Now accepting investors – Join us in revolutionizing cloud infrastructure.View opportunity 

LIGHTCLOUD
BLOG

Cloud Glossary: Letter T

Terraform, TLS, and Traffic Management

Cloud Glossary: Letter T

Navigation: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

T

TCP (Transmission Control Protocol)

A reliable, connection-oriented protocol that ensures ordered delivery of data packets over IP networks.

Terraform

An open-source infrastructure as code tool that allows you to build, change, and version infrastructure safely and efficiently.

Throughput

The amount of data processed or transmitted through a system in a given time period, typically measured in operations or bytes per second.

TLS (Transport Layer Security)

A cryptographic protocol that provides secure communication over networks by encrypting data in transit.

Token

A piece of data that represents the right to access a resource or perform an action, often used for authentication.

Traffic

Data that flows through networks, systems, or applications, often measured and monitored for performance and security.

Transaction

A sequence of database operations that are treated as a single unit, following ACID properties for data consistency.

Trigger

An event or condition that automatically initiates a specific action or workflow in response to changes or schedules.

Two-Factor Authentication (2FA)

A security process that requires two different authentication factors to verify user identity before granting access.

TTL (Time to Live)

A mechanism that limits the lifespan of data in a system, often used for caching and DNS records.

Table

A structured data storage format in databases that organizes information in rows and columns with defined schemas.

Tag

Metadata labels attached to cloud resources for organization, cost allocation, and management purposes.

Target Group

A collection of targets (such as EC2 instances) that receive traffic from a load balancer based on defined rules.

TCP/IP

The fundamental communication protocol suite of the internet that defines how data should be packetized and transmitted.

Template

A pre-defined configuration file that describes infrastructure resources and can be used to create consistent deployments.

Tenant

An individual customer or organization in a multi-tenant system that shares infrastructure while maintaining data isolation.

Testing

The process of evaluating software applications or systems to identify bugs, verify functionality, and ensure quality.

Throttling

A technique for controlling the rate of requests or operations to prevent system overload and ensure fair resource usage.

Tier

A layer in application architecture that separates different functional aspects like presentation, business logic, and data.

Timeout

A specified time limit after which an operation is automatically terminated if it hasn't completed successfully.

TLS Certificate

A digital certificate that enables encrypted communication between clients and servers using the TLS protocol.

Topology

The arrangement and interconnection of network elements, defining how devices are connected and communicate.

Trace

A record of execution path through an application, used for debugging and performance analysis in distributed systems.

Transit Gateway

A service that connects VPCs and on-premises networks through a central hub, simplifying network architecture.

Tunnel

A secure connection that encapsulates data packets to provide private communication over public networks.

TypeScript

A strongly typed programming language that builds on JavaScript by adding static type definitions for better development.

TACACS+ (Terminal Access Controller Access-Control System Plus)

A protocol that provides authentication, authorization, and accounting services for network access control.

Task

A unit of work or job that can be executed by a system, often as part of a larger workflow or batch process.

Task Definition

A blueprint that describes how containers should run, including CPU, memory, and networking configurations.

TCP Load Balancer

A Layer 4 load balancer that distributes TCP traffic across multiple backend servers based on IP and port information.

Telemetry

Automated collection and transmission of data from remote sources for monitoring, analysis, and control purposes.

Terraform Provider

A plugin that enables Terraform to interact with APIs of cloud providers and other services for resource management.

Terraform State

A file that keeps track of the mapping between Terraform configuration and real-world infrastructure resources.

Test Environment

A dedicated environment for running tests to validate software functionality before deployment to production.

Third-Party Integration

Connecting applications or systems with external services or APIs provided by other vendors or organizations.

Three-Tier Architecture

A software architecture pattern that separates applications into presentation, logic, and data tiers for better organization.

Threshold

A predefined limit or boundary that triggers alerts, scaling actions, or other automated responses when exceeded.

Time Series Data

Data points indexed in time order, commonly used for monitoring metrics, logs, and analytics over time.

TLS Handshake

The process of establishing a secure connection between client and server, including certificate exchange and encryption setup.

Token Bucket

A rate limiting algorithm that allows bursts of traffic while maintaining an average rate over time.

Topic

A named channel for publishing and subscribing to messages in pub/sub messaging systems.

Traffic Distribution

The process of directing network requests across multiple destinations based on configured algorithms and rules.

Traffic Mirroring

Copying network traffic to monitoring tools for analysis without affecting the original traffic flow.

Transaction Log

A record of all database transactions that enables recovery, replication, and maintaining data consistency.

Transformation

The process of converting data from one format, structure, or representation to another for integration or analysis.

Transport Protocol

Network protocols that handle the delivery of data between applications, including TCP and UDP.

Trusted Advisor

AWS service that provides real-time guidance to help optimize infrastructure, improve security, and reduce costs.

Two-Way SSL

Mutual authentication where both client and server verify each other's certificates for enhanced security.

Type System

A set of rules that assigns types to programming language constructs to prevent or catch type errors.

Table Partition

A method of dividing large database tables into smaller, more manageable pieces while maintaining logical unity.

Target Tracking

An auto-scaling method that automatically adjusts capacity to maintain a specific metric at a target value.

Task Queue

A data structure that holds tasks waiting to be processed, typically following first-in-first-out ordering.

TCP Connection

A reliable, full-duplex communication channel established between two endpoints using the TCP protocol.

Template Engine

A software component that combines templates with data to produce documents or web pages dynamically.

Temporal Data

Information that is valid only during specific time periods, requiring time-aware storage and querying capabilities.

Terminal

A command-line interface that allows users to interact with computer systems through text-based commands.

Thread Pool

A collection of worker threads that can be reused to execute multiple tasks, improving performance and resource management.

Throughput Optimization

Techniques and configurations used to maximize the amount of data processed or transmitted per unit of time.

Time-based Scaling

Auto-scaling that adjusts resources based on predictable time patterns rather than current demand metrics.

TLS Termination

The process of decrypting SSL/TLS traffic at a load balancer or proxy before forwarding to backend servers.

Token Refresh

The process of obtaining new access tokens using refresh tokens to maintain authentication without re-login.

Traffic Shaping

The practice of controlling network traffic flow to optimize performance, prioritize certain types of data, or enforce policies.

Transaction Isolation

Database feature that determines how concurrent transactions interact and what data they can see from other transactions.

Trigger Function

A function that executes automatically in response to specific events or conditions in cloud systems.

Troubleshooting

The systematic process of identifying, diagnosing, and resolving problems in systems, applications, or networks.

Trusted Platform Module (TPM)

A hardware-based security chip that provides cryptographic functions and secure storage for encryption keys.

Tuning

The process of optimizing system performance by adjusting configuration parameters, resources, and settings.

Two-Tier Architecture

A client-server architecture that separates the user interface from the data layer, with business logic on either side.