Skip to content

Glossary

The block of an Application YAML that exposes a workload to the public. Specifies a protocol (https, http, tcp, udp), a hostname, optionally a TLS strategy, and an auth policy. See Access, hostnames, and TLS.

The Node.js process that runs on every Edgible-managed device. Maintains a WebSocket to the control plane, reconciles desired application state with what’s running, and reports health and lifecycle events.

The top-level deployable unit. One canonical-v3 YAML document. Bundles workloads, optional storage, and access entries on a single device. See Applications and workloads.

A bearer token issued for a single application, used by the api-key auth mode. Created via edgible application api-keys create.

The policy enforced on requests to a public access entry. One of none, org, api-key, short-code. See Authentication modes.

The reverse proxy that runs on every serving device. Terminates TLS, enforces auth policies, proxies to workloads.

The current YAML resource shape — apiVersion: v3, kind: Application. The forward-looking model used by edgible stack deploy.

The Edgible-operated backend (AWS Lambda, DynamoDB, Cognito, WebSocket API). Stores desired state; pushes updates to agents.

A machine (physical or virtual) running the agent. Has a fixed role (gateway or serving) chosen at install time.

A per-organization WireGuard subnet that joins all of the organization’s devices in a private mesh. See Device pools and WireGuard.

The command-line interface, installed locally, used for everything. See CLI overview.

A device whose role is to receive public traffic and forward it over WireGuard to a serving device. By default, run by Edgible.

A hostname under a platform-owned domain (e.g. <app>-<id>.edgible.app) automatically minted for an application. The alternative is a custom hostname.

Any hostname you control, pointed at the Edgible gateway via DNS. See Use a custom domain.

The load balancer running on every gateway device. Routes inbound public traffic by SNI to the appropriate WireGuard tunnel.

The default gateway operated by Edgible. Users don’t provision it; the platform assigns one to each organization.

The top-level multi-tenancy boundary. Users, devices, applications, and the device pool all belong to one organization.

The agent process of comparing desired state (last known application YAML for this device) with actual state (what’s running) and applying the diff.

A device whose role is to host workloads. The machine you install the agent on; never accepts inbound public traffic.

A rotating, time-bounded, optionally use-capped token. Used by the short-code auth mode for short-lived shared access.

In Edgible terminology, a YAML file passed to edgible stack deploy containing one or more Application documents. Not a separate resource — a stack is the set of applications declared in the file.

The platform requests, installs, and rotates certificates for https access entries. The default for new applications.

The encrypted VPN protocol that connects gateways and serving devices in a device pool.

The thing inside an Application that actually runs your code. One of five types: compose, docker, managed-process, vm, pre-existing.