About Us
Resources
Blog
Contact
Join waiting list
Return to explore
Glossary
#
Access Control Lists (ACLs)
Lists used by routers or firewalls which dictate whether packets are permitted or denied access based on criteria such as source IP address or port number destination port number etc.; also referred to as packet filter lists .
#
Additional Lambda Functionality
A version of an AWS Lambda layer that contains additional code and data used to extend the functionality of a Lambda function.
#
Amazon Machine Image (AMI)
An Amazon Machine Image is a pre-configured environment used to create and run an EC2 instance.
#
Application Packaging
The process of packaging applications into isolated containers so they can be easily deployed across different environments without affecting their performance or consistency.
#
Auto Scaling Groups
An AWS service that automatically adds or removes EC2 instances from a group based on user-defined policies.
#
Block Storage Solution
A persistent block storage solution for use with EC2 instances.
#
CIDR
Classless Inter-Domain Routing; a notation used to define a range of IP addresses, e.g., 192.168.1/24 represents 256 IPv4 addresses between 192.168.1/0 and 192.168.1/255, inclusive).
#
CloudWatch Events Rule
Triggers an automated response when a specified condition is met, such as when application resources exceed predetermined thresholds or when a new version of an application is released.
#
Cluster Autoscaler (CA)
An open source tool used by Kubernetes clusters running on AWS that automatically scales up or down node groups based on application resource requirements.
#
Compute Capacity Service
A web service that provides secure, resizable compute capacity in the cloud.
#
DNS Record
Domain Name System (DNS) records are used to determine which server holds the data for a domain name.
#
EC2 Cost Savings
Prepay for one year or three years of EC2 instance usage, providing cost savings over On-Demand pricing models.
#
EC2 On-Demand Instances
On-demand EC2 instances that allow customers to name their own price and bid on spare compute capacity.
#
EC2 Resource Auto Scaling
An auto scaling group (ASG) is a collection of AWS EC2 instances that can be automatically scaled up or down based on user defined criteria.
#
EKS Nodegroup
A collection of Amazon EC2 instances, managed by the Amazon EKS service, that run the Kubernetes worker nodes to enable applications to be deployed.
#
Elastic IP Address
A static public IPv4 address associated with an AWS account, which can be dynamically allocated to a running instance or ENI.
#
Elastic Load Balancer (ELB)
A service that distributes incoming application traffic across multiple targets, such as Amazon EC2 instances.
#
Failed to Launch/Start/Stop/Terminate/Reachability Check
An error occurred during launch, start, stop, terminate or reachability check operations on the EC2 Instance respectively
#
HTTP Request Tests
An algorithm which sends an HTTP request to a given URL and waits for a response from that URL.
#
Health Check
A process used to evaluate the health of the registered target or target group.
#
Healthy Threshold Count
The number of consecutive successful health checks before declaring a target healthy.
#
Hostname Verification
The process of verifying whether hostname can be resolved correctly or not by querying DNS servers associated with that hostname.
#
IAM Roles
Roles defined by the user with specific permissions allowing access between different services within AWS.
#
Inbound Rules
Permissions that specify what type of traffic is allowed to enter an AWS EC2 instance.
#
Infrastructure Management Method
A method of managing and provisioning infrastructure using machine-readable configuration files instead of manual processes.
#
Interval Timeout/Period
The time between each health check request in seconds.
#
Isolated Virtual Network
A virtual network dedicated to the user’s AWS account, allowing for complete control over the virtual networking environment.
#
Key Pair
A cryptographic key pair generated by AWS which is used to securely connect to an EC2 instance.
#
Kubernetes Application Units
Pods are small units of compute resources in Kubernetes, consisting typically of one or more containers deployed together on one host.
#
Kubernetes Cluster Grouping
A node group is a cluster of EC2 instances running the same version of the Kubernetes software and configured with the same instance type, subnets, and other configuration parameters.
#
Kubernetes Configuration Management
In AWS EKS, ConfigMaps are key-value data stores used by applications running inside pods to store configuration information such as credentials or database connection strings.
#
Kubernetes Deployment Management
A deployment controller watches for changes in pod definitions and ensures those changes are applied to all nodes in the cluster, so that all nodes have identical definitions for each pod running in them.
#
Kubernetes Management Service
Amazon Elastic Container Service for Kubernetes (Amazon EKS) is an AWS managed service that allows users to run Kubernetes clusters.
#
Kubernetes Service Access
In AWS EKS, service accounts provide authentication credentials used by applications running inside pods to access other AWS services such as S3 buckets or DynamoDB tables.
#
Launch Template
A JSON-formatted template used to create multiple identical EC2 instances with consistent configurations and settings.
#
Logical Resource Separation
Namespaces allow you to logically separate resources within a single cluster into multiple virtual clusters called namespaces which can then be
#
Network ACLs (NACLs)
A stateless firewall for filtering both inbound and outbound network traffic at the subnet level.
#
Network Security Layer
An optional layer of security for controlling access to networks based on pre-defined rules.
#
Node Group Auto Scaling
The cluster autoscaler is a component that automatically adjusts the size of your node groups according to their current needs and availability requirements.
#
Outbound Rules
Permissions that specify what type of traffic is allowed to leave an AWS EC2 instance.
#
Ping Tests
A tool used to test network latency between two points on a network, usually from a client’s computer to another machine on the same network.
#
Pre-Configured Environment
An Amazon Machine Image is a pre-configured environment used to create and run an EC2 instance.
#
Protocols
Standard language which computers use when exchanging data; commonly used protocols in relation to AWS security groups include TCP, UDP, ICMP and SSH etc..
#
Route53 Health Check
A service provided by AWS for monitoring the status of web applications and services.
#
SSL Certificate Monitoring
The process of verifying whether an SSL certificate is valid or not, as well as if it needs to be renewed or replaced.
#
Security Groups
A virtual firewall that controls inbound and outbound traffic for AWS EC2 instances.
#
Spot Instances
An Amazon EC2 instance type that allows users to bid for spare computing capacity at discounted prices compared to On-Demand Instances.
#
Status Page
A web page that displays information about the health of an application or service.
#
Subnet Traffic Rules
Sets of rules that determine which types of traffic are allowed in and out of a subnet.
#
Subnets
A segmented part of an IP network having its own address range, routing rules, and subnet mask; used by routers to route packets within a larger network such as the Internet or a private cloud environment like AWS.
#
TCP Connection Tests
An algorithm which establishes connections between two computers with TCP protocol in order to exchange data packets and measure connection latency times.
#
Target Group
A collection of targets, such as Amazon EC2 instances, that are associated with a load balancer and receive traffic from the load balancer.
#
Timeout Duration
The length of time, in seconds, during which no response means an unhealthy state for a target or target group.
#
Traffic Distribution Service
Automatically distribute incoming traffic between multiple EC2 instances across multiple Availability Zones for increased fault tolerance and performance optimization.
#
Unhealthy Threshold Count
The number of consecutive failed health checks before declaring a target unhealthy.
#
User Access Management
An AWS service used for managing user access permissions for services such as S3 buckets, EC2 instances, etc.
#
VPC Internet Access
A type of AWS gateway that enables communication between instances in a VPC and the public internet.
#
VPC Network Address Translation
Used to enable instances in private subnets to connect securely and privately with external networks such as the internet.
#
VPC Routing
Stores routing information of a VPC, enabling traffic flow into and out of subnets within a virtual private cloud (VPC).
#
VPC Subdivision
A logical subdivision of an IP network, consisting of hosts connected to the same physical segment.
#
Virtual Firewall
A set of firewall rules that control inbound and outbound traffic to resources within the VPC.
#
Virtual Network Interface
A virtual network interface that allows an Amazon EC2 instance to communicate with other networks within the same region, including VPCs.