CertNova
Menu
<- Back to glossary

AWS Certified DevOps Engineer - Professional (DOP-C02) glossary

Terms selected for AWS Certified DevOps Engineer - Professional (DOP-C02) based on common objective language and practice focus.

Alerting Thresholds

Alerting thresholds are predefined limits that trigger alerts when system metrics exceed acceptable values, indicating potential issues.

Read full term ->

Architecture Safeguards

Architecture safeguards are proactive measures incorporated into system design to prevent failures and improve system reliability.

Read full term ->

Automated Response Patterns

Automated response patterns are predefined actions that systems automatically execute in response to specific events or incidents.

Read full term ->

Blue/Green Deployment

Release strategy that shifts traffic from current environment to a parallel new environment after validation.

Read full term ->

Canary Deployment

Progressive release method where a small percentage of users receive a new version before full rollout.

Read full term ->

Chaos Engineering

Practice of intentionally introducing failures to validate system resilience and operational readiness.

Read full term ->

CI/CD Pipeline

Automated workflow that integrates source changes, validates builds, runs tests, and deploys releases reliably.

Read full term ->

CI/CD Workflow

A CI/CD workflow automates the process of integrating code changes, testing them, and deploying them to production environments.

Read full term ->

CloudFormation Change Set

Preview of proposed infrastructure modifications before executing a CloudFormation stack update.

Read full term ->

Compliance Release Gates

Compliance release gates are checkpoints in the CI/CD pipeline that ensure code changes meet regulatory and organizational compliance requirements before deployment.

Read full term ->

Configuration Drift

Configuration drift occurs when the configuration of infrastructure resources deviates from the desired state defined in code.

Read full term ->

Deployment Controls

Deployment controls are mechanisms integrated into CI/CD pipelines to ensure that only validated and approved code changes are deployed to production environments.

Read full term ->

Disaster Recovery Strategy

A disaster recovery strategy outlines the procedures and technologies used to recover and restore services after a catastrophic event.

Read full term ->

Error Budget

Allowed unreliability amount derived from SLO targets, used to balance velocity and stability.

Read full term ->

Event-Driven Remediation

Event-driven remediation involves automatically executing corrective actions in response to specific events to minimize downtime and service disruption.

Read full term ->

GitOps

Operational model where Git repositories are the source of truth for infrastructure and application configuration.

Read full term ->

High Availability Patterns

High availability patterns are design strategies that ensure applications remain operational and accessible even in the event of failures.

Read full term ->

Identity and Access Management

Identity and Access Management (IAM) involves defining and managing the roles and permissions of users and systems to ensure secure access to resources.

Read full term ->

Immutable Infrastructure

Deployment approach where components are replaced rather than patched in place.

Read full term ->

Blameless Postmortem

Structured incident review focused on systemic learning and prevention rather than individual blame.

Read full term ->

Incident Runbooks

Incident runbooks are detailed guides that outline the steps and procedures to follow during incident response to ensure effective resolution.

Read full term ->

Infrastructure Drift

Condition where actual environment configuration diverges from declared infrastructure-as-code definitions.

Read full term ->

Infrastructure Patterns

Infrastructure patterns are reusable templates or blueprints that define the architecture and configuration of cloud resources for consistent deployment across environments.

Read full term ->

Infrastructure Provisioning

Infrastructure provisioning is the automated process of setting up and configuring cloud resources using Infrastructure as Code (IaC) tools.

Read full term ->

Log Analysis

Log analysis involves collecting, examining, and interpreting log data to troubleshoot and optimize system performance.

Read full term ->

Observability Controls

Observability controls are tools and practices used to monitor and gain insights into the performance and health of systems and applications.

Read full term ->

Observability

Operational capability to understand system state through metrics, logs, traces, and events.

Read full term ->

Policy as Code

Encoding governance and security rules in machine-readable form for automated validation.

Read full term ->

Progressive Delivery

Release discipline that incrementally exposes new functionality based on automated validation and risk controls.

Read full term ->

Release Strategy

A release strategy defines the approach for deploying applications to production, including methods for minimizing risk and ensuring stability.

Read full term ->

Rollback Strategy

Predefined method for reverting deployments quickly when metrics or health checks degrade.

Read full term ->

Secrets Rotation

Automated periodic renewal of credentials to reduce compromise risk and credential lifetime.

Read full term ->

Security Controls

Security controls are policies and mechanisms integrated into systems and processes to protect data and resources from unauthorized access and threats.

Read full term ->

SLO, SLI, and SLA

Reliability measurement framework: indicators, internal targets, and external commitments.

Read full term ->
Start practice for DOP-C02