.
Lesson 1279ClusterSecretStore Resource
Simplified reporting
for finance and leadership teams
Lesson 2147Multi-Account Cost Consolidation
Simplified routing
No complex VPN or peering configs
Lesson 2397Private Link and Endpoint Services
Simplified syntax
for common operations
Lesson 1130What is kubectl and Its Role
Simplified Testing
Test the complete image once, deploy it everywhere
Lesson 46Immutable Infrastructure Principles
Simplified topology
Connect 10 VPCs and 5 data centers with 15 connections instead of 105 individual peering relationships
Lesson 2208Transit Gateway for Hybrid Networks
Simplify complexity
Hide implementation details behind a clean interface of input variables and outputs
Lesson 798What Are Terraform Modules
Simplify compliance
by mapping regulatory requirements to specific zones
Lesson 2841Security Boundaries and Trust Zones
Simplify deployment
Pre-configure networking so launching new databases is consistent
Lesson 405Subnet Groups and Network PlacementLesson 908Template Specs for Reusable Templates
Simplifying syntax
No more curly braces everywhere or complex string concatenations
Lesson 920Introduction to Bicep
Simulate failure conditions
in a controlled way.
Lesson 650Alarm Testing and Validation
Simulations
test specific components in isolation—failing over a database, restoring from backup, or switching DNS records—without full production impact.
Lesson 2902DR Testing Fundamentals and Objectives
Single authentication service
with no redundancy
Lesson 2450Single Points of Failure Identification
Single AZ approach
All your servers in one subnet in `us-east-1a` — if that data center has problems, your entire application goes down.
Lesson 178Availability Zones and Subnets
Single Build
Create your artifact once in the CI phase (JAR, container image, ZIP, etc.
Lesson 1676Artifact Promotion Patterns
Single database instance
with no replica or failover
Lesson 2450Single Points of Failure Identification
single entry point
for all client requests to your backend services.
Lesson 520What is an API Gateway?Lesson 2576API Gateway Pattern
Single network gateway
or NAT instance
Lesson 2450Single Points of Failure Identification
Single or few values
that don't warrant a file
Lesson 1261Creating Secrets from Literals
single pane of glass
to track migrations across multiple AWS services (like Database Migration Service, Server Migration Service, and Application Migration Service).
Lesson 2804Cloud Provider Native Migration Services OverviewLesson 2815Hybrid Operations and CoexistenceLesson 2934Integrating CI/CD and Observability
single point of failure
is any component in your system whose failure would cause the entire service—or a critical part of it—to stop working.
Lesson 2450Single Points of Failure IdentificationLesson 2467Sticky Sessions and AffinityLesson 2475Database Replication Fundamentals
Single Responsibility
One microservice handles one business function (user authentication, payment processing, inventory management).
Lesson 2555What Are Microservices?
Single sign-on
to multiple AWS accounts
Lesson 383AWS IAM Identity Center (SSO)
Single Sign-On (SSO)
is the user experience this enables: log in once, access everywhere.
Lesson 2852Identity Federation and SSO
Single-AZ
is cheaper because you're running one database instance in one location.
Lesson 417Multi-AZ vs Single-AZ Trade-offs
Single-User Rotation
The same credentials are updated in place.
Lesson 2240AWS Secrets Manager Rotation
Size flexibility
Mix instance sizes with equivalent capacity (`c5.
Lesson 2978Spot Instance Fleet Management
Size information
How large each layer is
Lesson 980Image Manifest and Metadata
Size limits
ARM templates have a 4 MB size limit; linking helps you stay under it
Lesson 907Linked Templates and Template Nesting
Size mismatch
PVC requests 10Gi but only 5Gi PVs available
Lesson 1302Troubleshooting PV and PVC Issues
Size-based retention
Cap total storage per partition (e.
Lesson 2610Kafka Retention and Storage
Skills are transferable
Teams need portable knowledge across providers
Lesson 2777Lock-In vs Portability Trade-offs
Skipping test environments
Deploying straight from dev to production without intermediate validation environments invites disaster.
Lesson 1656CI/CD Best Practices and Anti-patterns
SKU
Standard (regional) vs Premium (global reach)
Lesson 2216ExpressRoute Circuit Configuration
SLA
is a *contractual promise* to customers, often with financial consequences if violated.
Lesson 2112Service Level Terminology: SLI, SLO, and SLA
SLA commitments
MTBF informs realistic availability guarantees
Lesson 2413Mean Time Between Failures (MTBF)
SLA-relevant measurements
Time to first byte for premium customers, processing duration for priority jobs
Lesson 638Custom Metrics and Instrumentation
Slack/Microsoft Teams
Real-time messaging channels where your team is already collaborating.
Lesson 647Notification Channels
Slack/Teams
Integration with collaboration tools your team already uses
Lesson 646Alarm Actions and NotificationsLesson 2869Security Alerts and Notification Workflows
Sleep peacefully
Automation watches your systems overnight
Lesson 639Introduction to Alarms and Alerting
Sleep window
before trying again
Lesson 1612Circuit Breaking Patterns
SLI
is a *quantitative measurement* of a service's behavior — the actual metric you observe.
Lesson 2112Service Level Terminology: SLI, SLO, and SLA
SLI measurements
if they don't capture user experience accurately.
Lesson 2125Iterating and Refining SLOs Over Time
Sliding window
More accurate, tracks requests across rolling time periods
Lesson 2592Rate Limiting and Throttling
Slight staleness is acceptable
(user profiles, product catalogs)
Lesson 2703Time-Based Cache Invalidation (TTL)
SLO
is your *internal target* for an SLI — the goal you set for your team.
Lesson 2112Service Level Terminology: SLI, SLO, and SLALesson 2129Incident Severity Levels
SLO targets
based on data—tighten them when reliability improves sustainably, or relax them when they're blocking legitimate innovation without user impact.
Lesson 2125Iterating and Refining SLOs Over TimeLesson 2155Auto Scaling for Cost Efficiency
Slow burns
A subtle regression might eat 2% per day, unnoticed until it's too late
Lesson 2121Multi-Window and Multi-Burn-Rate Alerting
Slow external API calls
– the #1 culprit
Lesson 2547Execution Duration Optimization
Slow-starting apps
Use `initialDelaySeconds: 30` or higher, or prefer startup probes
Lesson 1426Probe Timing Parameters
Slower API server responses
(retrieving large objects takes time)
Lesson 1273Secret Size and Performance Limits
Slower deployments
– uploading 50MB takes longer than 5MB
Lesson 485Function Packaging and Deployment Size
Slower initial response times
for unlucky early users
Lesson 2707Cache Warming Strategies
Slowloris
Hold connections open by sending partial requests slowly
Lesson 2378DDoS Attack Types and Vectors
Small
(3 GB RAM, 2 vCPUs): Lightweight builds, quick scripts
Lesson 1823CodeBuild Build Environments and Images
Small block sizes
need IOPS-optimized volumes
Lesson 134Volume Performance Optimization
Small tables (<1GB)
Skip both—overhead isn't worth it.
Lesson 2665BigQuery Data Organization
Small to medium databases
that aren't memory-intensive
Lesson 66General Purpose Instance Types
Small to Medium Teams
Teams without dedicated DevOps engineers benefit from managed infrastructure—no Jenkins servers to maintain or GitHub Enterprise licenses to negotiate.
Lesson 1821When to Use AWS Native CI/CD
Small-scale deployments
Single-server applications with modest requirements
Lesson 1059Compose Best Practices and Limitations
Smaller attack surface
No shell means attackers can't easily execute commands
Lesson 987Scratch and Distroless Images
Smaller images
– you can't accidentally `COPY` unwanted files
Lesson 1023Using .dockerignore
Smaller VNet footprint
only nodes consume VNet IPs
Lesson 1496AKS Networking Models: kubenet vs Azure CNI
Smallest scope, fastest execution
Unit tests verify individual functions or components in isolation.
Lesson 1649Automated Testing in CI/CD
SMI-native design
Built around SMI APIs from the ground up, making configurations more portable
Lesson 1596Open Service Mesh (OSM) Basics
SMS code
A text message sent to your phone (less secure, but better than nothing)
Lesson 342Multi-Factor Authentication (MFA) Basics
SMS/Text
Immediate mobile notifications for critical issues
Lesson 646Alarm Actions and Notifications
Smurf attacks
Broadcast spoofed ICMP requests
Lesson 2378DDoS Attack Types and Vectors
Snapshot and delete
idle instances for later restoration if needed
Lesson 2160Idle Resource Detection
Snapshot copying
lets you duplicate a snapshot to another AWS region, creating a geographically distant backup.
Lesson 425Snapshot Copying and Sharing
Snapshot evidence
by capturing disk images or memory dumps for forensic analysis
Lesson 2871Automated Incident Response
Snapshot limitation
If the underlying storage system fails or becomes corrupted, snapshots may be lost too.
Lesson 2417Backup vs. Snapshot: Understanding the Difference
Snapshot sharing
allows you to grant other AWS accounts permission to access your snapshot.
Lesson 425Snapshot Copying and Sharing
Snapshots before cutover
Take point-in-time snapshots immediately before each migration wave.
Lesson 2817Disaster Recovery During Migration
SNS notifications
Send emails, texts, or trigger other AWS services
Lesson 670CloudWatch Alarms and Actions
SNS topics (AWS)
A pub/sub service where multiple subscribers (email, SMS, Lambda functions) can receive the same alert.
Lesson 647Notification Channels
Soft-delete recovery
(Azure Key Vault keeps deleted keys for 90 days by default)
Lesson 2291Key Deletion and Recovery
Software Catalog
A centralized registry of all services, APIs, libraries, and resources in your organization
Lesson 2927Backstage Platform OverviewLesson 2928Software Catalog in Backstage
Software Templates
Pre-built blueprints (scaffolders) that let developers spin up new projects following golden paths
Lesson 2927Backstage Platform OverviewLesson 2943Platform Documentation and Onboarding
Software-protected keys
are encrypted and processed using Azure's software-based cryptographic operations.
Lesson 2316Azure Key Vault Key Management
Sole-tenant nodes
give you an entire physical server dedicated exclusively to your workloads—no other GCP customers share that hardware.
Lesson 108GCP Sole-Tenant Nodes
Solution
Set visibility timeout longer than your expected processing time, or extend it programmatically during processing.
Lesson 554Message Visibility and TimeoutsLesson 1428Probe Anti-Patterns and Common Mistakes
Something you are
(fingerprint, face scan)
Lesson 347User Authentication Methods
Something you have
(phone app, security key)
Lesson 347User Authentication Methods
Something you know
(password)
Lesson 347User Authentication Methods
SOPS (Secrets OPerationS)
or **git-crypt** encrypt secret values directly in your Git repository.
Lesson 1870Handling Secrets in GitOps
Sorted Sets
Sets with scores for ranking and leaderboards
Lesson 2684Redis Architecture and Data Structures
Source (Input)
Where logs enter Fluentd.
Lesson 2026Fluentd Configuration and Parsing
Source and destination services
for each request
Lesson 1639Service Dependency Mapping
Source Code Management (SCM)
section.
Lesson 1773Jenkins Jobs and Build Triggers
Source context
IP address, device, API call details
Lesson 344IAM Audit and Compliance Logging
Source Controller
is one of Flux's core components that acts like a persistent librarian for your infrastructure code.
Lesson 1922Source Controller and Git RepositoriesLesson 1932Flux Controller ArchitectureLesson 1935Helm Controller
Source identifiers
(hostname, container ID, pod name)
Lesson 2010Log Parsing and Enrichment
Source IP addresses
– Requests from specific CIDR blocks
Lesson 250HTTP Header and Method-Based Routing
Source location
(repository name, S3 bucket, etc.
Lesson 1840Source Stage Configuration
Source repositories
Which Git repos can this project pull from?
Lesson 1887ArgoCD Projects for Multi-Tenancy
Source Stage
CodeCommit hosts your Git repository and serves as the pipeline's starting point
Lesson 1818Integration Between AWS Code ServicesLesson 1839Creating a Basic Pipeline
Source/Region
where it originated
Lesson 563Message Attributes and Metadata
Space
Data center real estate or leasing costs
Lesson 2799TCO Analysis for Migration
Space efficiency
If ten images all need Ubuntu as a base, that Ubuntu layer is stored *once* and shared among all ten images.
Lesson 975Image Layers: The Foundation
span
represents a single unit of work in your distributed system—like a function call, database query, or HTTP request.
Lesson 2063Spans and Span RelationshipsLesson 2064Span Attributes and TagsLesson 2076Spans, Traces, and Context Propagation
Span attributes
(also called **tags** in some systems) are key-value pairs you attach to spans that answer questions like *how*, *who*, *what parameters*, and *what outcome*.
Lesson 2064Span Attributes and Tags
Span Creation
Each span allocates memory and requires serialization before export.
Lesson 2071Instrumentation Overhead
Spans
are the individual operations within a trace.
Lesson 2060What is Distributed Tracing
Spark SQL
read directly from Parquet, ORC, or CSV files organized in your data lake zones, executing SQL queries without copying data into a separate database.
Lesson 2640Query Engines for Data Lakes
Spark Streaming
(and Structured Streaming) extends Spark's batch processing model to micro-batches.
Lesson 2611Stream Processing Frameworks
Spec.selector
Label selector for Pod identification
Lesson 1155ReplicaSet Purpose and Architecture
Spec.template
Complete Pod specification for creating replicas
Lesson 1155ReplicaSet Purpose and Architecture
Specialized hardware
GPU processing, specific CPU architectures, or unusual memory/storage configurations
Lesson 1720Self-Hosted Runners
Specialized libraries
that handle distributed state
Lesson 2506Circuit Breaker for Functions
Specialized storage
NetApp, Pure Storage, Dell EMC plugins
Lesson 1040Volume Drivers and Plugins
Specialized tools
(specific Java versions, Docker, databases)
Lesson 1798Distributed Builds and Agent Architecture
specific
parameters → only meaningful ones (like `size` or `format`) affect caching
Lesson 598Query String and Cookie ForwardingLesson 1728GitLab Runners: Shared vs Specific
Specific runners
(dedicated to particular projects)
Lesson 1727GitLab CI/CD Architecture Overview
Specify exact ports
Open port 22 for SSH, not ports 20-25
Lesson 212Least Privilege Network Access
Specify parameters
Details matter (which encryption algorithm, key type)
Lesson 2337Compliance Requirements Translation
Speed and simplicity
Rehosting is the fastest migration strategy.
Lesson 2792Rehost (Lift-and-Shift) Strategy
Speed up operations
Skip planning and applying unchanged resources
Lesson 708Targeted Operations
Spend by service
(compute, storage, networking, etc.
Lesson 2961Cost Visibility Fundamentals
Spend by team/project/application
Lesson 2961Cost Visibility Fundamentals
Spending Credits
When you need more power (like during a traffic spike), the instance "spends" accumulated credits to burst above baseline—up to 100% CPU
Lesson 77Burstable Instance Types and Credits
SPIFFE
(Secure Production Identity Framework For Everyone) is an open standard that defines how to establish and verify the identity of workloads.
Lesson 1620Service Identity and SPIFFE
SPIFFE ID
, a URI that uniquely identifies a workload:
Lesson 1620Service Identity and SPIFFE
Spiky and unpredictable
(seasonal events, batch processing)
Lesson 1503AKS Virtual Nodes and Serverless Bursting
Spiky workloads
with sudden peaks
Lesson 2532DynamoDB Capacity Modes
SPIRE
(the SPIFFE Runtime Environment) or other implementations to issue **SVIDs** (SPIFFE Verifiable Identity Documents)—cryptographic certificates that prove identity.
Lesson 1620Service Identity and SPIFFE
Split logs into chunks
when they reach a size limit (e.
Lesson 1436Log Rotation and Storage
Split shifts
Separate daytime and nighttime coverage.
Lesson 2127On-Call Rotation Structures
Split-brain prevention
Ensure old primary is truly offline
Lesson 2484Manual Failover Procedures
Spot Instance Fleet Management
means using multiple instance types across availability zones to create a diversified portfolio that reduces interruption risk while maximizing savings.
Lesson 2978Spot Instance Fleet Management
Spot VMs
(newer, more flexible model).
Lesson 104GCP Preemptible and Spot VMs
Spot/Preemptible
AWS Spot = Azure Spot = GCP Preemptible/Spot VMs
Lesson 109Cross-Provider Compute Feature Comparison
Spot/preemptible workloads
(batch jobs) can use cheaper, interruptible VMs
Lesson 1508Node Pool Management
Spread
Fault tolerance for critical instances
Lesson 106AWS Placement Groups
Spring Cloud Sleuth
for seamless Spring Boot integration
Lesson 2091Zipkin Fundamentals
SQL (Core) API
Query using familiar SQL-like syntax — the default and most feature-rich option
Lesson 436Azure Cosmos DB: Architecture and APIs
SQL Filters
Match messages based on properties (e.
Lesson 561Azure Service Bus Topics
SQL Interface
Query your data using standard SQL, making it accessible to anyone familiar with relational databases.
Lesson 2636Google BigQuery Fundamentals
SQL Server
might include options for native backup to cloud storage
Lesson 404Option Groups for Engine FeaturesLesson 2807Homogeneous Database Migration
SQL-Based Querying
You write standard SQL (with extensions) against structured and semi-structured data.
Lesson 2664Google BigQuery as Serverless Query Engine
SQS
Polls queue for messages (event source mapping)
Lesson 506AWS Lambda: Event Sources and Triggers
SQS queues
(fan-out pattern to multiple queues)
Lesson 557AWS SNS Topics and Subscriptions
SRE/Operations
Ensure platform reliability, observability, and performance
Lesson 2937Platform Team Structure and Responsibilities
SSH key pairs
, and **networking** details.
Lesson 81VM Launch Process and Initialization
SSH Private Keys
for Git or deployment access
Lesson 1777Jenkins Credentials Management
SSH/RDP
Goes through your VM's network interface → affected by Security Groups, network config, and OS networking
Lesson 64VM Consoles and Troubleshooting Access
SSL offloading
means removing the encryption burden from backend servers.
Lesson 269TLS Termination on NLB
SSL termination
decrypt once at the load balancer
Lesson 263Layer 4 vs Layer 7 Load Balancing
SSL/TLS certificate
(from AWS Certificate Manager or uploaded) to your ALB listener on port 443 (HTTPS).
Lesson 253SSL/TLS Termination at ALBLesson 269TLS Termination on NLB
SSL/TLS termination
means the load balancer handles all the encryption/decryption work for HTTPS connections—it's like a security checkpoint at a building entrance.
Lesson 253SSL/TLS Termination at ALB
SSO integration
Connect with LDAP, OIDC, or SAML to map organizational groups
Lesson 1890ArgoCD RBAC and User Management
Stability
by preventing accidental upgrades that break things
Lesson 727Terraform Block and Required Providers
Stabilization windows
tell the HPA to look at metrics over a time window (e.
Lesson 1451HPA Scaling Behavior
Stable communication
between application components
Lesson 1203Kubernetes Services Overview
Stable environments
Use `30m` or `1h` for production stability
Lesson 1942Flux Reconciliation Control
Stable recovery
Failed pods restart in their exact position without disrupting the sequence
Lesson 1179Ordered Deployment and Scaling
Stack A (Network Stack)
exports a value:
Lesson 882Cross-Stack References
Stack A (Networking)
defines outputs:
Lesson 835Dependency Management Between Stacks
Stack B (Application Stack)
imports it:
Lesson 882Cross-Stack References
Stack B (Compute)
reads Stack A's state:
Lesson 835Dependency Management Between Stacks
Stack Info
Shows basic metadata—stack name, creation time, status, and description
Lesson 857CloudFormation Console and Stack Management
Stack instances
Individual stacks created in each account-region combination
Lesson 883StackSets Fundamentals
Stack traces
revealing API keys from configuration
Lesson 664Security and Sensitive Data in Logs
StackSet
is a container that manages stack instances—actual deployed stacks—across target accounts and regions.
Lesson 883StackSets Fundamentals
StackSets solve this
by letting you define a template once and deploy it everywhere from a central administrator account.
Lesson 883StackSets Fundamentals
stage level
(remember API Gateway stages from lesson 532) and configure a **time-to-live (TTL)** duration —typically measured in seconds.
Lesson 533API Gateway CachingLesson 1785Agent Directive and Execution Environments
Stage-based
leverages cloud provider features but may mix versioning with environment concepts.
Lesson 548API Versioning Strategies
Stage-level
different limits for dev vs production
Lesson 2540Serverless API Rate Limiting and Throttling
Stage-level notifications
Monitor specific stages like deployment
Lesson 1849Pipeline Notifications and EventBridge
Stage-level throttling
Set burst limits (e.
Lesson 2750Cloud Provider Rate Limiting Services
stages
act like floors in a building—each floor must be completed before moving to the next, but multiple rooms (jobs) on the same floor can be worked on simultaneously.
Lesson 1731Pipeline Stages and Job OrderingLesson 1739Pipeline Visualization and Job LogsLesson 1786Stages and Steps OrganizationLesson 1814CodePipeline: Orchestration Service Overview
Staging environment
Production-like setup with realistic data volumes and configurations.
Lesson 1667Multi-Environment PromotionLesson 1672Artifact Lifecycle
Staging promotion
occurs after dev tests pass (may require approval)
Lesson 1651Environment Promotion Strategies
Stakeholder reports
should be tailored by audience:
Lesson 2818Migration Progress Tracking and Reporting
Stale content policies
let CDNs and caches continue delivering cached responses even after they've technically expired— either when your origin server fails or while the cache fetches a fresh copy in the background.
Lesson 2679Stale Content Policies
Stale data
from undetected replication lag
Lesson 2444Data Consistency Validation
Standalone Binary
Download and run the Grafana server directly on Linux, macOS, or Windows.
Lesson 1993Installing and Configuring Grafana
Standard billing data
Every SKU, resource, cost, credits, and usage amounts
Lesson 2178GCP Billing Exports to BigQuery
Standard environment
runs your application in a secure, sandboxed environment with predefined runtimes (Python, Java, Node.
Lesson 105GCP App Engine Standard and Flexible
Standard Kubernetes volume semantics
your team already understands
Lesson 2276Secrets Store CSI Driver
Standard mode
gives you full control over cluster infrastructure—you manage nodes, node pools, scaling configurations, and maintenance windows.
Lesson 1476GKE Cluster Types: Standard vs AutopilotLesson 1489GKE Cost Optimization and Bin Packing
Standard module structure
with proper variable definitions, outputs, and a README
Lesson 805Publishing Modules to Terraform Registry
Standard object URL
`https://bucket.
Lesson 154Object URLs and Pre-Signed URLs
Standard production deployment
→ `default`
Lesson 1586Istio Configuration Profiles
Standard protocols
Works with existing applications expecting traditional file operations
Lesson 114File Storage Overview
Standard Queues
Nearly unlimited throughput, at-least-once delivery, best-effort ordering
Lesson 2725Provider-Specific Queue Services
Standard resolution
Data stored at 1-minute granularity (free for most AWS services)
Lesson 669CloudWatch Metrics and Namespaces
Standard semantic conventions
define common attributes:
Lesson 2064Span Attributes and Tags
Standard SQL
(SQL:2011 compliant), which means familiar SQL syntax works out-of-the-box.
Lesson 2666BigQuery Standard SQL and Functions
Standard systems
(RTO 4-24 hours): Semi-annually
Lesson 2415DR Testing and Validation Frequency
Standard Tier
(`standard`): Balanced performance and cost for general-purpose workloads like web servers and APIs.
Lesson 1314Multiple StorageClasses Strategy
Standard Workflows
are designed for long-running, auditable processes.
Lesson 2517AWS Step Functions Overview
Standard_LRS
Standard HDD, locally redundant, best for dev/test
Lesson 1311Azure Disk StorageClasses
Standardize patterns
Ensure consistency in how resources are configured across your organization
Lesson 798What Are Terraform Modules
Standardized deployment interfaces
where the pipeline calls generic scripts that internally handle cloud-specific details
Lesson 2775CI/CD Pipeline Portability
Standardized features
instead of controller-specific annotations
Lesson 1233Gateway API Introduction
Standardized telemetry
for every request
Lesson 1576Istio Overview and Core Value Proposition
Start broad, get specific
(left to right):
Lesson 633Metric Namespaces and Naming Conventions
Start broad, refine later
Begin with major divisions, then split as needed
Lesson 350Creating and Organizing Groups
Start in plaintext
All services communicate without encryption
Lesson 1622mTLS Migration Strategies
Start pattern
A regex matching the first line (e.
Lesson 1441Multi-Line Log Handling
Start with Key Metrics
Place the most critical KPIs at the top—total spend this month, percent of budget consumed, largest cost drivers, recent anomalies.
Lesson 2970Cost Dashboard Design
Start with Monitoring Data
Lesson 1343Right-Sizing Resources
Start with observability
Enable telemetry first to understand traffic patterns without changing behavior
Lesson 1601Service Mesh Adoption Patterns
Start with slim
for most production workloads—good size reduction with minimal compatibility risk
Lesson 1024Base Image Selection
Starts containers
It tells the container runtime (like Docker or containerd) to pull images and start containers according to the pod spec
Lesson 1109Kubelet: The Node Agent
Startup
Protect slow-starting containers from early termination
Lesson 1419The Three Types of Probes
Startup probes
are crucial for rolling updates of applications with long initialization times, ensuring Kubernetes doesn't prematurely kill Pods that are still starting up during the transition.
Lesson 1429Health Checks and Rolling Updates
state
of other alarms (OK, ALARM, or INSUFFICIENT_DATA) rather than raw metrics:
Lesson 645Composite AlarmsLesson 941Deployment Lifecycle Operations
State corruption
from incomplete or conflicting writes
Lesson 777State Locking Fundamentals
State externalization
solves this by moving state *outside* the application servers entirely, into dedicated, reliable storage systems that all servers can access.
Lesson 2468State Externalization Patterns
State file backups
provide another safety layer.
Lesson 720Rollback Strategies
State file conflicts
emerge when multiple teams work on the same infrastructure.
Lesson 831Scaling Challenges and Patterns
State file partitioning
means dividing your infrastructure into multiple independent state files, each managed by a separate Terraform configuration.
Lesson 834State File Partitioning
State implications
Could this change cause unintended resource destruction or data loss?
Lesson 715Code Review and Peer Validation
State input
that triggered the failure (malformed data?
Lesson 2526Workflow Monitoring and Debugging
State locking prevents conflicts
Only one person can modify infrastructure at a time
Lesson 783Why Remote State Matters
state machine
is a model that defines a series of states and transitions between them based on conditions or events.
Lesson 2516Step Functions and State MachinesLesson 2738Event-Driven State Machines
State Reconstruction
If your current state (read model, database view) is corrupted or lost, replay all events from the beginning to rebuild it from scratch.
Lesson 2731Event Replay and Reprocessing
state refresh
they query your actual cloud resources and compare them to what's recorded in the state file.
Lesson 705State Refresh and Drift DetectionLesson 706Import Existing Resources
State requirements
Stateless applications work well with managed platforms (App Service, App Engine); stateful workloads may need traditional VMs with persistent storage
Lesson 110Compute Service Selection Criteria
State separation
divides infrastructure into smaller, independent state files (by environment, application, or layer).
Lesson 831Scaling Challenges and Patterns
State serialization/deserialization
at every boundary
Lesson 2552Function Chaining and Orchestration Efficiency
State Synchronization
The replica must monitor the primary's health and coordinate takeover to prevent split-brain scenarios (both thinking they're primary).
Lesson 1802Jenkins High Availability Architecture
Stateful applications
Databases, session management, or WebSocket connections conflict with stateless function design
Lesson 470FaaS Use Cases and Anti-PatternsLesson 1210Headless ServicesLesson 2445DR for Stateful vs Stateless Apps
Stateful components
present HA challenges:
Lesson 2461Stateless vs Stateful: Core Definitions
Stateful Monitoring
Long-running status checks with timeouts
Lesson 512Azure Functions: Durable Functions
Stateful operations
with local caching or connection pooling are critical
Lesson 2568Hybrid Microservice Deployments
Stateful resources
where deletion means data loss
Lesson 885Stack Termination Protection
StatefulSets for Elasticsearch
Lesson 2033ELK/EFK on Kubernetes
Stateless apps
Round robin works well.
Lesson 240Load Balancing Algorithms
Stateless components
are HA-friendly because:
Lesson 2461Stateless vs Stateful: Core Definitions
Stateless rotation functions
Keep rotation logic idempotent so retries don't cause issues.
Lesson 2247GCP Secret Manager Rotation Strategies
Stateless services
Web servers, API endpoints, or worker processes that don't store local state
Lesson 1057Scaling Services with ComposeLesson 2759Multicloud Architecture Patterns: Active- Active
Statement
An array containing one or more permission rules.
Lesson 361Policy Structure and Syntax
Static
Administrators pre-create PVs manually, defining the storage backend (NFS, cloud disk, etc.
Lesson 1289PersistentVolume (PV) Fundamentals
Static analysis
searches for patterns matching known malware signatures or secret formats (AWS keys, SSH private keys, tokens)
Lesson 1083Malware and Secret ScanningLesson 2875Introduction to Infrastructure Testing
Static configs
Hardcoded file paths (e.
Lesson 2037Promtail Log Collection and Pipelines
Static IP requirements
NLBs can assign fixed Elastic IPs, critical for whitelisting
Lesson 261What is a Network Load Balancer (NLB)?Lesson 271NLB Use Cases and Patterns
Static lists
Predefined options like environment names (`prod`, `staging`, `dev`)
Lesson 2107Dashboard Variables and Filters
Static website content
Images, CSS, JavaScript files
Lesson 115Object Storage Overview
Statistical thresholds
It calculates expected cost ranges based on historical variance
Lesson 2987Cost Anomaly Detection Systems
Status pages
(like Atlassian Statuspage, Instatus, or custom solutions) serve as your single source of truth for customers.
Lesson 2131Incident Communication and Status Pages
Status updates
Frequency and format during active incidents
Lesson 2870Incident Response Planning
Stdout/stderr to orchestrator
Applications write to standard streams; Kubernetes captures and routes them
Lesson 2046Cloud-Native Logging Overview
Steady-state rate
The sustained number of requests allowed per second
Lesson 531Throttling and Rate LimitingLesson 539API Gateway Throttling and Rate Limits
Steady-state workloads
with consistent demand
Lesson 2532DynamoDB Capacity Modes
step
, or **simple scaling policies** that trigger based on your thresholds.
Lesson 306Custom Metric ScalingLesson 1687Steps and Running Commands
Step 6
The PVC binds to the newly created PV.
Lesson 1308Dynamic Provisioning Workflow
Step 7
Your Pod can now mount the PVC and use the storage.
Lesson 1308Dynamic Provisioning Workflow
Step Functions state machine
acts as the conductor of an orchestra—it knows which function to call, when, and what to do if something fails.
Lesson 2512Orchestrator Pattern with Step Functions
Step Scaling
gives you more control by defining **multiple scaling steps** based on how far your metric deviates from normal.
Lesson 316ASG Scaling Policies in AWS
Step-level variables
apply only to that single command:
Lesson 1693Environment Variables in Workflows
Stickiness type
(load balancer-generated or application-based)
Lesson 278Session Affinity and Sticky Sessions
Sticky identity
If Pod `db-1` fails, the replacement Pod is still called `db-1` with the same storage
Lesson 1176StatefulSet Fundamentals
sticky sessions
) is a load balancer feature that "remembers" which backend server handled your first request, then routes all your subsequent requests to that **same server** for the duration of your session.
Lesson 242Session Affinity (Sticky Sessions)Lesson 278Session Affinity and Sticky SessionsLesson 2467Sticky Sessions and Affinity
Sticky Sessions (Limited Statelessness)
Lesson 2463Session Management in Stateless Systems
Still stores the value
in state (remember: secure your state file!
Lesson 766Sensitive Outputs
STONITH
("Shoot The Other Node In The Head"): Physically power off or reboot the suspect node
Lesson 2485Split-Brain Prevention
Stop writes
to the source database (put in read-only mode)
Lesson 2826Database Cutover Planning
Stop/Restart
Automatically restart failed services
Lesson 646Alarm Actions and Notifications
Storage autoscaling
monitors your database's storage usage automatically.
Lesson 401Storage Autoscaling
storage backend
, and choosing the right one affects performance, cost, and scalability.
Lesson 1069Registry Storage Backend OptionsLesson 2089Jaeger OverviewLesson 2253Vault Architecture and Components
Storage Class (Optional)
– The `storageClassName` field lets you request a specific storage type.
Lesson 1297Creating PersistentVolumeClaims
Storage class mismatch
PVC specifies a class that doesn't exist or has no PVs
Lesson 1302Troubleshooting PV and PVC Issues
Storage Class Transitions
let you define rules that automatically migrate objects from expensive, high-performance storage to cheaper, slower-access tiers as they age.
Lesson 159Storage Class Transitions
Storage classes
are different tiers of object storage, each optimized for specific access patterns and cost structures.
Lesson 148Storage Classes IntroductionLesson 2631Data Lake Zones and Organization
Storage Configuration
Select storage type (General Purpose SSD, Provisioned IOPS) and initial size, potentially enabling autoscaling
Lesson 402Creating and Launching RDS Instances
Storage consolidation
Shared object storage buckets with prefix-based isolation
Lesson 2164Multi-Tenancy and Resource Sharing
Storage daemons
Providing storage capabilities per node
Lesson 1185DaemonSet Fundamentals
Storage drivers
that need direct disk access
Lesson 1394Privileged Containers
Storage efficiency
Container images share common layers across multiple containers.
Lesson 966Density and Resource EfficiencyLesson 979Copy-on-Write Strategy
Storage events
When a user uploads an image to S3, trigger a function to generate thumbnails.
Lesson 2501Event-Driven Invocation Pattern
Storage failure
– Disk or volume issues preventing database operations
Lesson 416Multi-AZ Failover Process
Storage level
Apply retention policies by severity or tag
Lesson 2013Log Volume Management
Storage networks
(high-volume data transfers)
Lesson 2229MTU and Jumbo Frames
Storage Object Admin
role to your Terraform service account.
Lesson 789GCS Backend Configuration
Storage optimization
Moving file storage to object storage (S3, Blob Storage) where appropriate
Lesson 2793Replatform Strategy
Storage tiers
let you match log age and access patterns to the right storage technology and cost:
Lesson 2009Log Retention and Storage
Storage type options
(SSD-based or magnetic)
Lesson 397RDS Architecture and Components
Storage types
SSD-based storage (like Provisioned IOPS) delivers blazing speed but costs more than standard magnetic storage.
Lesson 458Cost vs Performance Trade-offs
Storage volumes
Both can mount and access the same volumes.
Lesson 1148Multi-Container Pods
Storage-heavy systems
(data warehousing, log processing, NoSQL databases) → **Storage Optimized** instances offer high IOPS and throughput.
Lesson 78Choosing Instance Types for Your Workload
Store
static secrets with versioning (the `kv` engine)
Lesson 2260Vault Secrets Engines Concepts
Store both
the encrypted data and the encrypted DEK together
Lesson 2296Envelope Encryption Pattern
Store events
in chronological order
Lesson 2508Event Sourcing with Functions
Store Gateway
Reads historical metric data directly from object storage, making old metrics queryable without loading them into Prometheus.
Lesson 1982Thanos Architecture Overview
Store near compute
Reduce cross-region transfer fees
Lesson 2165Cost-Aware Architecture Patterns
Stored Procedure Activity
Runs SQL logic in databases
Lesson 2650ADF Pipeline Activities and Control Flow
Stored procedures
written in proprietary languages (PL/SQL → PL/pgSQL)
Lesson 2808Heterogeneous Database MigrationLesson 2823Heterogeneous Database Migration
Stored separately
from the source volume for durability
Lesson 2423VM and Volume Backup Strategies
Stores release metadata
as Secrets (or ConfigMaps) in your cluster
Lesson 1521Helm Architecture: Client and Library
strangler fig pattern
is the gold standard for microservices migration.
Lesson 2569Microservices Migration StrategiesLesson 2598Strangler Fig Pattern for Migration
Strategic alignment
Does it support broader platform maturity goals?
Lesson 2946Feedback Loops and User Research
Strategy
Use power tuning tools to test memory configurations from 128MB to 10GB, measuring both duration and cost.
Lesson 2983Serverless Cost Optimization Patterns
Stream partitioning
divides your event stream into multiple independent sub-streams (partitions), allowing multiple consumers to process events concurrently.
Lesson 2607Stream Partitioning and Parallelism
Stream retention
24 hours of change records
Lesson 2533DynamoDB Global Tables and Streams
Stream to Event Hub
For real-time processing or SIEM integration
Lesson 2359Azure Monitor and Activity Logs
Stream-based
Processing logs, analytics pipelines, change data capture from databases where you handle continuous data flows
Lesson 487Function Invocation Types
Stream-based invocation
processes records from a data stream in batches.
Lesson 487Function Invocation Types
Streaming those changes
continuously to the target database
Lesson 2809Continuous Data Replication and CDC
Streaming vs Batch
Choose between real-time log streaming (using services like Amazon EventBridge or Cloud Pub/Sub) for immediate alerting, or scheduled batch transfers for cost-efficient bulk processing.
Lesson 2354Centralized Audit Log Aggregation
Strength
Deep AWS service integration and automatic schema discovery through crawlers.
Lesson 2653Data Catalog Services Across Providers
Strict mode
requires all service-to-service communication to use mTLS.
Lesson 1621Enabling mTLS in Istio
Strict settings
(5 out of 5) reduce false positives but may miss brief incidents
Lesson 642Alarm Evaluation Periods and Datapoints
string
, **number**, and **bool**—let you define simple, single-value variables for your infrastructure configurations.
Lesson 756Variable Types: PrimitivesLesson 866Fn::Join and Fn::Split
String parameters
collect free-form text like version numbers or commit messages:
Lesson 1788Parameters and User Input
String patterns
Does the phone number match expected formats?
Lesson 538Request Validation
Strong
Reads always return the most recent committed write.
Lesson 437Cosmos DB Consistency Levels
strong consistency
replicas are always up-to-date—but adds latency and reduces availability if replicas are unreachable.
Lesson 2475Database Replication FundamentalsLesson 2479Synchronous Replication Trade-offsLesson 2709Cache Consistency and Trade-offs
Structure
Requires a `pipeline` block at the top level, with nested `stages` containing individual `stage` blocks.
Lesson 1783Declarative vs Scripted Pipeline SyntaxLesson 2907Data Integrity Validation
Structure reshaping
Flatten nested objects or create new nesting
Lesson 537Request and Response Transformation
Structured logs
use standardized formats (typically JSON) with key-value pairs, making them easy for automated systems to search, filter, and analyze:
Lesson 654Structured vs Unstructured LogsLesson 2006Structured vs Unstructured Logs
Structured surveys
after major releases or onboarding experiences
Lesson 2946Feedback Loops and User Research
Struggle with complex expressions
nested deeply in ARM functions
Lesson 933Decompiling ARM to Bicep
Stubbing
provides predefined data or state that your tests can use.
Lesson 2881Mocking and Stubbing Infrastructure
Style violations
inconsistent naming, improper resource organization
Lesson 2877Static Analysis and Linting
Sub-second latency
for cross-region replication
Lesson 2533DynamoDB Global Tables and Streams
Subnet level
Monitor an entire subnet's traffic
Lesson 213Network Security Logging and Monitoring
Suboptimal peering
(traffic exiting and re-entering your cloud provider's network unnecessarily)
Lesson 2227Network Path Analysis and Traceroute
SubPath mount issues
occur when the referenced key doesn't exist.
Lesson 1259ConfigMap Troubleshooting and Validation
SubPath mounts
solve this by letting you mount a single key from a ConfigMap to a specific file path, preserving everything else in the directory.
Lesson 1258Using ConfigMaps with SubPath Mounts
Subscribers
listening to that topic receive the event asynchronously
Lesson 2578Event-Driven Communication
Subsequent identical requests
are served directly from cache
Lesson 536API Gateway Caching
Subsequent Requests (Cache Hit)
User requests same content → Edge serves from local cache → Origin server isn't contacted at all
Lesson 584Origin Servers and Edge Caching
Subset definitions
(versions like v1, v2)
Lesson 1603Virtual Services and Destination Rules
Success codes
Which HTTP status codes indicate health (e.
Lesson 251Health Check Configuration for ALBs
Success Criteria
What response codes indicate success (default: 200-399)
Lesson 1423HTTP Probe Configuration
Success thresholds
How many consecutive passes before marking healthy
Lesson 329MIG Health Checks and Autohealing
Success/error rates
(HTTP status codes)
Lesson 1632Automatic Metrics Collection
Success/failure outcomes
and root causes of gaps
Lesson 2447Compliance and DR Documentation
Success/failure rates
and response times
Lesson 1639Service Dependency Mapping
Support and SLAs
developers can expect
Lesson 2925Service Catalog Fundamentals
Support for complex formats
You can mount entire configuration files, certificates, or JSON structures—not just simple key- value pairs.
Lesson 2271Volume-Mounted Secrets
Support plans
(if needed beyond basic)
Lesson 2799TCO Analysis for Migration
Support ticket patterns
revealing recurring friction points
Lesson 2946Feedback Loops and User Research
Supporting multi-region deployments
Perfect for global applications and compliance requirements
Lesson 1093ACR Geo-Replication
Supports updates and deletions
while maintaining resource relationships
Lesson 935Introduction to Google Cloud Deployment Manager
Surprises
Undocumented dependencies, unexpected recovery times, tool limitations
Lesson 2911Post-Test Analysis and Improvement
Survive hardware failures
without manual intervention
Lesson 414RDS High Availability Overview
Suspend
versioning on a bucket (new uploads overwrite, but existing versions remain)
Lesson 157Versioning Lifecycle and MFA Delete
Suspended
Application intentionally paused or scaled to zero
Lesson 1885Application Health and Sync StatusLesson 1900Health Assessment
SVIDs
(SPIFFE Verifiable Identity Documents)—cryptographic certificates that prove identity.
Lesson 1620Service Identity and SPIFFE
Swap usage
and file system metrics
Lesson 411Enhanced Monitoring
Switch
Multi-way branching like a case statement
Lesson 2650ADF Pipeline Activities and Control Flow
Switch connection strings
or DNS entries to point applications to the target
Lesson 2826Database Cutover Planning
Switch to strict mode
Once everything supports mTLS, enforce encryption-only
Lesson 1622mTLS Migration Strategies
Switch traffic
from Blue to Green at the load balancer/DNS level
Lesson 1664Blue-Green Deployment Pattern
Switching pricing models
– Combine with Reserved Instances or Savings Plans (concepts you've learned) for additional savings
Lesson 79Cost Optimization with Right-Sizing
Symbolic resource references
instead of verbose `resourceId()` functions
Lesson 921Bicep vs ARM Templates
Symmetric keys
encrypt your actual data (fast, efficient for gigabytes)
Lesson 2295Symmetric vs. Asymmetric Encryption
Symptom
Pods stuck in `Pending` because new PVCs can't be created due to quota limits, while old PVCs sit unused.
Lesson 1190StatefulSet and DaemonSet Troubleshooting
SYN floods
Send TCP SYN requests without completing the handshake, filling connection tables
Lesson 2378DDoS Attack Types and Vectors
Sync
Runs during the normal sync phase alongside your regular resources.
Lesson 1899Resource Hooks
Sync policies
determine whether ArgoCD automatically deploys changes the moment it detects drift (auto sync), or waits for a human to click "Sync" (manual sync).
Lesson 1884Sync Policies and Manual vs Auto Sync
Sync Policy
Defines synchronization behavior
Lesson 1881ArgoCD Application Resource
Sync result
(successful, failed, or error)
Lesson 1904Application Tracking and History
Sync Waves
(covered in Resource Hooks): Annotate Kubernetes resources with `argocd.
Lesson 1902Application DependenciesLesson 1911Sync Waves and Resource Hooks
Sync Windows
let you define time-based access controls for when ArgoCD can sync applications to your cluster.
Lesson 1898Sync Windows
Synced
Kubernetes resources match the Git manifests exactly
Lesson 1885Application Health and Sync Status
SyncFail
Triggers only if the sync operation fails.
Lesson 1899Resource Hooks
Synchronous export
Always export asynchronously to avoid blocking application threads
Lesson 2087Best Practices and Performance Considerations
synchronous invocation
, the caller waits for the function to complete and return a response before continuing.
Lesson 465Function Invocation TypesLesson 487Function Invocation TypesLesson 506AWS Lambda: Event Sources and Triggers
Synchronously replicates
all data writes from the primary database to the standby—every transaction is copied in real-time
Lesson 415Multi-AZ Deployments Fundamentals
Syntax errors
malformed JSON, YAML indentation problems
Lesson 2877Static Analysis and Linting
Syntax validation
checks if your policy is correctly formatted—proper JSON structure, valid action names, correct resource patterns.
Lesson 371Policy Validation and TestingLesson 721Continuous Integration for IaCLesson 1783Declarative vs Scripted Pipeline Syntax
Synthetic Monitoring
sends artificial requests through your network paths to measure availability and latency.
Lesson 2193Network Monitoring Automation
System configuration
Global settings, plugins, credentials
Lesson 1808Backup and Disaster Recovery
System Event Logs
record GCP-initiated actions rather than user actions.
Lesson 2360Google Cloud Audit Logs Types
System Events
track infrastructure and operational activities:
Lesson 569Event Types and Naming Conventions
System metadata
is created automatically by the cloud provider.
Lesson 142Object Metadata and Custom Attributes
system node pools
and **user node pools** to ensure that critical cluster services remain stable and isolated from your applications.
Lesson 1495System vs User Node PoolsLesson 1504AKS Cost Management and Cluster Sizing
System scope
Only available to Jenkins itself (for connecting to agents, not jobs)
Lesson 1777Jenkins Credentials Management
System Status Checks
monitor the physical hardware and network infrastructure hosting your VM.
Lesson 90VM Monitoring and Health Checks
System-assigned managed identities
are tied directly to a single Azure resource.
Lesson 389Azure Managed Identities
System-wide impact
Tests how components interact under stress
Lesson 2491Chaos Engineering vs Traditional Testing
Systems Manager Parameter Store
come in—they're secure vaults that encrypt and manage secrets, which your Lambda function can fetch at runtime.
Lesson 508AWS Lambda: Environment Variables and Secrets

T

Table API
Key-value pairs — similar to Azure Table Storage but globally distributed
Lesson 436Azure Cosmos DB: Architecture and APIsLesson 2534Azure Cosmos DB Serverless
Tag at creation time
it's harder to tag hundreds of VMs later
Lesson 92VM Tagging and Organization
Tag Inheritance
Implement tag propagation from parent resources (like AWS resource groups) to child resources, reducing manual tagging burden.
Lesson 2964Cost Allocation Tags
Tag pattern
Keep only `production-*` tags, remove `dev-*` after 7 days
Lesson 1082Image Retention and Lifecycle Policies
Tag Policies
Define mandatory tags (like `CostCenter`, `Environment`, `Owner`) and permissible values.
Lesson 2964Cost Allocation Tags
Tag prefix matching
Apply different rules to `dev-*` vs `prod-*` tags
Lesson 1087ECR Repository Configuration
Tag status
Delete untagged images (dangling layers from overwrites)
Lesson 998Image Retention and Cleanup PoliciesLesson 1087ECR Repository Configuration
Tag synchronization
Ensuring the same image tags exist across all registries for consistent deployments
Lesson 1099Cross-Provider Registry Integration
Tag-based exemptions
to protect intentionally idle resources (DR standbys, development environments)
Lesson 2986Idle Resource Detection and Cleanup
Tag-based filtering
Locate resources with specific tag key-value pairs
Lesson 750Data Source Arguments and Filters
Tag-based indexing
is fundamental.
Lesson 2097Query Performance and Indexing
Tag-based lifecycle rules
aligned with your cost allocation strategy
Lesson 2980Storage Lifecycle Optimization
Tag-based retention
protects specific versions forever.
Lesson 1678Artifact Retention and Cleanup
Tag-based suppression
Suppress all alarms for resources tagged with `maintenance=true`
Lesson 648Alarm Suppression and Maintenance Windows
Tagging
for organization and cost tracking
Lesson 893Introduction to Azure Resource Manager (ARM)
Tagging and lifecycle tracking
Use tags like `LastUsed` or `Environment:Dev` combined with automated scripts to flag stale resources.
Lesson 2160Idle Resource Detection
Tagging compliance
(applying cost allocation labels)
Lesson 2954Shared Responsibility Model
tagging strategy
and **cost allocation** practices you've already learned, lifecycle policies become a powerful cost optimization tool that requires minimal ongoing management.
Lesson 2156Storage Lifecycle and TieringLesson 2968Multi-Account Cost Aggregation
Tags and labels
enable *selective automation*.
Lesson 2431Backup Automation and Orchestration
Tail container logs
from `/var/log/containers/`
Lesson 2040Fluent Bit for Kubernetes Logging
Tail sampling
Sample based on trace outcomes (keep all logs for slow/failed requests)
Lesson 2056Log Sampling and Filtering
Taints
work like "No Entry" signs on nodes, preventing most pods from scheduling there.
Lesson 1360Introduction to Taints and Tolerations
Tamper Detection Mechanisms
include write-once storage (like S3 Object Lock with compliance mode), append-only log streams, and blockchain-inspired chaining where each log entry references the hash of the previous entry— breaking the chain reveals tampering.
Lesson 2357Audit Log Integrity and Validation
Target accounts
Which AWS accounts should receive the stacks
Lesson 883StackSets Fundamentals
Target attachment
Which connected network should receive that traffic
Lesson 219Transit Gateway Route Tables
target group
is a logical container that holds one or more backend targets (like EC2 instances, containers, or IP addresses) that receive traffic from your Application Load Balancer.
Lesson 247Target Groups FundamentalsLesson 275Content-Based Routing and Path Rules
target groups
, where you can have multiple containers from the same service running on different ports on the same host, and ALB routes to all of them intelligently.
Lesson 258ALB and Container IntegrationLesson 262NLB Architecture and ComponentsLesson 320ASG Integration with Elastic Load Balancing
Target Groups/Load Balancers
– Where instances register to receive traffic
Lesson 313AWS Auto Scaling Groups (ASG) Overview
Target metric value
The "sweet spot" you're aiming for
Lesson 327MIG Autoscaling Configuration
Target metrics
CPU utilization, request count, queue depth—choose metrics that reflect actual demand
Lesson 2155Auto Scaling for Cost Efficiency
Target regions
Which regions within those accounts
Lesson 883StackSets Fundamentals
Target selection
Tags that identify which EC2 instances, or ARNs for Lambda/ECS
Lesson 1832CodeDeploy Application and Deployment Groups
target tracking
, **step**, or **simple scaling policies** that trigger based on your thresholds.
Lesson 306Custom Metric ScalingLesson 316ASG Scaling Policies in AWS
Target Tracking policy
(maintaining CPU at 60%) and a **Scheduled Scaling action** (adding capacity at 9 AM) on the same Auto Scaling group.
Lesson 305Multiple Scaling Policy Coordination
Target tracking scaling
is like cruise control for your cloud infrastructure.
Lesson 298Target Tracking Scaling OverviewLesson 316ASG Scaling Policies in AWS
Targeted
Test specific user segments (new vs returning, mobile vs desktop)
Lesson 1608A/B Testing and Experimentation
Targeted operations
let you focus on specific resources—like updating just one server, modifying a single database, or destroying only a particular storage bucket—without touching the rest of your infrastructure.
Lesson 708Targeted OperationsLesson 831Scaling Challenges and Patterns
Targeted releases
Enable features for specific user segments
Lesson 1666Feature Flag Integration
Targeted rollback
Use revision numbers to skip bad intermediate versions
Lesson 1556Helm Rollback Strategies
Targets a specific audience
(like your API server or external service)
Lesson 1401Service Account Token Projection
Task
states perform work (invoke Lambda, call APIs, run containers)
Lesson 2517AWS Step Functions Overview
Task state
represents a single unit of work performed by your state machine.
Lesson 2519Step Functions Task States
Tax benefits
OpEx is often fully deductible in the year incurred
Lesson 29CapEx vs OpEx: Financial Models in Cloud Computing
TCP
for simple connection verification, **HTTP/HTTPS** when you need to verify application logic (checking a `/health` endpoint).
Lesson 268NLB Health Checks
TCP checks
Opens a TCP connection to verify the port responds.
Lesson 268NLB Health Checks
TCP connections
Can we establish a TCP socket?
Lesson 1420Liveness Probes Fundamentals
TCP Fast Open
reduces handshake overhead by allowing data in SYN packets.
Lesson 2228TCP Performance Optimization
TCP keepalive
prevents idle connections from timing out prematurely.
Lesson 2228TCP Performance Optimization
TCP traffic
Database connections, custom protocols, non-HTTP services
Lesson 261What is a Network Load Balancer (NLB)?
TCP window
sizes limiting throughput on high-latency links
Lesson 2236Troubleshooting Network Performance Issues
Team A
can only deploy to `prod-cluster/team-a-*` namespaces from `github.
Lesson 1918RBAC and Project-Based Access Control
Team Already in AWS
When your team operates primarily in the AWS console and uses AWS tooling daily, the learning curve flattens.
Lesson 1821When to Use AWS Native CI/CD
Team and ownership information
Who owns what, how to reach them
Lesson 2924Introduction to Developer Portals
Team B
has similar boundaries for their resources
Lesson 1918RBAC and Project-Based Access Control
Team boundaries
Frontend team accesses `frontend-repo`, backend team accesses `backend-repo`
Lesson 1680Artifact Repository Access Control
Team notification
Ensure on-call engineers know experiments are running
Lesson 2493Blast Radius and Safety Controls
Team ownership
Clear boundaries mean clear responsibility
Lesson 2561Database per Service Pattern
Team readiness
Can your people execute procedures without confusion?
Lesson 2902DR Testing Fundamentals and Objectives
Teardown Phase
Automatically destroys all resources, preventing resource leaks and reducing costs.
Lesson 2880Kitchen-Terraform for Module Testing
TechDocs
Documentation-as-code that lives alongside your services
Lesson 2927Backstage Platform Overview
Technical debt
in monolithic architecture prevents innovation
Lesson 2794Refactor/Re-architect Strategy
Technical debt reduction
Modernizing legacy applications and retiring aging infrastructure that's expensive to maintain.
Lesson 2790Introduction to Cloud Migration
Technical metadata
(repo links, deployment status, documentation)
Lesson 2928Software Catalog in Backstage
Technical Responder
Executes containment and remediation
Lesson 2870Incident Response Planning
Technical Responders
focus on remediation without distraction
Lesson 2131Incident Communication and Status Pages
Technical Risks
Application compatibility issues, data migration failures, network latency, security vulnerabilities in new environments.
Lesson 2803Risk Assessment and Mitigation
Technical teams
Application-specific metrics, performance data, issues requiring resolution
Lesson 2818Migration Progress Tracking and Reporting
Technology choice
Service A can use PostgreSQL while Service B uses MongoDB
Lesson 2561Database per Service Pattern
Technology Diversity
Services can use different languages, frameworks, and data stores suited to their specific needs.
Lesson 2555What Are Microservices?
Telemetry collection
for observability
Lesson 1578Istio Data Plane and Envoy Proxies
Temperature
CPU or system temperature readings
Lesson 1950Metric Types: Gauge
Template formats
Uses YAML (like CloudFormation) or Python/Jinja2 for advanced templating
Lesson 935Introduction to Google Cloud Deployment Manager
Template Specs
are Azure resources that store your ARM templates directly in Azure.
Lesson 908Template Specs for Reusable Templates
Template-based deployments
for repeatability
Lesson 893Introduction to Azure Resource Manager (ARM)
Template-Based Provisioning
Developers select from pre-configured infrastructure templates (database clusters, microservice scaffolds) that meet organizational standards.
Lesson 2926Self-Service Infrastructure Patterns
Templates and golden paths
Pre-configured project scaffolding aligned with best practices
Lesson 2924Introduction to Developer Portals
Temporal
and **Cadence** are open-source alternatives that let you define workflows in general-purpose code (Go, Java, Python, TypeScript) that can run anywhere—on-premises, multi-cloud, or hybrid environments.
Lesson 2529Temporal and Alternative Orchestrators
Temporal Queries
Need to know what your inventory looked like last Tuesday?
Lesson 2726Event Sourcing Fundamentals
Temporary
Human users, applications running in cloud environments, cross-account access, anything security-conscious
Lesson 341Temporary vs Permanent Credentials
Temporary cache data
that doesn't need to survive pod restarts
Lesson 1326Ephemeral Inline Volumes
Temporary credentials
are like day passes that automatically expire.
Lesson 341Temporary vs Permanent Credentials
Temporary state
Session data, cache, build artifacts you don't need to keep
Lesson 1039tmpfs Mounts
Temporary uploads
Let users upload photos directly to your bucket without giving them permanent write access
Lesson 165Pre-Signed URLs and Temporary Access
Term length
1 year or 3 years (longer = bigger discount)
Lesson 74Reserved Instance Pricing
Terminate blue
After stabilization, optionally removes old instances
Lesson 1835Blue/Green Deployments with CodeDeploy
Terminate hook
– Pause before final termination (save logs, drain connections gracefully)
Lesson 295Instance Lifecycle in Auto Scaling
Terminate TLS/SSL
if configured
Lesson 1583Gateway Resource for Ingress
Terminating
a VM is permanent deletion—like throwing away your computer.
Lesson 83Starting and Stopping VMsLesson 295Instance Lifecycle in Auto Scaling
Terraform
is an open-source infrastructure as code (IaC) tool created by HashiCorp.
Lesson 723What is Terraform and Why Use ItLesson 946Deployment Manager vs Terraform on GCP
Terraform Cloud or Enterprise
, you publish modules by connecting a VCS repository (GitHub, GitLab, etc.
Lesson 812Private Module Registries
Terraform Cloud's cost estimation
integrate directly into CI/CD workflows.
Lesson 838Cost Estimation in CI/CD
Terraform Cloud's drift detection
feature for automatic monitoring
Lesson 842Drift Detection and Remediation
Terraform module
is a container for multiple resources that are used together.
Lesson 798What Are Terraform Modules
Terraform provider abstraction
means creating modules that act as translation layers—you define *what* you want (a compute instance with certain specs) once, and the module handles the *how* for each cloud provider.
Lesson 2767Terraform Provider Abstraction
Terraform Sentinel
can all trigger automatically on code commits or pull requests.
Lesson 2345Continuous Compliance Scanning
Terraform version
The exact version of Terraform used
Lesson 775State File Contents and Structure
Terrascan
detects compliance violations and security risks across IaC tools, offering 500+ policies for standards like CIS benchmarks, PCI-DSS, and GDPR.
Lesson 2884Security Scanning in IaC Tests
Test carefully
Try changes on one instance before rolling out to others
Lesson 708Targeted Operations
Test dependencies
Validate connectivity and performance after each wave before proceeding
Lesson 2829Dependency Mapping and Migration Order
Test edge cases
sudden traffic spikes, gradual ramps, sustained high load, and rapid drops.
Lesson 307Scaling Policy Testing
Test in Non-Production First
Deploy to dev/test resource groups before touching production.
Lesson 919ARM Template Best Practices and Validation
Test in production
Validate with real traffic before full activation
Lesson 1666Feature Flag Integration
Test network connectivity
`kubectl exec my-pod -- ping google.
Lesson 1140kubectl exec: Executing Commands in Containers
Test reachability
Use ping/traceroute from both directions
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Test realistic scenarios
Don't just verify a VPC deploys—deploy a VPC *with* subnets, route tables, and a test EC2 instance, then verify connectivity.
Lesson 2882Integration Testing Strategies
Test Results
If tests ran, pass/fail breakdown
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Test safely
Changes happen in complete isolation from production
Lesson 2883Ephemeral Test Environments
Test stage
Run unit tests, integration tests, security scans
Lesson 1786Stages and Steps Organization
Test thoroughly
Ensure workloads still deploy correctly
Lesson 1400Migrating from PodSecurityPolicy
Test under load
to understand your application's peak memory usage
Lesson 1335Setting Memory Limits
Test your rollback mechanisms
when experiments reveal problems
Lesson 2494Chaos Experiments in Non-Production
Testable
Validate infrastructure before deploying
Lesson 684What is Infrastructure as Code?
Tested rollback procedures
Document and rehearse rollback steps for each wave.
Lesson 2817Disaster Recovery During Migration
Testing
Want to see how a new version of your code handles last month's traffic?
Lesson 579Event Replay and Time TravelLesson 1672Artifact Lifecycle
Testing and CI/CD
Reproducible, isolated environments
Lesson 1059Compose Best Practices and Limitations
Testing and development
Spin up instances for a few hours, then tear them down
Lesson 73On-Demand Pricing Model
Testing and Simulation
Replay production events in a test environment to validate new logic against real-world scenarios.
Lesson 2731Event Replay and Reprocessing
Testing becomes reliable
what works in staging will work in production
Lesson 691Immutable Infrastructure Principle
Testing before commit
Always validate new credentials work before storing them—a broken rotation can cause outages.
Lesson 2247GCP Secret Manager Rotation Strategies
Testing changes
Create a copy to test migrations or schema changes safely
Lesson 427Restoring from Backups
Testing environment
QA tests the exact same container image that developers built, eliminating "different environment" bugs.
Lesson 965Container Portability BenefitsLesson 1672Artifact Lifecycle
Testing Error Scenarios
Simulate 400, 500, or timeout responses without breaking real systems
Lesson 545Mock Integrations and Testing
Testing infrastructure code
by feeding it through OPA before deployment
Lesson 2886Compliance Testing with Open Policy Agent
Testing window
– validate your full configuration before deploying
Lesson 1171Pausing and Resuming Rollouts
Text and Markdown
Add context, instructions, or explanations between your data visualizations.
Lesson 678Azure Monitor Workbooks
Text box variables
Free-form user input
Lesson 1998Variables and Templating
Text fields
for full-text search (log messages)
Lesson 2019Elasticsearch Index Templates and Mappings
Text formats (CSV, JSON)
Human-readable, easy to generate, but slow to query.
Lesson 2660Querying Data Formats in Athena
They start fast
New instances spin up quickly during replacements
Lesson 968Immutable Infrastructure Pattern
They're lightweight
Replacing a container takes seconds, not minutes
Lesson 968Immutable Infrastructure Pattern
They're portable
The same container image works everywhere
Lesson 968Immutable Infrastructure Pattern
They're versioned
Each build creates a distinct artifact you can tag and track
Lesson 968Immutable Infrastructure Pattern
Think of it as
Building a tower of blocks where each level must be solid before adding the next.
Lesson 1184StatefulSet Pod Management Policies
Third-party CRDs
translating vendor-specific health signals
Lesson 1914Resource Health Customization
Third-party drivers
Connect to external storage systems
Lesson 1040Volume Drivers and Plugins
Third-party integrations
External services get limited scope boundaries regardless of assigned roles
Lesson 369Policy Boundaries and Guardrails
Third-Party Resource Types
Vendors publish resource types you can activate in your AWS account.
Lesson 892CloudFormation Registry and Extensions
Thread pools
Critical API calls use one thread pool, background tasks use another
Lesson 2583Bulkhead Pattern for IsolationLesson 2589Bulkhead Pattern for Isolation
Threat Detection
SCC integrates with Google's threat intelligence to detect anomalous behavior patterns, potential malware, cryptocurrency mining attempts, and suspicious network activity.
Lesson 2864Google Security Command Center
Threat intelligence integration
Correlates events with known indicators of compromise
Lesson 2863Azure Security Center and Sentinel
Threats
are active attempts to compromise your systems—like credential stuffing attacks, API abuse, or malware deployment.
Lesson 2860Threat Detection Fundamentals
Threshold configuration
Define what constitutes "abnormal" (e.
Lesson 2150Cost Anomaly DetectionLesson 2969Cost Anomaly Detection
threshold-based alarms
like "alert me if CPU exceeds 80%.
Lesson 644Anomaly Detection AlarmsLesson 667Log-Based Metrics and Alerting
Threshold-based refresh
Trigger refresh when TTL drops below a threshold (e.
Lesson 2701Refresh-Ahead Caching Pattern
Thresholds and Flapping
Require multiple consecutive failures before marking unhealthy (typically 2-3), and multiple successes before returning to healthy.
Lesson 2455Health Checks and Failure Detection
Thresholds on Key Metrics
Set alert triggers on metrics you've been monitoring (CPU utilization, connection count, read/write latency, storage space).
Lesson 457Monitoring and Alerting for Performance
Throttle counts
How many requests were rate-limited
Lesson 535API Gateway Monitoring and Logs
Throttle rate
steady-state requests per second allowed
Lesson 2540Serverless API Rate Limiting and Throttling
Throttle rules
Define request thresholds per IP or session
Lesson 2750Cloud Provider Rate Limiting Services
throttled
(rejected with an error) or **queued** (delayed until capacity frees up), depending on the invocation type and configuration.
Lesson 478Function Concurrency LimitsLesson 1334Setting CPU Limits
Throttling and rate limiting
to protect functions
Lesson 2502API Gateway Integration Pattern
Ticket creation
Open Jira/ServiceNow tickets for manual review
Lesson 2901Policy Reporting and Remediation
Ticket for investigation
10% consumed in 3 days (2x burn) + confirmed over 6 hours
Lesson 2121Multi-Window and Multi-Burn-Rate Alerting
Tier 0 (No Backup)
No formal DR plan.
Lesson 2411DR Tiers and Service Levels
Tier 1
On-call engineer applies pre-configured rate limiting
Lesson 2387DDoS Response Procedures
Tier 2
Security team adjusts WAF rules and reviews logs
Lesson 2387DDoS Response Procedures
Tier 3
Engage cloud provider's DDoS response team (Shield Advanced, Azure DDoS Protection specialists)
Lesson 2387DDoS Response Procedures
Tier 3 (Hot Standby/Active-Passive)
Full duplicate environment running but not serving traffic.
Lesson 2411DR Tiers and Service Levels
Tier 4 (Active-Active/Multi-Site Active)
Multiple sites simultaneously processing traffic with real-time replication.
Lesson 2411DR Tiers and Service Levels
Tiered Architecture
Web, application, and database layers separated
Lesson 2390Network Segmentation Fundamentals
Tiered escalation
Primary responder handles initial triage; secondary and tertiary levels escalate if needed.
Lesson 2127On-Call Rotation Structures
Time alignment
Control data point intervals (align with `1m`, `5m`, etc.
Lesson 682GCP Monitoring Query Language
Time and duration
of the operation
Lesson 1904Application Tracking and History
Time dimensions
usage date, billing period
Lesson 2962Cloud Billing Data Structure
Time granularity
Hourly or daily line items
Lesson 2172AWS Cost and Usage Reports
Time running
(billed per second/hour, depending on OS)
Lesson 73On-Demand Pricing Model
Time sync
Link multiple panels to explore the same period together
Lesson 2000Annotations and Time Range Controls
Time to scale
How quickly do new instances launch after a trigger?
Lesson 312Scaling Policy Monitoring
Time travel and versioning
built into the storage layer
Lesson 2629Data Lakehouse Architecture
Time Window
The evaluation period (last 5m, 1h, etc.
Lesson 2016Log Alerting Basics
Time-based
Grant access only during business hours
Lesson 394GCP IAM Conditions
Time-based access
Different permissions during business hours vs after-hours
Lesson 367Policy Variables and Dynamic Policies
Time-based analysis
Track how costs evolve across different periods to identify seasonal patterns or sudden spikes.
Lesson 2139Cost Explorer and Billing Dashboards
Time-based code
A 6-digit number from an authenticator app that changes every 30 seconds
Lesson 342Multi-Factor Authentication (MFA) Basics
Time-based filtering
Narrow scope to incident windows
Lesson 2355Audit Log Analysis and Search
Time-based partitioning
Logs split by time windows, dramatically speeding queries within a time range
Lesson 2011Log Indexing FundamentalsLesson 2661Athena Partitioning Strategies
Time-based triggers
go beyond simple cron, offering features like timezone-aware scheduling, holiday calendars, and retry windows.
Lesson 2616Job Scheduling and Orchestration
Time-bound access
Implement Just-in-Time (JIT) access that expires automatically
Lesson 2834Principle of Least Privilege
Time-range partitioning
is essential since traces are time-series data.
Lesson 2097Query Performance and Indexing
Time-range preservation
Links carry `from` and `to` parameters
Lesson 2109Contextual Links and Drill-Down
Time-sensitive
Events have timestamps and often must be processed within strict time windows.
Lesson 2600What is Streaming Data?
time-series
a stream of timestamped measurements identified by a unique combination of a metric name and labels.
Lesson 1948Time-Series Data ModelLesson 1955Labels and DimensionalityLesson 1962PromQL Basics and Data Model
Time-to-First-Byte (TTFB)
Compare edge vs.
Lesson 2680CDN Cache Analytics and Hit Rates
Time-to-First-Deploy
measures how quickly a new engineer can go from zero to deploying their first application.
Lesson 2916Developer Experience Goals
Time-to-market
improvements for new products
Lesson 37Measuring Cloud Business Value: KPIs and Metrics
Time-to-market is critical
Building a portable abstraction takes time you don't have
Lesson 2777Lock-In vs Portability Trade-offs
Time-to-Productivity
reveals the real impact:
Lesson 2936Portal Metrics and Adoption
Time-unit
(daily, hourly, monthly)
Lesson 2665BigQuery Data Organization
Timeline of events
When detection occurred, when containment began, resolution time
Lesson 2874Post-Incident Review and Improvement
Timeline reconstruction
Document events chronologically with timestamps—when the incident started, what actions responders took, when services recovered.
Lesson 2134Post-Incident Reviews and Blameless Postmortems
Timeout Configuration
Set timeouts shorter than your check interval to avoid delayed detection.
Lesson 2455Health Checks and Failure Detection
Timeout enforcement
at the proxy level
Lesson 1611Timeouts and Retry Policies
Timeout expires
No ACK received, message becomes visible again for retry
Lesson 2713Message Visibility and Acknowledgment
Timeout issues
on slow connections
Lesson 166Multipart Upload
Timeout Strategies
Set explicit timeouts at the task and workflow level.
Lesson 2525Long-Running Workflows
timeouts
(time limits), **concurrency** (limiting simultaneous runs), and **cancellation policies** (when to stop).
Lesson 1712Timeouts, Concurrency, and Workflow ControlsLesson 2512Orchestrator Pattern with Step FunctionsLesson 2582Retry and Timeout Strategies
Timestamp data
When was membership granted?
Lesson 360Auditing Group and Role Membership
Timestamp information
Lesson 222VPC Flow Logs
Timestamps or full URLs
(infinite possibilities)
Lesson 1978High Cardinality and Label Design
TLS certificates
(formerly called SSL) are digital credentials that encrypt traffic between clients and your API.
Lesson 541Custom Domain Names and TLS
TLS listener
on the NLB and attach an **SSL/TLS certificate** (typically from AWS Certificate Manager).
Lesson 269TLS Termination on NLB
TLS termination
is the process of decrypting HTTPS traffic at the Ingress Controller, then forwarding unencrypted HTTP traffic to backend services.
Lesson 1225TLS Termination with Ingress
TLS/SSL configuration
Certificates for HTTPS termination
Lesson 1219Ingress Resource Fundamentals
Token bucket
Tokens refill at a steady rate; each request consumes a token
Lesson 2592Rate Limiting and Throttling
Token cost
How many tokens each request consumes (usually 1, but can vary by request type).
Lesson 2745Token Bucket Algorithm
Token location
Typically the `Authorization: Bearer <token>` header
Lesson 1627JWT Authentication and Validation
Token-based
Validates a bearer token (like an OAuth token)
Lesson 544API Gateway Authorization Strategies
Token-Based Authentication
offers more security and flexibility.
Lesson 1079Private Registry Authentication
Tolerant of cold starts
(no persistent local storage needed)
Lesson 1503AKS Virtual Nodes and Serverless Bursting
Tolerations
work differently—they let your DaemonSet pods *tolerate* node taints.
Lesson 1187DaemonSet Scheduling and Node SelectionLesson 1360Introduction to Taints and Tolerations
Too deep
You allocate excessive memory/storage, waste money, and hide performance problems.
Lesson 2742Queue Depth and Capacity Planning
Too shallow
Your queue fills up quickly, rejecting new messages (overflow) even when consumers could handle more work eventually.
Lesson 2742Queue Depth and Capacity Planning
Too-sensitive thresholds
that trigger on normal variance
Lesson 651Alarm Best Practices and Anti-Patterns
Tool compatibility
Monitoring tools work across meshes
Lesson 1598Service Mesh Interface (SMI) Standard
Tool Integration
Tools like `docker-compose` and orchestrators can read `EXPOSE` to configure networking automatically
Lesson 1007EXPOSE: Port DocumentationLesson 1124Annotations for Metadata
Tooling and visibility
(dashboards, tagging standards, cost anomaly detection)
Lesson 2954Shared Responsibility Model
Top floor
(highest abstraction): Simple CLI commands or UI forms — "deploy app, choose region"
Lesson 2920Abstraction Levels and User Personas
Top queried domains
to understand traffic patterns
Lesson 2186DNS Query Logging and Analysis
Top SQL identification
See which specific queries consume the most CPU or I/O
Lesson 456Performance Insights and Diagnostics Tools
Top SQL Queries
See exactly which queries consume the most time.
Lesson 412Performance Insights
Top tier
Global Prometheus federates key metrics from all lower tiers
Lesson 1979Prometheus Federation Basics
Topic-Based Routing
organizes events into channels or topics (e.
Lesson 2736Event Filtering and Routing
TopLevelKey
– the first key (often a region or environment)
Lesson 871Fn::FindInMap Function
Topology
view visualizes your entire network architecture with real-time status.
Lesson 2194Provider-Specific Network InsightsLesson 2602Streaming Architecture Patterns
Topology constraints solve this
by letting you define exactly where volumes can be created.
Lesson 1313StorageClass Topology Constraints
Total monthly spend
and trend over time
Lesson 2961Cost Visibility Fundamentals
Total request path
(every service and operation touched)
Lesson 2063Spans and Span Relationships
Total requests
handled by your API
Lesson 1949Metric Types: Counter
Total retention
Combined policy might keep ~50MB per container
Lesson 1436Log Rotation and Storage
Total storage
= daily volume × retention days
Lesson 656Log Retention and Storage Requirements
Trace effective routes
Cloud providers show which route will actually be used for a given destination IP.
Lesson 2190Route Table Verification
Trace IDs
and **span IDs** are the identifiers that make this possible.
Lesson 2062Trace Context and Propagation
Trace list view
lets you filter by service, latency threshold, or time range
Lesson 2094Google Cloud Trace
Traceability
Every change is recorded with who made it, when, and why (commit messages).
Lesson 1647Version Control as the Source of Truth
TraceQL
Use Tempo's query language to search traces by service, duration, or status
Lesson 2092Tempo by Grafana
Traceroute
is your diagnostic flashlight that illuminates this journey, revealing each hop along the way.
Lesson 2227Network Path Analysis and Traceroute
Track against usage
Ensure consuming resources are tagged with the amortized cost, not just the discounted on- demand rate
Lesson 2148Amortizing Reserved Instance Costs
Track escape hatch usage
Monitor which teams use overrides and why.
Lesson 2945Platform Abstractions and Escape Hatches
Track execution state
Store a unique identifier (like an event ID or request token) in a database before performing critical operations.
Lesson 503Idempotency in Functions
Track state
and ensure your declared configuration matches reality
Lesson 753When to Use Resources vs Data Sources
Track trends
over time without manually reading logs
Lesson 667Log-Based Metrics and Alerting
Track usage
See which templates are deployed where
Lesson 908Template Specs for Reusable Templates
Tracking Event Flow
Instrument each event with correlation IDs that follow it from producer through every consumer.
Lesson 581Event-Driven Monitoring and Observability
Tracks dependencies
(won't run Job C until A and B succeed)
Lesson 2626Workflow Orchestration Tools
Tracks Kubernetes events
Pod creation, scheduling decisions, errors, and state changes
Lesson 1487GKE Monitoring with Cloud Monitoring
Tracks progress
and handles dependencies (creating networks before servers, for example)
Lesson 699Apply and Provisioning
Tracks resource state
through "deployments" (similar to CloudFormation stacks)
Lesson 935Introduction to Google Cloud Deployment Manager
Tracks schema changes
over time, allowing version control
Lesson 2646Glue Crawlers
Tradeoff
More complex to manage state and synchronization
Lesson 2451Redundancy Principles and Types
Traditional (Mutable) Infrastructure
Lesson 46Immutable Infrastructure Principles
Traditional approach
Applications write to `/var/log/app.
Lesson 666Cloud-Native Logging Standards
Traefik
shines with its automatic service discovery and modern dashboard.
Lesson 1230Ingress Controller Options
Traffic access control
Service-to-service authorization policies
Lesson 1598Service Mesh Interface (SMI) Standard
Traffic analysis
involves inspecting actual packets.
Lesson 1630mTLS Troubleshooting and Verification
Traffic anomalies
Unexpected drops or surges in request volume that might indicate upstream failures or attacks.
Lesson 1642Alerting on Service Mesh Metrics
Traffic Baselines
establish your normal traffic patterns: requests per second, bandwidth usage, connection counts, and geographic distribution.
Lesson 2386DDoS Monitoring and Metrics
Traffic control
without code changes (canary deployments, A/B testing)
Lesson 1576Istio Overview and Core Value Proposition
Traffic Distribution
A global load balancer (DNS-based like Route 53 or a service mesh) directs users to the best- performing or geographically closest cloud provider.
Lesson 2759Multicloud Architecture Patterns: Active-Active
Traffic engineering
– Route high-volume workloads through private links, keep low-volume through VPN
Lesson 2224Private Connectivity Cost Management
Traffic Flow Control
Segmentation lets you define explicit allow/deny rules between zones.
Lesson 2390Network Segmentation Fundamentals
Traffic flows
→ Once healthy, the instance receives user requests
Lesson 320ASG Integration with Elastic Load Balancing
Traffic interception
All network requests to and from your application are automatically routed through the sidecar proxy first
Lesson 1566The Sidecar Proxy Pattern
traffic management
through SMI TrafficSplit resources, **observability** via metrics and tracing, and **access control** policies.
Lesson 1596Open Service Mesh (OSM) BasicsLesson 1599Cilium Service Mesh with eBPFLesson 2584Service Mesh for Communication Management
Traffic Management (formerly Pilot)
Lesson 1577Istio Control Plane Components
Traffic management complexity
How do services discover each other?
Lesson 1576Istio Overview and Core Value Proposition
Traffic management needs
like canary deployments that would be harder to implement otherwise
Lesson 1573Service Mesh Performance Overhead
Traffic mirroring
Shadow production traffic through policy checks without impacting users
Lesson 1629Security Policies Best Practices
Traffic patterns
Predictable workloads suit reserved instances; variable loads benefit from auto-scaling services
Lesson 110Compute Service Selection Criteria
Traffic specs
Define protocols and routes
Lesson 1598Service Mesh Interface (SMI) Standard
Traffic spikes
– Unexpected load increases shouldn't trigger cascading failures
Lesson 2460Capacity Planning for High AvailabilityLesson 2740Understanding Backpressure in Distributed Systems
Traffic split
Weighted routing for canary deployments
Lesson 1598Service Mesh Interface (SMI) Standard
Traffic Splitting
and **Blue-Green Deployments**, but offers more granular control and risk reduction through incremental rollout.
Lesson 1665Canary Deployment Pattern
Traffic visibility
Security teams can observe patterns without decrypting at the application
Lesson 1617Service Mesh Security Overview
Train teams
to respond calmly during real incidents
Lesson 2490Introduction to Chaos Engineering
Training Period
The system analyzes weeks of historical data to build a model of normal behavior
Lesson 644Anomaly Detection Alarms
Transaction Log Analysis
Verify that transaction sequence numbers match between primary and replica databases.
Lesson 2444Data Consistency Validation
Transactional Applications
Any workload needing frequent random read/write operations
Lesson 113Block Storage Overview
Transactional workloads
Applications requiring frequent, random read/write operations
Lesson 124Block Storage Overview
Transfer
Use managed services or insurance to shift risk burden
Lesson 2803Risk Assessment and Mitigation
Transformations
are Grafana's post-query processing tools that let you manipulate data *after* it's retrieved but *before* it's displayed.
Lesson 1999Transformations and Data Processing
Transforms
requests and responses (like changing data formats)
Lesson 520What is an API Gateway?
Transient failures
Set `failureThreshold: 5` to avoid false positives during brief hiccups
Lesson 1426Probe Timing Parameters
transit gateway
acts like a central airport hub that connects multiple destinations.
Lesson 218Transit Gateway ConceptsLesson 2208Transit Gateway for Hybrid Networks
Transit patterns
define the network architecture that interconnects your clouds—either through a centralized hub (hub-and-spoke) or direct connections between every pair (mesh).
Lesson 2781Multicloud Transit Patterns
Transition
older versions to cheaper storage classes (move 30-day-old versions to cold storage)
Lesson 157Versioning Lifecycle and MFA Delete
Transitions
Connections between stages that can be enabled/disabled to control flow.
Lesson 1814CodePipeline: Orchestration Service OverviewLesson 1838CodePipeline Architecture and Components
Translating rules into Rego
policy files that parse infrastructure JSON/HCL
Lesson 2886Compliance Testing with Open Policy Agent
Transmission Security
Encrypt PHI in transit using TLS/SSL
Lesson 2327HIPAA for Healthcare Data
Transparency First
Make cost data visible and accessible to all teams.
Lesson 2952Building a FinOps Culture
Transparent operation
Your application code remains unchanged—it thinks it's talking directly to other services
Lesson 1566The Sidecar Proxy Pattern
Transparent Roadmap
Share what the platform team is building so developers can align contributions or propose alternatives.
Lesson 2944Inner Source and Contribution Models
Tree-Shaking
Modern bundlers like Webpack or esbuild can analyze your code and eliminate unused exports from libraries.
Lesson 2546Package Size Optimization
Trend detection
Build time-series models to forecast spending or spot anomalies
Lesson 2172AWS Cost and Usage Reports
Trend-Based Alerts
Instead of just absolute values, monitor *rate of change*.
Lesson 457Monitoring and Alerting for Performance
Trends
revealing patterns over time
Lesson 2102Metric Selection and Relevance
Trigger `workflow_dispatch` events
programmatically from scripts or external tools
Lesson 1724GitHub Actions APIs and Webhooks
Trigger event
(push, pull request, manual)
Lesson 1696Workflow Run History and Re-runs
Trigger other jobs
Start downstream builds
Lesson 1776Build Steps and Post-Build Actions
Triggering condition
When to use this procedure (alert name, symptoms)
Lesson 2130Runbooks and Playbooks
Triggering Controlled Failures
Deliberately shutting down primary databases, killing application instances, or simulating regional outages to force failover activation.
Lesson 2488Failover Testing and Validation
Triggering Pipelines
You can start a pipeline via API POST request to `/projects/:id/trigger/pipeline` using a pipeline trigger token.
Lesson 1769GitLab CI API and Automation
Troubleshoot connectivity
Discover why connections fail (rejected packets, wrong routes)
Lesson 213Network Security Logging and Monitoring
Troubleshoot precisely
Destroy and recreate a problematic resource without disrupting everything else
Lesson 708Targeted Operations
Troubleshooting challenges
that observability features solve faster than the latency hurts
Lesson 1573Service Mesh Performance Overhead
Troubleshooting specific failed requests
beyond what metrics show
Lesson 1637Access Logging in Service Mesh
Troubleshooting workflow
When a pipeline fails, start at the stage level, identify the red (failed) job, click into its log, and scroll to the bottom.
Lesson 1739Pipeline Visualization and Job Logs
True portability
Same gateway config works on AWS, Azure, GCP, or bare metal
Lesson 2772API Gateway Abstraction
Trunk-based
suits teams with strong automation and testing, prioritizing velocity.
Lesson 1867Branching Strategies for GitOps
Trunk-Based Development
means developers commit small, frequent changes directly to a single main branch (the "trunk").
Lesson 1668Trunk-Based vs GitFlow Patterns
Trust zones
are areas within these boundaries where resources share similar security requirements, risk profiles, and access policies.
Lesson 2841Security Boundaries and Trust Zones
Trusted Committers
Designate experienced contributors who can review and merge changes, scaling beyond just the core platform team.
Lesson 2944Inner Source and Contribution Models
TSDB path
to monitor for new blocks
Lesson 1983Thanos Sidecar and Object Storage
TTL
defines how long cached content remains valid before the CDN checks for updates.
Lesson 2671CDN Caching Fundamentals Review
TTL (Time-to-Live)
and **cache-control headers** come in—they're instructions that tell the CDN (and browsers) how long to store content before fetching a fresh copy.
Lesson 587TTL and Cache Control HeadersLesson 2265Vault Leases and Revocation
TTL matters
Store deduplication keys only as long as duplicates might realistically arrive (minutes to hours)
Lesson 2734Event Deduplication Strategies
TTL support
Sessions auto-expire using built-in time-to-live
Lesson 2693Session Store and User State Caching
Tumbling window triggers
Process time-sliced data
Lesson 2620Azure Data Factory Pipelines
Tuples
are like lists but with a fixed sequence of specific types:
Lesson 818Working with Complex Variable Types
Tyk
use standard configuration formats (YAML, CRDs) and can run on any Kubernetes cluster, regardless of cloud provider.
Lesson 2772API Gateway Abstraction
Type and name
How you defined it (e.
Lesson 775State File Contents and Structure
Type conversion functions
transform data from one type to another
Lesson 736Built-in Functions Overview
Type Providers
are Deployment Manager's mechanism for connecting to *any* REST API that supports CRUD operations (Create, Read, Update, Delete).
Lesson 958Type Providers and External APIs
Type Safety
Compile-time errors catch mismatches between services before deployment.
Lesson 2572gRPC for High-Performance Communication

U

Ubuntu
images for specific tooling requirements
Lesson 1823CodeBuild Build Environments and Images
UDP floods
Send large volumes of UDP packets to random ports
Lesson 2378DDoS Attack Types and Vectors
UDP traffic
DNS queries, gaming protocols, streaming media
Lesson 261What is a Network Load Balancer (NLB)?
UI
provide trace retrieval and visualization
Lesson 2090Jaeger Deployment Models
Ultimate disaster recovery
A complete outage or data corruption at your primary cloud provider won't affect backups stored elsewhere.
Lesson 2788Multicloud Backup and Archive
Ultra-Low Latency
Because NLBs don't parse application data, they add microseconds (not milliseconds) to connection time.
Lesson 235Network Load Balancers (Layer 4)Lesson 271NLB Use Cases and Patterns
UltraSSD_LRS
Ultra-high performance SSD for mission-critical workloads
Lesson 1311Azure Disk StorageClasses
Unattached EBS volumes
or disks lingering after instance termination
Lesson 2160Idle Resource Detection
Unattached resources
Persistent disks not connected to any VM
Lesson 2180GCP Recommender and Cost Insights
Unattached storage disks
accumulating charges
Lesson 2175Azure Budgets and Advisor
Unauthorized access
Attackers gain entry to databases, APIs, or cloud accounts
Lesson 2237Introduction to Secrets Management in Cloud
Unbounded
Streaming data has no predetermined end.
Lesson 2600What is Streaming Data?
Unconfined
No restrictions (default for some clusters)
Lesson 1397Seccomp Profiles
Uncordoning
Return the refreshed node to active duty
Lesson 1509Node Image Upgrades
Understand blast radius
See which services would be affected if one fails
Lesson 1639Service Dependency Mapping
Understanding traffic patterns
at the request level
Lesson 1637Access Logging in Service Mesh
Underutilized virtual machines
that could be downsized or shut down
Lesson 2175Azure Budgets and Advisor
Uneven memory
Rebalance Redis Cluster or adjust partitioning
Lesson 2695Cache Monitoring and Performance Metrics
Unfair resource allocation
– aggressive clients starving others
Lesson 2744Rate Limiting Fundamentals
Unified authentication
through users, groups, and roles
Lesson 376AWS IAM Service Overview
Unified configuration
ConfigMaps, Secrets, and Namespaces synchronized across clusters
Lesson 1514Cluster Federation Basics
Unified forwarding
Logs flow to New Relic alongside APM data
Lesson 2044New Relic Logs in Context
Unified Interface
Query traces alongside logs (Loki) and metrics (Prometheus) in a single pane
Lesson 2092Tempo by Grafana
Unified Model
One configuration language and runtime for logs, metrics, and traces.
Lesson 2041Vector Log Processing Pipeline
Unified security policies
mTLS encryption and authorization rules defined once, enforced everywhere
Lesson 2769Service Mesh for Portability
Unified storage
for all data types: structured tables, semi-structured JSON, unstructured images
Lesson 2629Data Lakehouse Architecture
Unified tagging strategies
that work across accounts, enabling better cost allocation to cost centers (as you learned previously)
Lesson 2147Multi-Account Cost Consolidation
Unified Tooling
Use the same monitoring, logging, deployment, and configuration management tools across both environments.
Lesson 2815Hybrid Operations and Coexistence
Unified view
Connect multiple data sources (Prometheus, Loki, Tempo, databases) in a single interface
Lesson 1991Introduction to Grafana and Its Role in Observability
Unified visibility
Search across all systems from one interface
Lesson 657Centralized Logging Concepts
Uninstalling
removes the release and its resources:
Lesson 1526Helm Releases: Managing Deployments
Unintended public access
Resources accidentally exposed to the internet
Lesson 372Access Analyzer for Policy Review
Unique Features
Native delay queues, message timers up to 15 minutes, visibility timeout up to 12 hours
Lesson 2725Provider-Specific Queue Services
Unique resource naming
prevents test collisions.
Lesson 841Testing at Scale with Terratest
Unit testing
verifying individual resource configurations
Lesson 2875Introduction to Infrastructure Testing
Universal mode
on VMs, where it manages service connectivity without requiring containers or orchestrators.
Lesson 1597Kuma Service Mesh Introduction
Unix user/group database
– leverages system accounts
Lesson 1781Jenkins User Management and Security
Unknown
ArgoCD cannot determine status (connection issues, missing permissions)
Lesson 1885Application Health and Sync StatusLesson 1900Health Assessment
Unlike Terraform
Cloud-specific rather than multi-cloud; no separate state file management needed
Lesson 935Introduction to Google Cloud Deployment Manager
Unlock Jenkins
On first launch, Jenkins generates a random administrator password stored in a file on the server.
Lesson 1772Installing and Configuring Jenkins
Unnecessary artifacts
temporary files accidentally committed to layers
Lesson 986Inspecting Image Layers
Unnecessary computations
– work done on every invocation that could be cached
Lesson 2547Execution Duration Optimization
Unnecessary dependencies
Installing full package suites when you only need one tool.
Lesson 985Layer Size and Bloat
Unpacking each layer
The scanner extracts files from every layer in the image manifest
Lesson 1073Image Scanning Fundamentals
Unpredictable traffic
patterns
Lesson 2532DynamoDB Capacity Modes
Unpredictable workloads
You don't know how long you'll need the resources
Lesson 73On-Demand Pricing Model
Unsealed
Vault can decrypt its master key and operate normally
Lesson 2253Vault Architecture and Components
Unsealing
Requires providing key shares (using Shamir's Secret Sharing) or using auto-unseal with cloud KMS
Lesson 2253Vault Architecture and Components
Unstructured logs
are plain text messages that humans write naturally but machines struggle to parse consistently.
Lesson 654Structured vs Unstructured LogsLesson 2006Structured vs Unstructured Logs
Until Loop
Repeat activities until a condition is met
Lesson 2650ADF Pipeline Activities and Control Flow
Unused elastic IPs
or load balancers with no traffic
Lesson 2160Idle Resource Detection
Unusual access patterns
– Login from new geographic locations, API calls outside normal hours, or suddenly accessing resources a user never touches before.
Lesson 2356Real-Time Audit Log Monitoring
Unusual access times
API calls from your admin account at 3 AM
Lesson 2865CloudTrail and Audit Logging for Security
Unusual query patterns
from specific sources
Lesson 2186DNS Query Logging and Analysis
Unzip
the archive to extract the `terraform` binary
Lesson 724Installing Terraform and Provider Basics
Update code
If the drift was intentional, import the changes into your Terraform configuration
Lesson 842Drift Detection and Remediation
Update credentials
regularly and enforce rotation policies
Lesson 346Creating and Managing User Identities
Update frequency
Rapidly changing data makes strong consistency expensive
Lesson 2709Cache Consistency and Trade-offs
Update results
Emit corrected aggregations (allowed triggers in systems like Apache Flink/Beam)
Lesson 2606Watermarks and Late Data
Update route tables
in public subnets to direct internet-bound traffic (`0.
Lesson 187Internet Gateway FundamentalsLesson 217VPC Peering Routing and Limitations
Update routing rules
to direct that feature's traffic to the new implementation
Lesson 2514Strangler Fig Pattern for Migration
Update values
Replace old endpoints with new cloud resource identifiers
Lesson 2828Connection String and Configuration Updates
Update your applications
to use the new key ID for encryption
Lesson 2311AWS KMS Key Rotation and Aliasing
UPDATE_COMPLETE
Update succeeded
Lesson 877Stack Creation and Lifecycle
UPDATE_IN_PROGRESS
Modifying existing resources
Lesson 877Stack Creation and Lifecycle
Updater
Decides which pods need updates based on recommendations
Lesson 1455Vertical Pod Autoscaler (VPA) Basics
Updates kubeconfig
merges this configuration into your `~/.
Lesson 1497Connecting to AKS with kubectl
Updates the state file
to reflect the new reality
Lesson 699Apply and Provisioning
Updating
Replace the node's OS image and container runtime
Lesson 1509Node Image Upgrades
Upgradability
Update monitoring tools or networking policies without rebuilding application containers.
Lesson 2599Sidecar Pattern for Cross-Cutting Concerns
Upgrade
node versions pool-by-pool
Lesson 1479GKE Node Pools and Machine Types
Upgrade policy
How updates roll out (automatic, rolling, or manual)
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
Upgrading a release
applies changes without redeploying from scratch:
Lesson 1526Helm Releases: Managing Deployments
Upload frequency
and retention policies
Lesson 1983Thanos Sidecar and Object Storage
Upload mode
– Monitors Prometheus's TSDB directory and uploads completed blocks
Lesson 1983Thanos Sidecar and Object Storage
Upload parts
You break your file into chunks (minimum 5MB each, except the last part) and upload them independently—even in parallel
Lesson 166Multipart Upload
Uploads
artifacts to S3 or other destinations
Lesson 1812CodeBuild: Managed Build Service Overview
Upper bound
Alert when metric exceeds maximum (CPU > 80%)
Lesson 641Threshold-Based Alarms
Upside
You never have two versions running simultaneously, which simplifies state management and resource conflicts.
Lesson 1168Recreate Strategy
Upstream Jobs
trigger when another Jenkins job completes successfully:
Lesson 1789Triggers and Automated Execution
Uptime Checks
act as external monitors that ping your services from multiple locations worldwide.
Lesson 680Cloud Monitoring in GCP
URI Path
Block requests to `/admin` from unauthorized IPs, or patterns like `/.
Lesson 2375Custom Rules and Request Inspection
URI versioning
`/v1/users`, `/v2/users`
Lesson 2563API-First Design for Microservices
URL path
of an incoming request and route it to different target groups based on patterns you define.
Lesson 249Path-Based Routing
URL paths
Route `/api/*` requests to API servers, `/images/*` to media servers
Lesson 236Application Load Balancers (Layer 7)Lesson 275Content-Based Routing and Path Rules
URL versioning
`/v1/orders`, `/v2/orders` (explicit, easy to route)
Lesson 2571RESTful API Design for Microservices
Usable
to create new volumes or restore existing ones
Lesson 2423VM and Volume Backup Strategies
Usage analytics
tracking which self-service capabilities get adopted versus ignored
Lesson 2946Feedback Loops and User Research
Usage metrics
hours, GB-months, API calls
Lesson 2962Cloud Billing Data Structure
Use `.env` files
Store environment-specific variables separately, never hardcode secrets in compose files.
Lesson 1059Compose Best Practices and Limitations
Use `depends_on` sparingly
only when implicit dependencies don't capture the true relationship.
Lesson 822Implicit and Explicit Dependencies
Use `kubeseal` CLI
to encrypt your Secret manifests locally
Lesson 2277Sealed Secrets for GitOps
Use `when:`
to control artifact capture (`on_success`, `on_failure`, `always`)
Lesson 1746Job Artifacts
Use aggressive scale-in policies
While you want to scale out quickly to handle spikes, you can often scale in more aggressively during quiet periods.
Lesson 311Scaling for Cost Optimization
Use alpine
when size is critical and you've tested thoroughly
Lesson 1024Base Image Selection
Use appropriate runtimes
Compiled languages (Go, Rust) typically execute faster than interpreted ones
Lesson 2983Serverless Cost Optimization Patterns
Use appropriate sampling strategies
from your earlier lessons.
Lesson 2087Best Practices and Performance Considerations
Use appropriate storage tiers
Archive rarely-accessed data to cheaper storage classes
Lesson 2165Cost-Aware Architecture Patterns
Use approximate functions
like `approx_distinct()` when precision isn't critical
Lesson 2662Athena Performance Optimization
Use Autopilot
for standard containerized applications where simplicity and cost efficiency matter more than infrastructure control.
Lesson 1476GKE Cluster Types: Standard vs Autopilot
Use Azure Hybrid Benefit
if you have existing Windows Server licenses to reduce costs.
Lesson 1504AKS Cost Management and Cluster Sizing
Use cases
Edge functions excel at request manipulation, authentication checks, and A/B testing; regional functions handle complex business logic
Lesson 612Introduction to Edge FunctionsLesson 2521Parallel and Map States
Use cluster autoscaler
Automatically adds/removes nodes based on pending Pods
Lesson 1489GKE Cost Optimization and Bin Packing
Use complete when
You want the resource group to contain *only* what's in your template—nothing more, nothing less.
Lesson 901Template Deployment Modes
Use composite alarms
Instead of five separate alerts for related problems (high CPU, memory pressure, disk I/O, network saturation, error rate), create one composite alarm that triggers when multiple conditions indicate a real issue.
Lesson 651Alarm Best Practices and Anti-Patterns
Use conditional operations
Many databases support conditional writes (e.
Lesson 503Idempotency in Functions
Use connection pooling
to reduce reconnection overhead
Lesson 2251Secrets Management Cost Optimization
Use consistent field names
across all services.
Lesson 1437Structured Logging Best Practices
Use consistent formats
Standardize date formats like `year=YYYY/month=MM/day=DD` for predictable paths.
Lesson 2661Athena Partitioning Strategies
Use consistent tag keys
across all resources
Lesson 92VM Tagging and Organization
Use CSI provisioners
for all new deployments—they're the future
Lesson 1316Provisioner Selection and Configuration
Use descriptive backend keys
Instead of `terraform.
Lesson 797Remote State Best Practices
Use digests
for production deployments, security audits, and guaranteed reproducibility (`docker pull myapp@sha256:a1b2c3d4.
Lesson 983Image Tags vs Digests
Use efficient data structures
Arrays and objects work fine, but avoid nested loops or recursive operations.
Lesson 622Edge Function Performance Optimization
Use external provisioners
only for non-cloud or specialized storage needs
Lesson 1316Provisioner Selection and Configuration
Use field names
whenever possible instead of free-text search—this leverages indexing
Lesson 2030Kibana Query Language (KQL)
Use Filesystem mode
(default) for:
Lesson 1295Volume Modes: Filesystem vs Block
Use folders and tags
Organize dashboards into logical folders by team, service, or environment.
Lesson 2003Grafana Best Practices and Performance
Use full
images for development or when troubleshooting requires system utilities
Lesson 1024Base Image Selection
Use incremental when
You're adding new resources or updating specific ones without disturbing the rest of your infrastructure.
Lesson 901Template Deployment Modes
Use Ingress
when serving HTTP/HTTPS traffic for multiple services, need path/host routing, SSL termination, or want cost efficiency at scale.
Lesson 1220Ingress vs Service Load Balancing
Use layers
(covered in lesson 484) – Extract common dependencies into reusable layers instead of bundling them in every function.
Lesson 485Function Packaging and Deployment Size
Use LoadBalancer
when you need simple TCP/UDP routing, non-HTTP protocols, or have just one service to expose.
Lesson 1220Ingress vs Service Load Balancing
Use numeric UIDs
(like `USER 1000`) for better compatibility across systems
Lesson 1011USER: Running as Non-Root
Use On-Demand for flexibility
cover unexpected traffic spikes, testing environments, or workloads with unpredictable patterns.
Lesson 80Pricing Model Selection Strategy
Use OrderedReady when
Your application requires one instance to be fully operational before starting the next—like a database cluster where the primary must initialize before replicas can join.
Lesson 1184StatefulSet Pod Management Policies
Use Parallel when
Your stateful pods are independent and can initialize concurrently—like multiple cache instances that don't need coordination.
Lesson 1184StatefulSet Pod Management Policies
Use parentheses
for complex logic: `(status: 404 or status: 500) and environment: "production"`
Lesson 2030Kibana Query Language (KQL)
Use pay-as-you-go
for unpredictable, variable, or short-term workloads
Lesson 31Reserved Capacity and Savings Plans
Use production-only dependencies
Development tools, testing frameworks, and debug utilities shouldn't ship with your function.
Lesson 496Dependency Management
Use recording rules
For complex or frequently-used PromQL queries, create Prometheus recording rules to pre- compute results.
Lesson 2003Grafana Best Practices and Performance
Use reserved capacity
when you know exactly what resources you'll need long-term
Lesson 31Reserved Capacity and Savings Plans
Use savings plans
when you're confident about total spending but want flexibility in *how* you spend it
Lesson 31Reserved Capacity and Savings Plans
Use sparingly in production
they create massive volume and noise.
Lesson 2007Log Levels and Severity
Use staging accounts
Run integration tests in dedicated test AWS accounts or GCP projects, never in production.
Lesson 2882Integration Testing Strategies
Use Standard
when you need node-level customization, specific machine types, GPUs, or have workloads requiring privileged containers or host access.
Lesson 1476GKE Cluster Types: Standard vs Autopilot
Use tags
for development, human communication, and convenient references (`docker pull myapp:latest`)
Lesson 983Image Tags vs Digests
Use temporary credentials
when possible (covered in earlier lessons on temporary vs permanent credentials)
Lesson 348Access Keys and Programmatic Access
Use the plaintext DEK
locally to decrypt your data
Lesson 2296Envelope Encryption Pattern
Use time bounds aggressively
always specify the smallest reasonable time window.
Lesson 2097Query Performance and Indexing
Use Visual Hierarchy
Group related metrics together.
Lesson 2970Cost Dashboard Design
Use VPC endpoints
instead of NAT Gateways when accessing cloud services (covered later)
Lesson 199Internet Connectivity Costs
Use What-If Operations
As you've learned, What-If previews changes before applying them—make this standard practice to avoid surprises in production.
Lesson 919ARM Template Best Practices and Validation
User accesses resources
using those short-lived credentials
Lesson 395Cross-Provider IAM Federation
User Agent
Send mobile users to a mobile-optimized version
Lesson 1608A/B Testing and Experimentation
User and group IDs
(runAsUser, runAsGroup, fsGroup)
Lesson 1389Pod Security Context Overview
User attributes
(like username or account ID)
Lesson 367Policy Variables and Dynamic Policies
User authenticates
with their home provider (e.
Lesson 395Cross-Provider IAM Federation
User ID
All events for user `123` stay ordered, but different users process in parallel
Lesson 578Event Ordering and Partitioning
user identity
is a digital representation of a real person within your cloud IAM system.
Lesson 346Creating and Managing User IdentitiesLesson 2848Continuous Verification and Contextual Access
User makes request
→ routed to nearest edge location
Lesson 611Edge vs. Origin: The Request Flow
User namespace
Maps container user IDs to different host user IDs for security.
Lesson 963Process Isolation with Namespaces
user node pools
for your application workloads, each tailored for specific needs (CPU-intensive, GPU-enabled, memory-optimized, etc.
Lesson 1494AKS Node Pools and VM Scale SetsLesson 1495System vs User Node PoolsLesson 1504AKS Cost Management and Cluster Sizing
User or automation
that initiated it
Lesson 1904Application Tracking and History
User uploads
Standard tier with volume expansion enabled
Lesson 1314Multiple StorageClasses Strategy
User-assigned managed identities
are standalone resources you create once and can assign to *multiple* Azure resources.
Lesson 389Azure Managed Identities
User-defined metadata
(custom attributes) is information *you* attach to objects.
Lesson 142Object Metadata and Custom Attributes
User-defined tags
are custom key-value pairs you create (e.
Lesson 2142Cost Allocation Tags in AWS
User-facing services
where traffic naturally varies (e.
Lesson 2745Token Bucket Algorithm
UserData
to be Base64-encoded before it's passed to the instance.
Lesson 875Fn::Base64 and UserData
Username and password
Basic credentials, often for human users
Lesson 992Registry Authentication and Authorization
Username or email
– The unique identifier for this person
Lesson 346Creating and Managing User Identities
Userpass
Username and password authentication for human users.
Lesson 2256Vault Authentication Methods Overview
Using cross-region replication sparingly
Copying snapshots to other regions doubles storage costs (one copy per region).
Lesson 426Backup Storage and Costs
UTS namespace
Containers can have their own hostname and domain name.
Lesson 963Process Isolation with Namespaces

V

Valid configurations
should pass evaluation without violations.
Lesson 2899Policy Testing and Validation
Validate
that your multi-AZ deployments and replication actually work
Lesson 2490Introduction to Chaos EngineeringLesson 2879Unit Testing IaC with Terratest
Validate and expand
Once stable, repeat for the next boundary
Lesson 2598Strangler Fig Pattern for Migration
Validate architecture
Confirm services communicate as designed
Lesson 1639Service Dependency Mapping
Validate Before Deploy
Always use `az deployment group validate` or the Portal's validation feature before actual deployment.
Lesson 919ARM Template Best Practices and Validation
Validate connectivity
Test connections before cutover using feature flags or parallel runs
Lesson 2828Connection String and Configuration Updates
Validate data consistency
with checksum comparisons
Lesson 2826Database Cutover Planning
Validate DNS
Ensure hybrid DNS resolution works correctly
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Validate health checks
during scaling.
Lesson 307Scaling Policy Testing
Validate propagation
If using dynamic routing (BGP) or route propagation from VPN/transit gateways, ensure routes are appearing as expected.
Lesson 2190Route Table Verification
Validate your hypothesis
against a realistic system without customer impact
Lesson 2494Chaos Experiments in Non-Production
Validating
admission controllers execute (in undefined order among themselves)
Lesson 1406Admission Controller Types
Validating admission controllers
inspect requests and approve or reject them based on policy rules.
Lesson 1406Admission Controller Types
Validating controllers
Approve or reject requests based on rules (example: "No privileged pods allowed")
Lesson 1405Admission Control Overview
Validating RPO
Verify how much data (if any) was lost during the failover.
Lesson 2488Failover Testing and Validation
Validation tools
Comparing source and target data integrity
Lesson 2806Database Migration Service Fundamentals
Validation windows
you can test the target database with live data before cutover
Lesson 2825Continuous Data Replication for Databases
Value ranges
Is the quantity between 1 and 100?
Lesson 538Request Validation
Vanity metrics
look good but don't drive action:
Lesson 2102Metric Selection and Relevance
Variable budgets
Percentage-based targets ("10% growth month-over-month")
Lesson 2972Budget Management and Alerts
Variable substitution
Reference your host machine's environment or `.
Lesson 1051Environment Variables and ConfigurationLesson 2109Contextual Links and Drill-Down
Variable traffic
Handle sudden traffic spikes without committing to permanent capacity
Lesson 73On-Demand Pricing Model
Varied Networking Models
Setting up VPC peering in AWS differs fundamentally from VNet peering in Azure.
Lesson 2756Multicloud Challenges: Complexity and Management Overhead
Vault Agent Injector
is a Kubernetes mutating admission webhook controller that intercepts pod creation requests and automatically injects **sidecar containers** and **init containers** into your pods based on annotations.
Lesson 2275Vault Agent Injector for KubernetesLesson 2279Secrets Rotation in Containers
Vault returns a token
with appropriate permissions
Lesson 2258AppRole Authentication for Applications
VCS Integration
connects your Git repository directly to a workspace.
Lesson 836Terraform Cloud for Team Collaboration
Vendor flexibility
Avoid lock-in by maintaining presence across multiple platforms
Lesson 1099Cross-Provider Registry Integration
Vendor lock-in
means the cost and complexity of switching providers becomes prohibitively high because your architecture is tightly coupled to one ecosystem.
Lesson 2753Multicloud Benefits: Risk Mitigation and Vendor Lock-In
Vendor lock-in avoidance
No single provider controls your entire infrastructure, preserving negotiating power and preventing dependency on proprietary services.
Lesson 2751What is Multicloud and Why Organizations Adopt It
Vendor Solutions
(NetApp Trident, Pure Service Orchestrator, Dell CSI)
Lesson 1327CSI Driver Selection and Comparison
Vendor solutions are mature
and widely adopted in your industry
Lesson 2795Repurchase Strategy
Vendor-Neutral
You're not locked into one cloud provider's tooling, making migrations and multi-cloud strategies feasible.
Lesson 723What is Terraform and Why Use It
Verb
Allow reading (`get`) but not modifying (`update`, `delete`)
Lesson 1269RBAC for Secrets
Verbosity
Log every request or sample selectively
Lesson 1637Access Logging in Service Mesh
Verification
You can confirm no one tampered with the image during transport
Lesson 982Image Digest and Content AddressingLesson 2443Failback Procedures
Verification Phase
After provisioning, Kitchen runs validation tests (often using InSpec) against the deployed infrastructure to verify it meets your requirements.
Lesson 2880Kitchen-Terraform for Module Testing
Verification steps
How to test the deployment worked
Lesson 1544NOTES.txt and User Instructions
Verifies layer integrity
using cryptographic hashes
Lesson 994Pulling Images from Registries
Verify
that fixes worked through rescanning
Lesson 2868Vulnerability Scanning and Management
Verify continuously
Authentication and authorization happen per-session, not just at connection time
Lesson 2393Zero Trust Network Access (ZTNA)
Verify recovery
Watch the controller sync your cluster back to the stable state
Lesson 1873Rollback and Recovery
Verify route propagation
Check route tables on both sides
Lesson 2210Hybrid Network Monitoring and Troubleshooting
Verify service identity
Ensure Service A is really talking to Service B, not an imposter
Lesson 1618Mutual TLS (mTLS) Fundamentals
Version compatibility
Add-ons are tested with specific EKS versions, preventing incompatibility issues
Lesson 1469EKS Add-ons Overview
Version constraints
Specify ranges like `version: "~12.
Lesson 1545Chart Dependencies
Version Control as Truth
Git becomes the authoritative source.
Lesson 1852What is GitOps?
Version control everything
Your `docker-compose.
Lesson 1059Compose Best Practices and Limitations
Version Control for Workflows
Your pipeline definitions are versioned alongside your code.
Lesson 1682What is GitHub Actions and Why Use It
Version history
Many object storage services can keep multiple versions automatically
Lesson 145Object Immutability ConceptsLesson 2288Key Versioning and Backward Compatibility
Version indicators
Plan for evolution
Lesson 569Event Types and Naming Conventions
Version management
Remove old versions of objects after newer ones exist
Lesson 158Object Lifecycle Policies
Version metadata
Tracks which Terraform version created the state
Lesson 775State File Contents and Structure
Version rollback friendly
Can revert to previous versions if needed
Lesson 2706Version-Based Cache Invalidation
Version semantically
Apply version numbers so teams can pin to stable releases while you safely evolve the library.
Lesson 2347Policy Libraries and Reusability
Version your layers
Treat layers like immutable releases—create new versions rather than overwriting
Lesson 507AWS Lambda: Layers and Dependencies
Version your secrets
so you can coordinate rotation across services
Lesson 2279Secrets Rotation in Containers
Version-controlled policies
tracked in Git alongside your infrastructure code
Lesson 2335Introduction to Compliance as Code
Version-controlled rollback
is the simplest: since your infrastructure code is in version control (remember lesson 710?
Lesson 720Rollback Strategies
Versionable
Track changes in Git, just like application code
Lesson 684What is Infrastructure as Code?
Versioned URLs
No invalidation needed, infinite caching possible, but requires build-time tooling and HTML updates
Lesson 2675Cache Invalidation Strategies
Versioned URLs (Cache Busting)
Lesson 2675Cache Invalidation Strategies
Versioning and Rollback
Helm tracks every deployment as a "release" with a version number.
Lesson 1520What is Helm and Why Use It?
Versioning history
and deprecation notices
Lesson 2931API Discovery and Documentation
Vertical partitioning
splits a table by *columns*.
Lesson 455Partitioning and Sharding Strategies
Vertical Pod Autoscaler (VPA)
adjusts the CPU and memory requests/limits of *existing* pods.
Lesson 1455Vertical Pod Autoscaler (VPA) Basics
Vertical scaling
Train your chef to cook faster, give them better equipment, expand the kitchen—make the single kitchen more capable
Lesson 39Scalability: Vertical vs Horizontal ScalingLesson 2692Google Cloud Memorystore
Vertical Scaling (Scaling Up)
means increasing the power of your existing resource.
Lesson 39Scalability: Vertical vs Horizontal Scaling
VictorOps
(now Splunk On-Call) emphasizes collaborative incident timelines and real-time chat integration, helping distributed teams coordinate during active incidents.
Lesson 2132Incident Management Tools
Video encoding
and media transcoding
Lesson 67Compute Optimized Instance Types
Video streaming
where initial buffering requires bursts, then steady playback
Lesson 2745Token Bucket Algorithm
View version history
to see exactly what changed
Lesson 373Policy Versioning and Change Management
Viewers
can browse the catalog but cannot create resources
Lesson 2933RBAC and Portal Access Control
Violates least privilege
You're giving yourself more permissions than you need for routine work
Lesson 339Root Account and Administrative Access
Virtual appliances
deployed in cloud VPCs that terminate SD-WAN tunnels
Lesson 2209SD-WAN Integration with Cloud
Virtual Machine (VM)
is a software-based emulation of a physical computer.
Lesson 51What is a Virtual Machine?
Virtual network level
Capture everything in your VPC
Lesson 213Network Security Logging and Monitoring
Virtual Networks
Private connectivity from your Azure VMs and services
Lesson 2691Azure Cache for Redis
Virtual Private Gateway
– The cloud provider's VPN endpoint attached to your VPC
Lesson 2198Site-to-Site VPN Fundamentals
Virtual storage
(disk space)
Lesson 51What is a Virtual Machine?
Virtualization
allowed one physical server to run multiple "virtual machines" (VMs)—isolated computer environments sharing the same hardware.
Lesson 2The Evolution of Computing Models
Virtually unlimited capacity
– no pre-provisioning
Lesson 2630Object Storage as Data Lake Foundation
VirtualService
is Istio's primary configuration resource for controlling how requests are routed to services.
Lesson 1581VirtualService FundamentalsLesson 1583Gateway Resource for Ingress
VirtualServices
and **DestinationRules**—you specify traffic weights in the VirtualService routing rules.
Lesson 1605Traffic Splitting and Weighted Routing
Visibility gaps
Traditional network security tools can't see inside encrypted traffic
Lesson 1617Service Mesh Security Overview
Visibility timeout too short
Message becomes visible again while still processing, causing duplicates.
Lesson 2713Message Visibility and Acknowledgment
Visual clarity
– Jenkins displays each stage in the UI, making progress immediately visible
Lesson 1786Stages and Steps Organization
Visual storytelling
Transform complex PromQL queries into intuitive graphs, heatmaps, and gauges
Lesson 1991Introduction to Grafana and Its Role in Observability
Visual Weight
Place the most critical metrics (error rates, system health, SLO burn rate) at the top or center where eyes naturally land first.
Lesson 2101Information Hierarchy and Layout
Visualizations
Display your KQL query results as charts, grids, graphs, or heatmaps.
Lesson 678Azure Monitor WorkbooksLesson 2028Kibana Dashboard Creation
Visualize trends
over daily, weekly, or monthly periods
Lesson 2177Google Cloud Cost Management
VLAN Attachment
A logical connection that associates a VLAN ID with a specific VPC network.
Lesson 2206Interconnect VLAN Attachments
VLAN attachments
(also called **VLAN connections**) to establish Layer 3 connectivity.
Lesson 2219Cloud Interconnect VLAN Attachments
VLAN connections
) to establish Layer 3 connectivity.
Lesson 2219Cloud Interconnect VLAN Attachments
VLANs
(Virtual Local Area Networks) to divide networks into zones—think of it like drawing borders between neighborhoods.
Lesson 2391Micro-Segmentation vs Traditional Segmentation
VM instances
Identical VMs created from the same base image
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
VM Scale Set
is a group of identical, load-balanced virtual machines that Azure can automatically increase or decrease based on rules you define.
Lesson 107Azure VM Scale Sets Introduction
VM size and image
The template for all instances
Lesson 321Azure Virtual Machine Scale Sets (VMSS) Fundamentals
Volume and velocity
High throughput (thousands to millions of events per second) demands different infrastructure than batch systems.
Lesson 2600What is Streaming Data?
Volume availability
Are required storage volumes accessible from this node?
Lesson 1104Scheduler: Pod Placement Logic
Volume binding mode
controls this timing through the StorageClass configuration.
Lesson 1305Volume Binding Modes
Volume Cloning
Create new volumes from snapshots to duplicate environments — perfect for testing, development, or scaling infrastructure.
Lesson 131Volume Snapshots
Volume discounts
that apply across aggregated usage (e.
Lesson 2147Multi-Account Cost Consolidation
Volume Mounts
When you mount a ConfigMap as a volume, Kubernetes *eventually* syncs the updated content to the Pod's filesystem (typically within a minute or two).
Lesson 1253ConfigMap Update Behavior and Pod RestartLesson 1266Mounting Secrets as VolumesLesson 2272Kubernetes Secrets Overview
Volume selectors and labels
let you create rules that ensure a PVC binds only to PVs with specific characteristics.
Lesson 1300Volume Selectors and Labels
Volume type changes
Switch between performance tiers without detaching.
Lesson 133Volume Resizing and Modification
Volume Utilization
How much of your volume's capacity is actually being used.
Lesson 136Volume Monitoring and Metrics
Volume-based discounts
Higher commitments = steeper discounts (often 5-30% off list prices)
Lesson 2166Discount Negotiation and EDP
volumes
for production data persistence; use **bind mounts** for development convenience and specific host-path requirements.
Lesson 1038Bind MountsLesson 1039tmpfs MountsLesson 1287Storage Challenges in ContainersLesson 1288Kubernetes Storage Abstractions
VolumeSnapshot
is your actual snapshot request.
Lesson 1320Volume Snapshots with CSI
VolumeSnapshotClass
defines *how* snapshots are created—similar to how StorageClass defines how volumes are provisioned.
Lesson 1320Volume Snapshots with CSI
VolumeSnapshotContent
represents the actual snapshot stored in your underlying storage system.
Lesson 1320Volume Snapshots with CSI
VPA evicts pods
to apply new resource requests, which HPA interprets as pods disappearing
Lesson 1457VPA and HPA Interaction
VPC configuration
– Functions in VPCs experience additional networking setup time
Lesson 2543Cold Start Fundamentals
VPC connection
lets your function communicate with resources inside your private network—like RDS databases in private subnets, internal APIs, or on-premises systems via VPN.
Lesson 490Function Network Configuration
VPC endpoints
create a private "doorway" directly from your VPC to specific AWS services, keeping traffic entirely within the AWS network backbone.
Lesson 220VPC Endpoints for AWS ServicesLesson 1081Network Security for RegistriesLesson 2722Queue Security and Access Control
VPC networking
for secure communication
Lesson 1475GKE Overview and Architecture
VPC peering
, you enable two boolean settings on the peering connection itself:
Lesson 225DNS Resolution Between VPCsLesson 516Google Cloud Functions: VPC Connectivity and Networking
VPC Traffic Mirroring
is like installing a hidden camera on your network highway.
Lesson 229VPC Traffic Mirroring
VPC-native clusters
as the modern networking standard.
Lesson 1480GKE Networking Fundamentals
VPC-native networking
with automatically created subnets
Lesson 1477Creating a GKE Standard Cluster
VPN
Low upfront cost, pay mainly for bandwidth usage
Lesson 2197VPN vs Dedicated Connections
VPN Connections
use encrypted tunnels over the public internet.
Lesson 2197VPN vs Dedicated Connections
VPN Tunnel Configuration
The tunnel itself needs specific parameters:
Lesson 2199VPN Gateway Configuration
VS Code extension
provides real-time feedback, autocomplete, and error checking as you write.
Lesson 922Bicep Tooling and CLI
Vulnerabilities
are weaknesses in your configuration or code that *could* be exploited—unpatched systems, overly permissive IAM policies, or exposed storage buckets.
Lesson 2860Threat Detection Fundamentals
Vulnerability Detection
Built-in scanners identify common security issues like publicly exposed storage buckets, overly permissive IAM roles, weak SSL certificates, and outdated software versions on VM instances.
Lesson 2864Google Security Command Center
Vulnerability status
Remove images with critical CVEs
Lesson 1082Image Retention and Lifecycle Policies

W

W3C Trace Context
standard defines HTTP headers that carry trace information:
Lesson 2070Context Propagation StandardsLesson 2095Azure Monitor Application Insights
WAF logs
(covered in lesson 2374) to identify blocked requests that shouldn't have been.
Lesson 2376WAF Tuning and False Positive Management
WAF policies
as the primary configuration object.
Lesson 2370Azure WAF Overview
WAFs
ask: "Does this HTTP request contain SQL injection attempts?
Lesson 2364What is a Web Application Firewall (WAF)
Wait event analysis
Understand if slowness comes from locks, disk I/O, or network latency
Lesson 456Performance Insights and Diagnostics Tools
Wait Events
Understand *why* queries are slow—are they waiting for disk reads?
Lesson 412Performance Insights
Wait for callback
Frees resources but adds coordination overhead
Lesson 2552Function Chaining and Orchestration Efficiency
Wait for replication
to catch up completely (zero lag)
Lesson 2826Database Cutover Planning
Wait for slow-starting applications
before sending them traffic
Lesson 1418Understanding Kubernetes Health Checks
WaitForFirstConsumer
mode, Kubernetes waits until a Pod that needs the PVC is being scheduled.
Lesson 1305Volume Binding Modes
Waiting Period
– AWS enforces 7–30 days, Azure 90 days (soft-delete), GCP 24 hours minimum.
Lesson 2291Key Deletion and Recovery
waits
for the VPC data source to complete first, creating an implicit dependency chain.
Lesson 817Data Source Patterns and DependenciesLesson 2570Service Communication Overview
Waits indefinitely
or until an optional timeout expires
Lesson 1844Manual Approval Actions
WAN federation
capabilities let you create a unified service mesh across geographically distributed infrastructure without complex overlay networks.
Lesson 1593Consul Service Mesh Fundamentals
Warm Standby Pattern
is a disaster recovery strategy where you run a **continuously operational but scaled-down version** of your production environment in a DR region.
Lesson 2433Warm Standby Pattern
Warm Storage
(sometimes called Infrequent Access) suits data you need occasionally—maybe monthly:
Lesson 118Hot, Warm, and Cold Storage Tiers
Warm-up time
is the grace period you configure to tell Auto Scaling: "This new instance needs X seconds to fully initialize before it can handle its full workload.
Lesson 296Warm-up and Warm Pool Concepts
Warm/Infrequent Access
For data accessed monthly rather than daily.
Lesson 148Storage Classes Introduction
Warmup time
tells Auto Scaling: "Don't count this new instance's metrics for X seconds after launch.
Lesson 303Cooldown Periods and Warmup
Warning (P2/P3)
Degraded performance or conditions that *might* become critical if left unattended.
Lesson 649Alert Severity and Prioritization
Waste identification
Find untagged or orphaned resources
Lesson 2141Tagging Strategy for Cost Allocation
Waste percentage
reveals idle resources, orphaned volumes, or oversized instances.
Lesson 2988Optimization Metrics and KPIs
Watch logs stream live
during execution—perfect for debugging
Lesson 1694Workflow Status and Logs
Watch the size limits
Total unzipped size (function + all layers) must stay under 250 MB
Lesson 507AWS Lambda: Layers and Dependencies
Watches
the Kubernetes API for Ingress resources and Services
Lesson 1221Ingress Controller Architecture
Waterfall timeline
displays span relationships and bottlenecks visually
Lesson 2094Google Cloud Trace
Watermarks
are the mechanism streaming systems use to track progress through event time and decide when it's safe to consider a time window "complete.
Lesson 2606Watermarks and Late DataLesson 2625Batch Processing Optimization
Wave 1
typically includes pilot applications: low-complexity, non-critical workloads with minimal dependencies.
Lesson 2812Migration Wave Planning and Execution
Wave 2-N
progressively increase in complexity, incorporating lessons learned.
Lesson 2812Migration Wave Planning and Execution
Wave 3 - Complex/Dependent
Applications with tight coupling to legacy systems, requiring refactoring or extensive testing.
Lesson 2801Prioritizing Applications for Migration
Weave Net
– Simple to set up, good for smaller clusters
Lesson 1244NetworkPolicy CNI Requirements
Web ACLs
(Access Control Lists): The top-level container that defines your entire filtering logic
Lesson 2368AWS WAF Fundamentals
Web Activity
Calls external REST endpoints
Lesson 2650ADF Pipeline Activities and Control Flow
Web Application Firewall (WAF)
is a specialized security layer that sits between users and your web application, inspecting HTTP/HTTPS traffic to block malicious requests before they reach your application code.
Lesson 2364What is a Web Application Firewall (WAF)
Web dashboards
might need rich, nested data structures
Lesson 2577Backend for Frontend (BFF) Pattern
Web servers
serving moderate traffic
Lesson 66General Purpose Instance Types
Web Tier Security Group
Contains all web servers
Lesson 205Security Group Chaining and References
WebSocket
is a protocol that keeps a connection open between client and server, allowing both sides to push messages whenever needed—no repeated polling required.
Lesson 254WebSocket and HTTP/2 Support
Week-over-week overlays
Compare current Monday to last Monday
Lesson 2104Time Series and Temporal Context
Weekly
Scan for anomalies and quick wins (idle resources, oversized instances)
Lesson 2167Continuous Optimization Process
Weekly backups (Father)
Keep for 1–3 months
Lesson 2420Backup Retention Policies
Weekly patterns
Lower usage on weekends
Lesson 302Predictive Scaling Fundamentals
Weekly rotations
Engineers rotate weekly (or bi-weekly) shifts.
Lesson 2127On-Call Rotation Structures
Weighted
Assigns more traffic to higher-capacity instances
Lesson 2464Stateless HA Patterns: Load Balancing
Weighted Distribution
Allows you to assign different traffic percentages to instances, useful during canary deployments or when instances have different capacities.
Lesson 1569Load Balancing in Service Mesh
What action
(transition to a different storage class, expire/delete, delete non-current versions)
Lesson 158Object Lifecycle Policies
What capacity
to set (minimum, maximum, and/or desired capacity)
Lesson 301Scheduled Scaling Actions
What changed
(added, modified, or deleted resources)
Lesson 710Version Control for Infrastructure Code
What depends on what
(ensure database deploys before application)
Lesson 1923Kustomize Controller Fundamentals
What didn't
Timeouts, missing credentials, unclear runbook steps, coordination gaps
Lesson 2911Post-Test Analysis and Improvement
What filters
to apply (tags missing, encryption disabled, public access enabled)
Lesson 2342Cloud Custodian for AWS Compliance
What it is
The database engine encrypts the entire database storage layer automatically.
Lesson 2301Database Encryption Patterns
What needs improvement
Gaps in visibility, slow response procedures
Lesson 2874Post-Incident Review and Improvement
What permissions
Granular operations like `Get`, `List`, `Set`, `Delete` for secrets; `Encrypt`, `Decrypt`, `Sign` for keys
Lesson 2315Azure Key Vault Access Policies and RBAC
What to monitor
(health status of deployed resources)
Lesson 1923Kustomize Controller Fundamentals
What type
of data source it is (Prometheus, InfluxDB, CloudWatch, etc.
Lesson 1994Data Sources in Grafana
What worked well
Successful containment steps, effective team coordination
Lesson 2874Post-Incident Review and ImprovementLesson 2911Post-Test Analysis and Improvement
What-If
goes one step further—it shows you *exactly* what will change when you deploy.
Lesson 903Template Validation and What-If Operations
What's the blast radius
Understand impact if a service fails
Lesson 2067Service Maps and Dependency Graphs
What's the distribution policy
(Weighted routing for A/B tests)
Lesson 273Global Load Balancing and DNS-Based Routing
What's wrong
Clear symptom description
Lesson 2128Alerting Best Practices for Incidents
When budget depletes
Freeze risky releases, prioritize stability work, and investigate reliability issues
Lesson 2118The Concept of Error Budgets
When budget remains
Teams can deploy new features, experiment, and take calculated risks
Lesson 2118The Concept of Error Budgets
When it's dangerous
SSH (port 22), RDP (port 3389), databases (port 3306, 5432), or internal APIs should **never** allow `0.
Lesson 215Common Network Security Mistakes
When it's okay
Public-facing web servers (ports 80/443) legitimately need this.
Lesson 215Common Network Security Mistakes
When to use it
Quick setups, development environments, or legacy applications that don't support modern methods.
Lesson 407Database Authentication Methods
Where are the bottlenecks
Edges show latency and error rates
Lesson 2067Service Maps and Dependency Graphs
Where to find manifests
(which Source to use)
Lesson 1923Kustomize Controller Fundamentals
Whether
to prune deleted resources automatically
Lesson 1934Kustomize Controller
Which Auto Scaling group
to modify
Lesson 301Scheduled Scaling Actions
Which notification channel
receives the alert (PagerDuty for critical, email for warnings)
Lesson 649Alert Severity and Prioritization
Which objects to monitor
(all objects, or just certain prefixes/suffixes)
Lesson 168Event Notifications
Which pods to evict
It selects the lowest-priority pods first, evicting only what's necessary.
Lesson 1371Pod Preemption Behavior
Which resources
to check (EC2 instances, S3 buckets, RDS databases, etc.
Lesson 2342Cloud Custodian for AWS Compliance
Which secret(s) to fetch
(by key/path in the external store)
Lesson 1280ExternalSecret Resource
Which SecretStore to use
(the connection to your external provider)
Lesson 1280ExternalSecret Resource
Which servers are healthy
(Health check integration)
Lesson 273Global Load Balancing and DNS-Based Routing
Whitelist (geo-allowing)
Only these countries can access
Lesson 603Geographic Restrictions
Whitelist specific parameters
– Only `version` and `locale` affect the cache key; ignore tracking params like `utm_source`
Lesson 2678Query String and Cookie Handling
Whitelist/blacklist parameters
Include only meaningful parameters (ignore tracking IDs like `?
Lesson 607Cache Key Normalization
Whitelisting
is the "allow-only" approach—you specify which countries *can* access your content, and everyone else is denied.
Lesson 592Geographic Restrictions and Content Blocking
Whitespace
at line beginnings is ignored
Lesson 1000Dockerfile Structure and Parsing
Who changed it
(author and committer)
Lesson 710Version Control for Infrastructure Code
Who decides
Which team or role has authority to invoke the policy
Lesson 2120Error Budget Policies and Decision Making
Why it matters
Type 1 hypervisors offer better performance, security, and efficiency because they eliminate the extra operating system layer.
Lesson 52Hypervisors and Virtualization TypesLesson 284Load Balancer Security Best Practices
Why this matters
When engineering scales infrastructure, finance needs to know if margins improve or erode.
Lesson 2953Unit Economics in Cloud
Why use subqueries
Sometimes you need to calculate a metric over a sliding window, then perform another aggregation or function on *that result*.
Lesson 1975Subqueries and Complex Expressions
Widgets
are the building blocks of dashboards.
Lesson 673CloudWatch Dashboards
Wildcards
help with partial matches:
Lesson 2030Kibana Query Language (KQL)
Windowing
Flink provides the richest event-time window operators; Kafka Streams offers solid time-based windows; Spark uses micro-batch intervals
Lesson 2611Stream Processing Frameworks
Windowing decisions
Should you count revenue by when sales happened or when you learned about them?
Lesson 2604Event Time vs Processing Time
Wireshark
is a graphical tool that excels at analyzing captured packets.
Lesson 2184Network Packet Capture Tools
With cross-zone
All 6 targets receive ~16.
Lesson 259Cross-Zone Load Balancing for ALBs
With custom values file
`helm install myapp .
Lesson 1536Values Files and Default Values
With references
Your database security group rule says "allow traffic from the web-tier-security-group.
Lesson 205Security Group Chaining and References
Without cross-zone
Each zone gets ~33% of traffic.
Lesson 259Cross-Zone Load Balancing for ALBs
Without references
You'd need to constantly update database security group rules with new web server IPs—tedious and error-prone.
Lesson 205Security Group Chaining and References
Work order preservation
First-in, first-out task execution
Lesson 551Queue vs Topic Pattern
Workarounds
Temporary solutions or vendor-specific quirks
Lesson 717Documentation and Comments
Worker crashes
If your consumer dies mid-processing, the visibility timeout ensures the message automatically returns to the queue for retry.
Lesson 554Message Visibility and Timeouts
Workers KV
a globally distributed key-value storage system.
Lesson 616Cloudflare Workers
Workflow automation
Chain multiple processing steps together
Lesson 168Event Notifications
Workflow orchestration
is a control plane that coordinates multiple serverless functions, managing:
Lesson 2515Workflow Orchestration FundamentalsLesson 2723Delay Queues and Message Timers
Workflow orchestration tools
act as conductors for your data pipelines, defining task dependencies as code and automatically triggering jobs in the correct order.
Lesson 2626Workflow Orchestration Tools
Workflow-level variables
apply to all jobs and steps:
Lesson 1693Environment Variables in Workflows
Workflows
let you define these multi-step processes, while **triggers** determine when and how jobs execute.
Lesson 2648Glue Job Triggers and Workflows
Workload Identity Patterns
Let applications (not just humans) authenticate across clouds using service accounts
Lesson 395Cross-Provider IAM Federation
Workload migration
VMs and containers move between locations
Lesson 2195Hybrid Cloud Connectivity Overview
Workload variability
is high (spiky traffic, dev/test environments)
Lesson 2536Aurora Serverless
Workload-level
Fine-grained control per service
Lesson 1621Enabling mTLS in Istio
Works across distributed caches
Multiple cache nodes don't need coordination
Lesson 2706Version-Based Cache Invalidation
Workspace Cleanup Plugin
Automatically deletes workspace contents before or after builds
Lesson 1780Workspace Management and Build Artifacts
Workspace data
Usually excluded (regenerated on next build)
Lesson 1808Backup and Disaster Recovery
Workspace separation
Some IaC tools let you maintain separate state files for each environment while using the same configuration code
Lesson 712Environment Separation Strategies
Workspaces
in Terraform Cloud are isolated environments that each contain their own state file, variables, and execution history.
Lesson 836Terraform Cloud for Team Collaboration
Workspaces or directory structure
help organize multiple environments without code duplication while keeping state isolated.
Lesson 831Scaling Challenges and Patterns
Write automated tests
using your chosen framework
Lesson 2346Compliance Testing and Validation
Write Model (Commands)
A user action creates a command (e.
Lesson 574CQRS Pattern with Events
Write once, deploy anywhere
Your containerized app moves between clouds with minimal changes
Lesson 2765Container-Based Portability
Write or modify
your infrastructure code
Lesson 718Change Management and Planning
Write results
back to your target storage
Lesson 2647Glue ETL Script Development
Write Separation
Write operations still target the primary, often through a separate endpoint
Lesson 2481Read Replica Scaling
Write throughput
How fast your database can accept new data or updates
Lesson 454Database Storage Performance
Write-Back
) pattern writes data to the cache immediately and returns success to the client, while persisting that data to the underlying data store asynchronously in the background.
Lesson 2699Write-Behind (Write-Back) Caching Pattern
Write-Behind
Data is written to cache immediately and asynchronously persisted to the database later, improving write performance but risking data loss.
Lesson 2594Distributed Caching StrategiesLesson 2699Write-Behind (Write-Back) Caching Pattern
Writing a template
that declares this resource with its current configuration
Lesson 891Stack Import Operations

X

X-axis
Migration complexity/risk (low to high)
Lesson 2801Prioritizing Applications for Migration

Y

Y-axis
Business value/ROI (low to high)
Lesson 2801Prioritizing Applications for Migration
YAML descriptor files
(`catalog-info.
Lesson 2928Software Catalog in Backstage
YAML manifests
declarative configuration files that describe exactly what you want Kubernetes to create.
Lesson 1147Creating Pods with YAML Manifests
Yellow ball
Unstable build (tests failed but build completed)
Lesson 1782Jenkins UI Navigation and Monitoring Builds
Yellow/Amber
Warning state (CPU 70-85%, response time 200-500ms)
Lesson 2106Threshold Indicators and Alerts
You (Customer)
Secure what you put **in** the cloud (data encryption, access policies, application code, user authentication, key management decisions)
Lesson 2322Introduction to Compliance in Cloud
You both modify infrastructure
Your state files diverge, causing conflicts and potential data loss
Lesson 783Why Remote State Matters
You can compare
what changed between v3 and v4
Lesson 373Policy Versioning and Change Management
You can roll back
to a known-good state instantly
Lesson 373Policy Versioning and Change Management
You manage
operating systems, applications, data, security configurations, and patches.
Lesson 16Comparing IaaS, PaaS, and SaaS ResponsibilitiesLesson 1491AKS Architecture and Control Plane Management
You need credentials
Unlike SSH keys, you'll typically use a username and password
Lesson 58Windows VMs and RDP Access
You secure
Operating system patches, network configuration, firewall rules, applications, data, identity management, encryption
Lesson 2842Shared Responsibility Model
Your application code
can now access AWS services without managing keys
Lesson 353IAM Roles for Resources
Your application is outdated
and would require major refactoring anyway
Lesson 2795Repurchase Strategy
Your applications
consume the resulting Secrets normally via environment variables or volume mounts
Lesson 2277Sealed Secrets for GitOps
Your data
classification and protection
Lesson 2329Cloud Provider Compliance Certifications
Your function code
(the handler file you wrote)
Lesson 472Function Packaging and Deployment
Your layers
→ Custom modifications you add on top
Lesson 978Base Images and Parent Layers
Your on-premises edge
Your routers connect to the ExpressRoute circuit
Lesson 2215Azure ExpressRoute Fundamentals
Your workload isn't moving
Multi-region within one cloud meets your needs
Lesson 2777Lock-In vs Portability Trade-offs

Z

Zero administration
No patching, no instance sizing decisions, no manual scaling policies for most operational concerns.
Lesson 2530Serverless Database Concepts
Zero code changes
Adding logging, metrics collection, or TLS encryption doesn't require modifying application code.
Lesson 2599Sidecar Pattern for Cross-Cutting Concerns
Zero data loss
and **strong consistency**.
Lesson 2479Synchronous Replication Trade-offs
Zero invalidation failures
Can't fail to invalidate what you're not trying to delete
Lesson 2706Version-Based Cache Invalidation
Zero Maintenance
The cloud provider handles everything: servers, storage, networking, application updates, security patches, and backups.
Lesson 15Software as a Service (SaaS) Overview
Zero standing privileges
Credentials exist only during active use
Lesson 2262Dynamic Secrets Fundamentals
Zero Trust
principles to workloads: every service must prove its identity before accessing resources, and that identity determines precisely what it can do.
Lesson 2853Service Identity and Workload AuthenticationLesson 2863Azure Security Center and SentinelLesson 2864Google Security Command Center
Zero Trust Architecture
principles—never trust, always verify—and extends **Identity as the Perimeter** by making authentication the prerequisite for network visibility.
Lesson 2400Software-Defined Perimeter (SDP)
Zero Trust Architecture (ZTA)
flips this assumption: *no user, device, or service is trusted by default*, regardless of location.
Lesson 2392Zero Trust Architecture Principles
Zero Trust principles
you've learned.
Lesson 2399Context-Aware Access Controls
Zero-downtime migrations
applications keep writing to the source while the target stays synchronized
Lesson 2825Continuous Data Replication for Databases
Zero-downtime priority
Lower `maxUnavailable`, higher `maxSurge`
Lesson 1189DaemonSet Update Parameters
Zero-downtime updates
Route traffic away from instances being updated
Lesson 2457Load Distribution for Availability
ZIP archive
or **container image**.
Lesson 472Function Packaging and Deployment
Zonal MIG
All instances run in a single zone (e.
Lesson 326GCP Managed Instance Groups (MIG) Overview
Zone affinity
Restrict volumes to zones where your application runs
Lesson 1313StorageClass Topology Constraints
Zoom in/out
Click-drag on a panel to focus on a time window
Lesson 2000Annotations and Time Range Controls