Performance Engineering Keywords 1737001675
Performance Engineering Keywords 1737001675
10 | P a g e Santhosh Kumar J
o These metrics are often aggregated, processed, and visualized to
monitor system health, troubleshoot issues, and support
capacity planning.
60. Logs
o Time-stamped records of system events, transactions, or errors
generated by software applications and infrastructure
components.
o They serve as a primary source for debugging, forensic analysis,
and tracking operational behavior in production environments.
61. Distributed Tracing
o An advanced form of tracing that correlates logs and traces
across multiple services in a distributed architecture.
o It enables end-to-end monitoring of request flows, facilitating
rapid isolation of performance issues or failures across
interconnected components.
62. Chaos Engineering
o The disciplined practice of deliberately injecting failures (e.g.,
network blackouts, service crashes) into a system to evaluate its
resilience and robustness.
o By simulating real-world failure scenarios, chaos engineering
validates recovery strategies and reinforces system stability
under unexpected conditions.
63. Elasticity
o The property of a system that allows it to automatically adjust its
resource allocation (scaling up or down) in response to real-time
demand.
o Elasticity is central to cloud-native architectures, ensuring cost-
effectiveness while maintaining performance consistency during
load fluctuations.
64. Fault Injection
o A testing technique that purposefully introduces errors or failures
into a system to verify its error-handling and recovery capabilities.
o It is used to simulate uncommon failure modes and to validate
that the system can gracefully handle and recover from
unexpected disruptions.
11 | P a g e Santhosh Kumar J
65. Immutable Infrastructure
o An approach in which servers or infrastructure components are
never modified after deployment; any change is achieved by
replacing the entire component.
o This strategy minimizes configuration drift, simplifies rollback
procedures, and ensures consistency across deployments.
66. Service Discovery
o The automated process by which applications locate and
communicate with service instances in dynamic, distributed
environments.
o It eliminates hard-coded endpoints and adapts to runtime
changes through mechanisms like DNS-based resolution or
dedicated service registries.
67. Sharding
o The practice of horizontally partitioning data across multiple
databases or nodes to distribute load and improve performance.
o Each shard holds a subset of the overall data, which can lead to
reduced latency and enhanced throughput for large-scale
systems.
68. Rate Limiting
o The enforcement of a maximum threshold on the number of
operations (e.g., API calls) allowed over a fixed interval.
o Rate limiting prevents overuse, protects backend resources, and
maintains service quality during high-traffic scenarios.
69. Circuit Breaker
o A fault-tolerance pattern that halts operations for a defined
period when a particular service repeatedly fails, preventing
system-wide cascading failures.
o It monitors error rates and automatically “trips” to stop further
calls, then gradually allows trial requests to check service
recovery.
70. Containerization
o The process of bundling an application and its dependencies into
a standardized unit called a container, ensuring consistency
across environments.
12 | P a g e Santhosh Kumar J
o Containers share the host OS kernel while remaining isolated
from one another, optimizing resource usage and simplifying
deployment workflows.
71. Service Mesh
o An infrastructure layer that manages service-to-service
communication in microservices architectures, providing
features like traffic management, security, and observability.
o It abstracts network complexities away from application code,
enabling consistent policy enforcement and enhanced inter-
service communication.
72. Ingress Controller
o A Kubernetes component responsible for managing external
access to services within a cluster, often handling HTTP/S traffic
routing.
o It performs tasks like SSL termination, load balancing, and URL-
based routing based on Ingress configuration rules.
73. Observability Pillars
o The three fundamental data sources—logs, metrics, and traces—
that collectively provide full insight into system behavior.
o Each pillar contributes uniquely to diagnosing issues, where logs
capture detailed events, metrics offer quantitative snapshots,
and traces show request flows.
74. Garbage Collection (GC)
o An automated memory management process in high-level
languages like Java, which reclaims memory from objects that are
no longer referenced.
o Proper GC tuning and profiling are critical to reducing pause
times and ensuring minimal impact on application throughput.
75. Thread Dump
o A snapshot of all threads and their execution state within a
running application, providing detailed call stacks and
synchronization status.
o Analyzing thread dumps is invaluable for diagnosing deadlocks,
performance bottlenecks, and contention issues in multi-
threaded environments.
13 | P a g e Santhosh Kumar J
76. Reverse Proxy
o A server that receives client requests and forwards them to one or
more backend servers, often abstracting and load balancing
services.
o It can perform caching, SSL termination, and security filtering,
thus improving overall system performance and security.
77. Forward Proxy
o An intermediary server that processes client requests on behalf of
external servers, often used for internet access control and
content caching.
o It provides anonymity, security filtering, and bandwidth
optimization by caching frequently accessed resources.
78. Virtualization
o The technique of creating virtual versions of hardware platforms,
storage devices, or network resources to maximize utilization and
flexibility.
o Virtualization abstracts physical resources, enabling multiple
virtual machines to run concurrently on a single physical host
with isolated environments.
79. Hypervisor
o Software that creates and manages virtual machines (VMs) by
abstracting and partitioning physical hardware resources.
o Examples include VMware ESXi, Microsoft Hyper-V, and KVM,
which enable multi-tenancy and improved resource utilization
within data centers.
80. Infrastructure as Code (IaC)
o The management of infrastructure (networks, servers, storage)
through code and configuration files rather than manual
processes.
o Tools like Terraform and AWS CloudFormation enforce version
control, repeatability, and automated deployment of
infrastructure components.
81. Immutable Artifact
o A build output (such as a container image or compiled binary)
that, once generated, is not altered.
o This immutability ensures that deployments are consistent,
traceable, and can be reliably rolled back if necessary.
14 | P a g e Santhosh Kumar J
82. Rollback
o The controlled process of reverting a system or application to a
previous stable version after identifying issues in the new release.
o Rollbacks are a critical safety mechanism in deployments and
rely on versioning and immutable artifacts for successful
restoration.
83. Hotfix
o A rapid and often urgent update deployed to address critical
issues in a production environment without waiting for the regular
release cycle.
o Hotfixes aim to resolve security vulnerabilities or performance
regressions swiftly, often with minimal testing in a controlled
release pipeline.
84. Zero Downtime Deployment
o Deployment techniques—such as rolling updates, blue-green
deployment, or canary releases—that ensure uninterrupted
service availability during updates.
o This practice requires strategies to manage state, traffic
redirection, and real-time health monitoring to avoid any service
disruptions.
85. Data Partitioning
o The segmentation of large datasets into discrete, manageable
chunks (partitions or shards) to improve query efficiency and
system scalability.
o Data partitioning helps distribute I/O operations and processing
loads, often using range, hash, or list partitioning methods in
databases.
86. Eventual Consistency
o A consistency model in distributed systems where updates
propagate asynchronously, ensuring that all nodes will become
consistent over time.
o This model prioritizes availability and partition tolerance,
accepting temporary discrepancies in favor of system scalability.
87. Strong Consistency
o A data consistency model ensuring that once a data update is
committed, all subsequent read operations reflect that change
immediately across all nodes.
15 | P a g e Santhosh Kumar J
o Strong consistency is often enforced in traditional RDBMS or
through distributed consensus protocols (e.g., Paxos, Raft),
potentially at the expense of latency.
88. Message Queue
o A communication middleware that enables asynchronous
message passing between producers and consumers, decoupling
processing through queuing.
o Systems like RabbitMQ or Apache Kafka provide durable and
reliable queuing mechanisms to handle high volumes of
messages while ensuring delivery guarantees.
89. Publish-Subscribe (Pub/Sub)
o An asynchronous messaging pattern where publishers broadcast
messages to topics, and subscribers receive messages based on
their interests.
o This decouples the sender and receiver, allowing for highly
scalable, real-time distribution of information across distributed
systems.
90. Leader Election
o A consensus process in distributed systems where nodes
determine a single coordinator (leader) to manage tasks or
resources.
o Leader election algorithms (e.g., Bully Algorithm, Raft) are
essential for coordination, preventing conflicts, and ensuring
reliable system operations.
91. Idempotency
o A property of operations where executing the same request
multiple times produces the same result without side effects
beyond the initial application.
o Idempotency is crucial for reliable API design and handling retries
in distributed systems to avoid unintended duplicate
transactions.
92. Tokenization
o The process of replacing sensitive data with non-sensitive
placeholders (tokens) that can be mapped back only with
authorized access.
16 | P a g e Santhosh Kumar J
o This technique is employed to secure data in transit or at rest,
reducing exposure of personal or confidential information in
applications.
93. Redundancy
o The duplication of critical components or functions to increase
system reliability, ensuring that failure of one element does not
lead to system collapse.
o Redundancy is implemented via clustering, replication, or failover
mechanisms, enhancing fault tolerance and continuous
availability.
94. Elastic Load Balancer (ELB)
o A cloud-based load balancing solution that dynamically
distributes incoming application traffic across multiple backend
instances.
o ELBs, such as those offered by AWS, integrate health checks and
auto-scaling to adapt to varying load conditions in real time.
95. Health Check
o Automated probes or tests that determine whether a system
component, such as a server or microservice, is functioning
correctly.
o Health checks are integral to load balancers and orchestration
systems, triggering automatic recovery or rerouting when failures
are detected.
96. Middleware Caching
o Caching implemented at the middleware layer to store and
rapidly serve frequently requested data, reducing downstream
processing.
o It minimizes latency by offloading repetitive data retrieval
operations and thereby alleviates the load on databases or
backend services.
97. Rate Throttling
o Controlling the flow of requests to a service by enforcing a
maximum number of allowed operations per time unit.
o This protects the system from overload during traffic bursts,
ensuring equitable resource usage and system stability.
17 | P a g e Santhosh Kumar J
98. Namespace
o A logical partition within systems like Kubernetes that isolates
resources (pods, services, etc.) to enforce organizational
boundaries and manage access control.
o Namespaces facilitate multi-tenancy and prevent resource
conflicts by segregating workloads within the same cluster.
99. Autoscaling
o The dynamic adjustment of computing resources based on real-
time monitoring metrics, such as CPU or memory utilization.
o Autoscaling helps maintain performance targets while optimizing
cost efficiency by ensuring that resources match the current
demand.
18 | P a g e Santhosh Kumar J
100. Cold Start
• A mechanism that restricts the number of API calls a client can make in
a specific timeframe to protect backend services.
• Helps prevent abuse, mitigates the risk of server overload, and
maintains overall system performance by enforcing strict quotas.
104. StatefulSet
19 | P a g e Santhosh Kumar J
105. DaemonSet
106. CronJob
20 | P a g e Santhosh Kumar J
110. Hot Path
21 | P a g e Santhosh Kumar J
115. Service Level Objective (SLO)
• A clearly defined target value or range for an SLI, setting the acceptable
performance threshold for a service over a period.
• Used as a performance benchmark to trigger alerts and corrective
actions when the service deviates from expected behavior.
• The collection and analysis of performance data directly from real users
interacting with the application in production.
• Provides a detailed understanding of end-user experience, capturing
variations across different geographies and device types.
22 | P a g e Santhosh Kumar J
120. Resource Utilization
124. Deadlock
• A state where two or more processes are each waiting indefinitely for
the other to release a resource, resulting in a standstill.
• Preventing deadlocks involves designing systems with careful resource
management, employing timeouts, and applying deadlock detection
algorithms.
23 | P a g e Santhosh Kumar J
125. CPU Utilization
129. Instrumentation
24 | P a g e Santhosh Kumar J
130. Profiling Overhead
• The additional CPU, memory, or I/O cost incurred by the tools and
processes used for monitoring and profiling application performance.
• It is essential to minimize profiling overhead to ensure that
measurement tools do not significantly impact the performance being
evaluated.
25 | P a g e Santhosh Kumar J
135. Thundering Herd
26 | P a g e Santhosh Kumar J
139. Back Pressure
27 | P a g e Santhosh Kumar J
144. Concurrency Control
28 | P a g e Santhosh Kumar J
149. Code Optimization
29 | P a g e Santhosh Kumar J