[{"data":1,"prerenderedAt":848},["ShallowReactive",2],{"navigation":3,"docs-navigation-en":306,"\u002Fen\u002Fdocs\u002Fglossary":336,"\u002Fen\u002Fdocs\u002Fglossary-surround":844},[4,8,12,16,20,24,28,32,36,40,44,48,52,56,60,64,68,72,76,80,84,88,92,96,100,104,108,112,116,120,124,128,132,136,140,144,148,152,156,160,164,168,172,176,180,184,188,192,196,200,219,231,262,299],{"title":5,"path":6,"stem":7},"Build and Deploy a Modern Website in 5 Minutes","\u002Fen\u002Fblog\u002Fbuild-with-loveable","en\u002F3.blog\u002F1.build-with-loveable",{"title":9,"path":10,"stem":11},"The Vercel Alternative for the German Mittelstand: Sovereign Hosting on Hetzner with lowcloud","\u002Fen\u002Fblog\u002Fdigital-sovereignty-lowcloud-vs-vercel-b2b","en\u002F3.blog\u002F10.digital-sovereignty-lowcloud-vs-vercel-b2b",{"title":13,"path":14,"stem":15},"Cloud Sovereignty Framework: How the EU Is Finally Making Cloud Sovereignty Measurable","\u002Fen\u002Fblog\u002Fcloud-sovereignty-framework","en\u002F3.blog\u002F12.cloud-sovereignty-framework",{"title":17,"path":18,"stem":19},"Avoiding Cloud Vendor Lock-in: What Real Sovereignty Means Technically","\u002Fen\u002Fblog\u002Fcloud-vendor-lock-in","en\u002F3.blog\u002F13.cloud-vendor-lock-in",{"title":21,"path":22,"stem":23},"Digital Sovereignty with Kubernetes: When Is Open Source Truly Sovereign?","\u002Fen\u002Fblog\u002Fkubernetes-digital-sovereignty","en\u002F3.blog\u002F14.kubernetes-digital-sovereignty",{"title":25,"path":26,"stem":27},"What Is DevOps as a Service and When Does It Actually Make Sense?","\u002Fen\u002Fblog\u002Fdevops-as-a-service","en\u002F3.blog\u002F15.devops-as-a-service",{"title":29,"path":30,"stem":31},"Cloud Sovereignty Governance: Why This Topic Belongs in the Boardroom, Not the Server Room","\u002Fen\u002Fblog\u002Fcloud-sovereignty-governance","en\u002F3.blog\u002F16.cloud-sovereignty-governance",{"title":33,"path":34,"stem":35},"PaaS vs. DaaS: What","\u002Fen\u002Fblog\u002Fpaas-vs-daas","en\u002F3.blog\u002F17.paas-vs-daas",{"title":37,"path":38,"stem":39},"Sovereign Cloud: Can SaaS Really Maintain Control Over Your Data?","\u002Fen\u002Fblog\u002Fsovereign-cloud-saas-data-control","en\u002F3.blog\u002F18.sovereign-cloud-saas-data-control",{"title":41,"path":42,"stem":43},"DevOps vs. DevOps as a Service – Which One Fits Your Team?","\u002Fen\u002Fblog\u002Fdevops-vs-devops-as-a-service","en\u002F3.blog\u002F19.devops-vs-devops-as-a-service",{"title":45,"path":46,"stem":47},"Docker Fundamentals -  Understanding Container Virtualization","\u002Fen\u002Fblog\u002Fhow-docker-works","en\u002F3.blog\u002F2.how-docker-works",{"title":49,"path":50,"stem":51},"The 7 Biggest DevOps Problems in SMBs – And How to Fix Them","\u002Fen\u002Fblog\u002Fdevops-problems-smb","en\u002F3.blog\u002F20.devops-problems-smb",{"title":53,"path":54,"stem":55},"PostgreSQL Helm Chart: How to Deploy Postgres on Kubernetes","\u002Fen\u002Fblog\u002Fpostgresql-helm-chart-kubernetes","en\u002F3.blog\u002F21.postgresql-helm-chart-kubernetes",{"title":57,"path":58,"stem":59},"Platform Engineering vs. DevOps – What","\u002Fen\u002Fblog\u002Fplatform-engineering-vs-devops","en\u002F3.blog\u002F22.platform-engineering-vs-devops",{"title":61,"path":62,"stem":63},"Cloud Act vs. GDPR: The Risk for EU Businesses","\u002Fen\u002Fblog\u002Fcloud-act-vs-gdpr","en\u002F3.blog\u002F23.cloud-act-vs-gdpr",{"title":65,"path":66,"stem":67},"Cut IT Costs with Automation: The Biggest Lever","\u002Fen\u002Fblog\u002Freduce-it-costs-automation","en\u002F3.blog\u002F24.reduce-it-costs-automation",{"title":69,"path":70,"stem":71},"NIS2 Compliance for DevOps Teams: What You Need to Do","\u002Fen\u002Fblog\u002Fnis2-compliance-devops","en\u002F3.blog\u002F25.nis2-compliance-devops",{"title":73,"path":74,"stem":75},"Self-Hosted EU Alternatives: Host LibreOffice & More","\u002Fen\u002Fblog\u002Fself-hosted-eu-alternatives","en\u002F3.blog\u002F26.self-hosted-eu-alternatives",{"title":77,"path":78,"stem":79},"DORA Compliance for DevOps: What the EU Resilience Act Means","\u002Fen\u002Fblog\u002Fdora-compliance-devops","en\u002F3.blog\u002F27.dora-compliance-devops",{"title":81,"path":82,"stem":83},"Cloud TCO: Hidden Costs AWS, Azure & GCP Don't Show You","\u002Fen\u002Fblog\u002Fcloud-tco-hidden-costs","en\u002F3.blog\u002F28.cloud-tco-hidden-costs",{"title":85,"path":86,"stem":87},"Data Residency vs. Data Sovereignty: What Really Matters","\u002Fen\u002Fblog\u002Fdata-residency-vs-data-sovereignty","en\u002F3.blog\u002F29.data-residency-vs-data-sovereignty",{"title":89,"path":90,"stem":91},"Self-Host n8n on Hetzner: Complete Docker Setup Guide","\u002Fen\u002Fblog\u002Fself-hosted-n8n-on-hetzner","en\u002F3.blog\u002F3.self-hosted-n8n-on-hetzner",{"title":93,"path":94,"stem":95},"Manual Deployments: An Underestimated Risk for SMBs","\u002Fen\u002Fblog\u002Fmanual-deployment-risks","en\u002F3.blog\u002F30.manual-deployment-risks",{"title":97,"path":98,"stem":99},"DevOps Tool Sprawl: How It Happens and How to Stop It","\u002Fen\u002Fblog\u002Fdevops-tool-sprawl","en\u002F3.blog\u002F31.devops-tool-sprawl",{"title":101,"path":102,"stem":103},"Kubernetes Monitoring: Using Logs and Metrics Effectively","\u002Fen\u002Fblog\u002Fkubernetes-monitoring-logs-metrics","en\u002F3.blog\u002F32.kubernetes-monitoring-logs-metrics",{"title":105,"path":106,"stem":107},"OB7 Case Study: Website Deployment Without Infrastructure Overhead","\u002Fen\u002Fblog\u002Fob7-case-study-lowcloud-deployment","en\u002F3.blog\u002F33.ob7-case-study-lowcloud-deployment",{"title":109,"path":110,"stem":111},"DevOps in SMBs: Why Missing Roles Become a Real Risk","\u002Fen\u002Fblog\u002Fmissing-devops-roles-smb","en\u002F3.blog\u002F34.missing-devops-roles-smb",{"title":113,"path":114,"stem":115},"Simplify Kubernetes Configuration: The Path to Human-Readable Cloud","\u002Fen\u002Fblog\u002Fsimplify-kubernetes-configuration","en\u002F3.blog\u002F35.simplify-kubernetes-configuration",{"title":117,"path":118,"stem":119},"Collaborative DevOps: How Modern Teams Build Cloud Apps Together","\u002Fen\u002Fblog\u002Fcollaborative-devops-teams","en\u002F3.blog\u002F36.collaborative-devops-teams",{"title":121,"path":122,"stem":123},"Knowledge Documentation in DevOps Teams: How to Actually Reduce Your Bus Factor","\u002Fen\u002Fblog\u002Fdevops-knowledge-documentation-bus-factor","en\u002F3.blog\u002F37.devops-knowledge-documentation-bus-factor",{"title":125,"path":126,"stem":127},"What Is PaaS? Platform as a Service Explained","\u002Fen\u002Fblog\u002Fwhat-is-paas","en\u002F3.blog\u002F38.what-is-paas",{"title":129,"path":130,"stem":131},"EU AI Act Hosting: What Changes for AI Workload Operators","\u002Fen\u002Fblog\u002Feu-ai-act-hosting","en\u002F3.blog\u002F39.eu-ai-act-hosting",{"title":133,"path":134,"stem":135},"Docker Compose Tutorial: Managing Multi-Container Apps Made Easy","\u002Fen\u002Fblog\u002Fdocker-compose-for-beginners","en\u002F3.blog\u002F4.docker-compose-for-beginners",{"title":137,"path":138,"stem":139},"Full-Stack Developer Reality: What the Title Actually Means","\u002Fen\u002Fblog\u002Ffull-stack-developer-reality","en\u002F3.blog\u002F40.full-stack-developer-reality",{"title":141,"path":142,"stem":143},"Cloud Egress Fees Compared: AWS vs. Azure vs. GCP Pricing","\u002Fen\u002Fblog\u002Fcloud-egress-fees","en\u002F3.blog\u002F41.cloud-egress-fees",{"title":145,"path":146,"stem":147},"Bring Your Own Cloud: What the Model Means and Why It","\u002Fen\u002Fblog\u002Fbring-your-own-cloud","en\u002F3.blog\u002F42.bring-your-own-cloud",{"title":149,"path":150,"stem":151},"Zero-Config Kubernetes: Why Simplicity Wins","\u002Fen\u002Fblog\u002Fzero-config-kubernetes","en\u002F3.blog\u002F43.zero-config-kubernetes",{"title":153,"path":154,"stem":155},"Minimalist Cloud Architecture: Why Less Complexity Means More Stability","\u002Fen\u002Fblog\u002Fminimalist-cloud-architecture","en\u002F3.blog\u002F44.minimalist-cloud-architecture",{"title":157,"path":158,"stem":159},"Software Deployment for SMBs: How Small Teams Ship Faster","\u002Fen\u002Fblog\u002Fsmb-software-deployment","en\u002F3.blog\u002F45.smb-software-deployment",{"title":161,"path":162,"stem":163},"EU Data Act: What Businesses and DevOps Teams Need to Know","\u002Fen\u002Fblog\u002Feu-data-act-business-devops","en\u002F3.blog\u002F46.eu-data-act-business-devops",{"title":165,"path":166,"stem":167},"Data Governance Act: What SMBs and DevOps Teams Need to Know","\u002Fen\u002Fblog\u002Fdata-governance-act-devops-guide","en\u002F3.blog\u002F47.data-governance-act-devops-guide",{"title":169,"path":170,"stem":171},"Cloud Agnostic Architecture: Meaning and Trade-offs","\u002Fen\u002Fblog\u002Fcloud-agnostic-architecture","en\u002F3.blog\u002F48.cloud-agnostic-architecture",{"title":173,"path":174,"stem":175},"Kubernetes Migration: What You Need to Know Before You Start","\u002Fen\u002Fblog\u002Fkubernetes-migration-guide","en\u002F3.blog\u002F49.kubernetes-migration-guide",{"title":177,"path":178,"stem":179},"Self-Host Docmost with Docker Compose and Traefik: Complete Guide","\u002Fen\u002Fblog\u002Fself-host-docmost-with-docker-and-traefik","en\u002F3.blog\u002F5.self-host-docmost-with-docker-and-traefik",{"title":181,"path":182,"stem":183},"AI Agent Infrastructure: What You Really Need for Production","\u002Fen\u002Fblog\u002Fai-agent-infrastructure","en\u002F3.blog\u002F50.ai-agent-infrastructure",{"title":185,"path":186,"stem":187},"What Is Kubernetes? A Practical Guide to Container Orchestration","\u002Fen\u002Fblog\u002Fwhat-is-kubernetes","en\u002F3.blog\u002F6.what-is-kubernetes",{"title":189,"path":190,"stem":191},"The Cloud Illusion: Why a Server Location in Germany Doesn’t Guarantee Digital Sovereignty","\u002Fen\u002Fblog\u002Fcloud-illusion-digital-sovereignty","en\u002F3.blog\u002F7.cloud-illusion-digital-sovereignty",{"title":193,"path":194,"stem":195},"S3-Compatible Object Storage: The Best Solutions at a Glance","\u002Fen\u002Fblog\u002Fs3-compatible-object-storage","en\u002F3.blog\u002F8.s3-compatible-object-storage",{"title":197,"path":198,"stem":199},"Deployment as a Bottleneck: When AI Codes Faster Than You Can Deploy","\u002Fen\u002Fblog\u002Fdeployment-bottleneck","en\u002F3.blog\u002F9.deployment-bottleneck",{"title":201,"path":202,"stem":203,"children":204,"icon":218},"Getting Started","\u002Fen\u002Fdocs\u002Fgetting-started","en\u002F1.docs\u002F1.getting-started\u002F1.index",[205,208,213],{"title":206,"path":202,"stem":203,"icon":207},"Introduction","i-lucide-house",{"title":209,"path":210,"stem":211,"icon":212},"Get Started","\u002Fen\u002Fdocs\u002Fgetting-started\u002Fget-started","en\u002F1.docs\u002F1.getting-started\u002F2.get-started","i-lucide-rocket",{"title":214,"path":215,"stem":216,"icon":217},"How It Works","\u002Fen\u002Fdocs\u002Fgetting-started\u002Fhow-it-works","en\u002F1.docs\u002F1.getting-started\u002F3.how-it-works","i-lucide-lightbulb",false,{"title":220,"path":221,"stem":222,"children":223,"icon":218},"Guides","\u002Fen\u002Fdocs\u002Fguides","en\u002F1.docs\u002F2.guides\u002F1.index",[224,226],{"title":220,"path":221,"stem":222,"icon":225},"i-lucide-book-open",{"title":227,"path":228,"stem":229,"icon":230},"Connect a Container Registry","\u002Fen\u002Fdocs\u002Fguides\u002Fcontainer-registries","en\u002F1.docs\u002F2.guides\u002F2.container-registries","i-lucide-container",{"title":232,"path":233,"stem":234,"children":235,"icon":218},"App Services","\u002Fen\u002Fdocs\u002Fapp-services","en\u002F1.docs\u002F3.app-services\u002F1.index",[236,237,242,247,252,257],{"title":232,"path":233,"stem":234,"icon":212},{"title":238,"path":239,"stem":240,"icon":241},"Build Settings","\u002Fen\u002Fdocs\u002Fapp-services\u002Fbuild-settings","en\u002F1.docs\u002F3.app-services\u002F2.build-settings","i-lucide-settings",{"title":243,"path":244,"stem":245,"icon":246},"Env Variables","\u002Fen\u002Fdocs\u002Fapp-services\u002Fenvironment-variables","en\u002F1.docs\u002F3.app-services\u002F3.environment-variables","i-lucide-key",{"title":248,"path":249,"stem":250,"icon":251},"Custom Domains","\u002Fen\u002Fdocs\u002Fapp-services\u002Fcustom-domains","en\u002F1.docs\u002F3.app-services\u002F4.custom-domains","i-lucide-globe",{"title":253,"path":254,"stem":255,"icon":256},"Health Checks","\u002Fen\u002Fdocs\u002Fapp-services\u002Fhealth-checks","en\u002F1.docs\u002F3.app-services\u002F5.health-checks","i-lucide-heart-pulse",{"title":258,"path":259,"stem":260,"icon":261},"Autoscaling","\u002Fen\u002Fdocs\u002Fapp-services\u002Fautoscaling","en\u002F1.docs\u002F3.app-services\u002F6.autoscaling","i-lucide-scaling",{"title":263,"path":264,"stem":265,"children":266,"icon":218},"Helm Releases","\u002Fen\u002Fdocs\u002Fhelm-releases","en\u002F1.docs\u002F4.helm-releases\u002F1.index",[267,269,274,279,284,289,294],{"title":263,"path":264,"stem":265,"icon":268},"i-lucide-package",{"title":270,"path":271,"stem":272,"icon":273},"Deploy PostgreSQL","\u002Fen\u002Fdocs\u002Fhelm-releases\u002Fdeploy-postgresql","en\u002F1.docs\u002F4.helm-releases\u002F2.deploy-postgresql","i-lucide-database",{"title":275,"path":276,"stem":277,"icon":278},"Deploy Redis","\u002Fen\u002Fdocs\u002Fhelm-releases\u002Fdeploy-redis","en\u002F1.docs\u002F4.helm-releases\u002F3.deploy-redis","i-lucide-zap",{"title":280,"path":281,"stem":282,"icon":283},"Deploy n8n","\u002Fen\u002Fdocs\u002Fhelm-releases\u002Fdeploy-n8n","en\u002F1.docs\u002F4.helm-releases\u002F4.deploy-n8n","i-lucide-workflow",{"title":285,"path":286,"stem":287,"icon":288},"Deploy RustFS","\u002Fen\u002Fdocs\u002Fhelm-releases\u002Fdeploy-rustfs","en\u002F1.docs\u002F4.helm-releases\u002F5.deploy-rustfs","i-lucide-hard-drive",{"title":290,"path":291,"stem":292,"icon":293},"Deploy OpenSearch","\u002Fen\u002Fdocs\u002Fhelm-releases\u002Fdeploy-opensearch","en\u002F1.docs\u002F4.helm-releases\u002F6.deploy-opensearch","i-lucide-search",{"title":295,"path":296,"stem":297,"icon":298},"Deploy Keycloak","\u002Fen\u002Fdocs\u002Fhelm-releases\u002Fdeploy-keycloak","en\u002F1.docs\u002F4.helm-releases\u002F7.deploy-keycloak","i-lucide-shield-check",{"title":300,"path":301,"stem":302,"children":303,"icon":218},"Glossary","\u002Fen\u002Fdocs\u002Fglossary","en\u002F1.docs\u002F5.glossary\u002F1.index",[304],{"title":300,"path":301,"stem":302,"icon":305},"i-lucide-book-a",[307,312,316,324,333],{"title":201,"path":202,"stem":203,"children":308,"icon":218},[309,310,311],{"title":206,"path":202,"stem":203,"icon":207},{"title":209,"path":210,"stem":211,"icon":212},{"title":214,"path":215,"stem":216,"icon":217},{"title":220,"path":221,"stem":222,"children":313,"icon":218},[314,315],{"title":220,"path":221,"stem":222,"icon":225},{"title":227,"path":228,"stem":229,"icon":230},{"title":232,"path":233,"stem":234,"children":317,"icon":218},[318,319,320,321,322,323],{"title":232,"path":233,"stem":234,"icon":212},{"title":238,"path":239,"stem":240,"icon":241},{"title":243,"path":244,"stem":245,"icon":246},{"title":248,"path":249,"stem":250,"icon":251},{"title":253,"path":254,"stem":255,"icon":256},{"title":258,"path":259,"stem":260,"icon":261},{"title":263,"path":264,"stem":265,"children":325,"icon":218},[326,327,328,329,330,331,332],{"title":263,"path":264,"stem":265,"icon":268},{"title":270,"path":271,"stem":272,"icon":273},{"title":275,"path":276,"stem":277,"icon":278},{"title":280,"path":281,"stem":282,"icon":283},{"title":285,"path":286,"stem":287,"icon":288},{"title":290,"path":291,"stem":292,"icon":293},{"title":295,"path":296,"stem":297,"icon":298},{"title":300,"path":301,"stem":302,"children":334,"icon":218},[335],{"title":300,"path":301,"stem":302,"icon":305},{"id":337,"title":300,"body":338,"description":837,"extension":838,"lastUpdated":839,"meta":840,"navigation":841,"path":301,"seo":842,"stem":302,"__hash__":843},"docs\u002Fen\u002F1.docs\u002F5.glossary\u002F1.index.md",{"type":339,"value":340,"toc":828},"minimark",[341,345,349,354,506,510,514,520,526,532,538,543,547,553,559,563,569,575,581,587,593,599,605,611,615,621,627,633,637,643,647,653,657,663,669,673,679,683,689,695,699,705,709,715,718,724,728,734,738,744,750,756,762,768,774,780,786,790,796,802,806,812,818,822],[342,343,300],"h2",{"id":344},"glossary",[346,347,348],"p",{},"Find the most important terms related to cloud computing, Kubernetes, and DevOps. Click on a term to learn more.",[350,351,353],"h3",{"id":352},"core-concepts","Core Concepts",[355,356,357,370],"table",{},[358,359,360],"thead",{},[361,362,363,367],"tr",{},[364,365,366],"th",{},"Term",[364,368,369],{},"Description",[371,372,373,389,402,415,428,441,454,467,480,493],"tbody",{},[361,374,375,386],{},[376,377,378],"td",{},[379,380,382],"a",{"href":381},"\u002Fen\u002Fdocs\u002Fglossary\u002Fkubernetes",[383,384,385],"strong",{},"Kubernetes",[376,387,388],{},"Open-source platform for orchestrating container workloads. The industry standard for automated deployments and scaling.",[361,390,391,399],{},[376,392,393],{},[379,394,396],{"href":395},"\u002Fen\u002Fdocs\u002Fglossary\u002Fcontainer",[383,397,398],{},"Container",[376,400,401],{},"Lightweight, isolated runtime environment for applications. Bundles code and dependencies into a portable package.",[361,403,404,412],{},[376,405,406],{},[379,407,409],{"href":408},"\u002Fen\u002Fdocs\u002Fglossary\u002Fcluster",[383,410,411],{},"Cluster",[376,413,414],{},"A group of computers working together as a single system. In Kubernetes, a cluster consists of a control plane and worker nodes.",[361,416,417,425],{},[376,418,419],{},[379,420,422],{"href":421},"\u002Fen\u002Fdocs\u002Fglossary\u002Fcloud-computing",[383,423,424],{},"Cloud Computing",[376,426,427],{},"A model for providing computing resources on demand over the internet.",[361,429,430,438],{},[376,431,432],{},[379,433,435],{"href":434},"\u002Fen\u002Fdocs\u002Fglossary\u002Fdevops",[383,436,437],{},"DevOps",[376,439,440],{},"A methodology where teams own the entire process from development to production operations.",[361,442,443,451],{},[376,444,445],{},[379,446,448],{"href":447},"\u002Fen\u002Fdocs\u002Fglossary\u002Fmicroservices",[383,449,450],{},"Microservices",[376,452,453],{},"An architectural approach where applications consist of small, independent services.",[361,455,456,464],{},[376,457,458],{},[379,459,461],{"href":460},"\u002Fen\u002Fdocs\u002Fglossary\u002Fci-cd",[383,462,463],{},"CI\u002FCD",[376,465,466],{},"Continuous Integration and Continuous Delivery. Automated pipelines for building, testing, and deploying.",[361,468,469,477],{},[376,470,471],{},[379,472,474],{"href":473},"\u002Fen\u002Fdocs\u002Fglossary\u002Fhelm-chart",[383,475,476],{},"Helm Chart",[376,478,479],{},"A versioned package that bundles all Kubernetes manifests needed for a deployment.",[361,481,482,490],{},[376,483,484],{},[379,485,487],{"href":486},"\u002Fen\u002Fdocs\u002Fglossary\u002Fhelm-release",[383,488,489],{},"Helm Release",[376,491,492],{},"A concrete, running instance of a Helm Chart in a Kubernetes cluster.",[361,494,495,503],{},[376,496,497],{},[379,498,500],{"href":499},"\u002Fen\u002Fdocs\u002Fglossary\u002Finfrastructure-as-code",[383,501,502],{},"Infrastructure as Code",[376,504,505],{},"An approach where infrastructure is defined and versioned in files rather than configured manually.",[350,507,509],{"id":508},"more-terms","More Terms",[511,512,513],"h4",{"id":379},"A",[346,515,516,519],{},[383,517,518],{},"Abstraction","\nA representation that hides technical details from the user, making a system more general and easier to understand.",[346,521,522,525],{},[383,523,524],{},"Agile Software Development","\nA collection of practices with iterative development cycles and self-organizing teams. The goal is to respond quickly to change.",[346,527,528,531],{},[383,529,530],{},"API (Application Programming Interface)","\nAn interface that enables communication between different programs.",[346,533,534,537],{},[383,535,536],{},"API Gateway","\nA tool that aggregates individual application APIs and makes them available through a single entry point.",[346,539,540,542],{},[383,541,258],{},"\nThe ability of a system to scale automatically, typically compute resources such as CPU or memory.",[511,544,546],{"id":545},"b","B",[346,548,549,552],{},[383,550,551],{},"Bare Metal Machine","\nA physical computer (typically a server) running a single operating system without a virtualization layer.",[346,554,555,558],{},[383,556,557],{},"Blue Green Deployment","\nA deployment strategy for updating applications with minimal downtime. Two identical environments are maintained, and traffic is switched between them.",[511,560,562],{"id":561},"c","C",[346,564,565,568],{},[383,566,567],{},"Canary Deployment","\nA deployment strategy where an updated version is deployed alongside the live environment, initially without live traffic. Traffic is gradually shifted after successful validation.",[346,570,571,574],{},[383,572,573],{},"Client-Server Architecture","\nAn architectural pattern where application logic is split across two or more components: clients that send requests and servers that respond to them.",[346,576,577,580],{},[383,578,579],{},"Cloud Native Apps","\nApplications specifically designed to take advantage of cloud computing innovations like containerization, microservices, and automation.",[346,582,583,586],{},[383,584,585],{},"Cloud Native Security","\nAn approach to integrating security standards into cloud native applications throughout the entire development and operations lifecycle.",[346,588,589,592],{},[383,590,591],{},"Cloud Native Technology","\nTechnologies used to build and run cloud native applications, including containers, service meshes, and declarative APIs.",[346,594,595,598],{},[383,596,597],{},"Container as a Service (CaaS)","\nA cloud service model for managing and deploying applications using container-based abstraction.",[346,600,601,604],{},[383,602,603],{},"Container Registry","\nA repository for storing and distributing container images. In lowcloud, you connect an external container registry to build and deploy your apps.",[346,606,607,610],{},[383,608,609],{},"Containerization","\nBundling an application and all its dependencies into a container image that can run independently of the environment.",[511,612,614],{"id":613},"d","D",[346,616,617,620],{},[383,618,619],{},"Decentralized Apps","\nApplications whose functionality is split into multiple smaller, independent parts that can be operated independently.",[346,622,623,626],{},[383,624,625],{},"DevSecOps","\nThe integration of development, operations, and security responsibilities into a unified process.",[346,628,629,632],{},[383,630,631],{},"Distributed System","\nA collection of autonomous computers connected via a network that appear to the user as a single system.",[511,634,636],{"id":635},"f","F",[346,638,639,642],{},[383,640,641],{},"Function as a Service (FaaS)","\nServerless cloud services that execute code in response to events without requiring the user to manage servers.",[511,644,646],{"id":645},"h","H",[346,648,649,652],{},[383,650,651],{},"Horizontal Scaling","\nA technique for increasing system capacity by adding more nodes or instances.",[511,654,656],{"id":655},"i","I",[346,658,659,662],{},[383,660,661],{},"Immutable Infrastructure","\nAn infrastructure approach where resources, once provisioned, are never modified but instead completely recreated when changes are needed.",[346,664,665,668],{},[383,666,667],{},"Infrastructure as a Service (IaaS)","\nA cloud model that provides physical or virtualized compute resources on a pay-as-you-go basis.",[511,670,672],{"id":671},"l","L",[346,674,675,678],{},[383,676,677],{},"Loosely Coupled Architecture","\nAn architectural style where components are independent of each other and communicate through well-defined interfaces.",[511,680,682],{"id":681},"m","M",[346,684,685,688],{},[383,686,687],{},"Monolithic Application","\nAn application that contains all functionality in a single, cohesive program.",[346,690,691,694],{},[383,692,693],{},"mTLS (Mutual Transport Layer Security)","\nA technique for mutual authentication and encryption of communication between two services.",[511,696,698],{"id":697},"n","N",[346,700,701,704],{},[383,702,703],{},"Nodes","\nComputers that work together in a cluster to accomplish a shared task. In Kubernetes, there are control plane nodes and worker nodes.",[511,706,708],{"id":707},"o","O",[346,710,711,714],{},[383,712,713],{},"Observability","\nA property that describes how well the internal state of a system can be understood from the outside, typically through logs, metrics, and traces.",[511,716,717],{"id":346},"P",[346,719,720,723],{},[383,721,722],{},"Platform as a Service (PaaS)","\nAn external platform that enables developers to deploy and run applications without managing the underlying infrastructure.",[511,725,727],{"id":726},"r","R",[346,729,730,733],{},[383,731,732],{},"Reliability","\nDescribes how well a system responds to failures and maintains its operations.",[511,735,737],{"id":736},"s","S",[346,739,740,743],{},[383,741,742],{},"Scalability","\nThe ability of a system to handle growing demands and expand its capacity accordingly.",[346,745,746,749],{},[383,747,748],{},"Self Healing","\nThe ability of a system to recover from certain failures automatically and without human intervention.",[346,751,752,755],{},[383,753,754],{},"Service","\nIn the cloud context, a microservice with independent functionality that is accessible through defined interfaces.",[346,757,758,761],{},[383,759,760],{},"Service Discovery","\nThe process by which services find other services and their instances on the network.",[346,763,764,767],{},[383,765,766],{},"Service Mesh","\nAn infrastructure layer that manages network traffic between services and provides features like reliability, observability, and security.",[346,769,770,773],{},[383,771,772],{},"Service Proxy","\nA component that intercepts network traffic, applies logic, and forwards it to the target service.",[346,775,776,779],{},[383,777,778],{},"Site Reliability Engineering (SRE)","\nA discipline that combines operations and software engineering to run reliable and scalable systems.",[346,781,782,785],{},[383,783,784],{},"Stateful Apps","\nApplications that need to persist data in order to function properly. Databases are a typical example.",[511,787,789],{"id":788},"t","T",[346,791,792,795],{},[383,793,794],{},"Tightly Coupled Architecture","\nAn architectural style where components are highly dependent on each other. Changes to one component often affect others.",[346,797,798,801],{},[383,799,800],{},"Transport Layer Security (TLS)","\nA protocol for encrypting and securing communication over a network.",[511,803,805],{"id":804},"v","V",[346,807,808,811],{},[383,809,810],{},"Vertical Scaling","\nA technique for increasing system capacity by adding CPU and memory to individual nodes.",[346,813,814,817],{},[383,815,816],{},"Virtual Machine (VM)","\nA virtual computer with its own operating system, not tied to specific hardware, using virtualization for resource sharing.",[511,819,821],{"id":820},"z","Z",[346,823,824,827],{},[383,825,826],{},"Zero Trust Architecture","\nA security approach for designing IT systems where no user or device is automatically trusted.",{"title":829,"searchDepth":830,"depth":830,"links":831},"",2,[832],{"id":344,"depth":830,"text":300,"children":833},[834,836],{"id":352,"depth":835,"text":353},3,{"id":508,"depth":835,"text":509},"Key terms from the fields of cloud computing, Kubernetes, and DevOps explained clearly.","md","2026-03-16",{},{"icon":305},{"title":300,"description":837},"4atUXoII_SpAAvmj6C-7NKfpJBZakUdaZsmqoZErluo",[845,847],{"title":295,"path":296,"stem":297,"description":846,"icon":298,"children":-1},"Learn how to deploy Keycloak as a Helm Release via lowcloud – including database setup, Ingress configuration, and Realm import.",null,1775510476607]