Cloud Computing Design Patterns

Cloud Computing Design Patterns
by Thomas Erl,
Robert Cope,
Amin Naserpour

  • Chapter 1: Introduction
    • Objective of This Book
    • What This Book Does Not Cover
    • Who This Book Is For
    • Origin of This Book
    • Recommended Reading
    • How This Book Is Organized
      • Chapter 3: Sharing, Scaling and Elasticity Patterns
      • Chapter 4: Reliability, Resiliency and Recovery Patterns
      • Chapter 5: Data Management and Storage Device Patterns
      • Chapter 6: Virtual Server and Hypervisor Connectivity and
      • Management Patterns
      • Chapter 7: Monitoring, Provisioning and Administration Patterns
      • Chapter 8: Cloud Service and Storage Security Patterns
      • Chapter 9: Network Security, Identity & Access Management
      • and Trust Assurance Patterns
      • Chapter 10: Common Compound Patterns
      • Appendix A: Cloud Computing Mechanisms Glossary
      • Appendix B: Alphabetical Design Patterns Reference
    • Additional Information
      • Symbol Legend
      • Pattern Documentation Conventions
      • Updates, Errata, and Resources (www.servicetechbooks.com)
      • Cloud Computing Design Patterns (www.cloudpatterns.org)
      • What Is Cloud? (www.whatiscloud.com)
      • Referenced Specifications (www.servicetechspecs.com)
      • The Service Technology Magazine (www.servicetechmag.com)
      • CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)
  • Chapter 2: Understanding Design Patterns
    • About Pattern Profiles
      • Requirement
      • Icon
      • Problem
      • Solution
      • Application
      • Mechanisms
    • About Compound Patterns
    • Design Pattern Notation.
      • Capitalization
      • Page Number References
    • Measures of Design Pattern Application
    • Working with This Catalog
  • Chapter 3: Sharing, Scaling and Elasticity Patterns
    • Shared Resources
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Workload Distribution
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Dynamic Scalability
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Service Load Balancing
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Elastic Resource Capacity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Elastic Network Capacity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Elastic Disk Provisioning
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Load Balanced Virtual Server Instances
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Load Balanced Virtual Switches
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Service State Management
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Storage Workload Management
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Dynamic Data Normalization
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cross-Storage Device Vertical Tiering
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Intra-Storage Device Vertical Data Tiering
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Memory Over-Committing
      • Problem
      • Solution
      • Application
      • Mechanisms
    • NIC Teaming
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Broad Access
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 4: Reliability, Resiliency and Recovery Patterns
    • Resource Pooling
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Resource Reservation
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Hypervisor Clustering
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Redundant Storage
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Dynamic Failure Detection and Recovery
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Multipath Resource Access
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Redundant Physical Connection for Virtual Servers
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Synchronized Operating State
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Zero Downtime
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Storage Maintenance Window
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server Auto Crash Recovery
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Non-Disruptive Service Relocation
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 5: Data Management and Storage
    • Device Patterns
    • Direct I/O Access
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Direct LUN Access
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Single Root I/O Virtualization
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Data at Rest Encryption
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Data Lifecycle Management
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Data Management
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Data Placement Compliance Check
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Device Masking
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Device Path Masking
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Storage Device Performance Enforcement
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Disk Splitting
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Sub-LUN Tiering
      • Problem
      • Solution
      • Application
      • Mechanisms
    • RAID-Based Data Placement
      • Problem
      • Solution
      • Application
      • Mechanisms
    • IP Storage Isolation
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 6: Virtual Server and Hypervisor
    • Connectivity and Management Patterns
    • Virtual Server Folder Migration
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Persistent Virtual Network Configuration
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server Connectivity Isolation
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Switch Isolation
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server NAT Connectivity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • External Virtual Server Accessibility
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cross-Hypervisor Workload Mobility
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server-to-Host Affinity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server-to-Host Anti-Affinity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server-to-Host Connectivity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server-to-Virtual Server Affinity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Virtual Server-to-Virtual Server Anti-Affinity
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Stateless Hypervisor
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 7: Monitoring, Provisioning and Administration Patterns
    • Usage Monitoring
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Pay-as-You-Go
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Realtime Resource Availability
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Rapid Provisioning
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Platform Provisioning
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Bare-Metal Provisioning
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Automated Administration
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Centralized Remote Administration
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Resource Management
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Self-Provisioning
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Power Consumption Reduction
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 8: Cloud Service and Storage Security Patterns
    • Trusted Platform BIOS
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Geotagging
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Hypervisor Protection
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud VM Platform Encryption
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Trusted Cloud Resource Pools
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Secure Cloud Interfaces and APIs
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Resource Access Control
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Detecting and Mitigating User-Installed VMs
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Mobile BYOD Security
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Data Breach Protection
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Permanent Data Loss Protection
      • Problem
      • Solution
      • Application
      • Mechanisms
    • In-Transit Cloud Data Encryption
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns
    • Secure On-Premise Internet Access
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Secure External Cloud Connection
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Secure Connection for Scaled VMs
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Denial-of-Service Protection
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Traffic Hijacking Protection
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Automatically Defined Perimeter
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Authentication Gateway
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Federated Cloud Authentication
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Cloud Key Management
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Trust Attestation Service
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Collaborative Monitoring and Logging
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Independent Cloud Auditing
      • Problem
      • Solution
      • Application
      • Mechanisms
    • Threat Intelligence Processing
      • Problem
      • Solution
      • Application
      • Mechanisms
  • Chapter 10: Common Compound Patterns
    • “Compound Pattern” vs. “Composite Pattern”
    • Compound Pattern Members
    • Joint Application vs. Coexistent Application
    • Private Cloud
    • Public Cloud
    • Software-as-a-Service (SaaS)
    • Platform-as-a-Service (PaaS)
    • Infrastructure-as-a-Service (IaaS)
    • Elastic Environment
    • Multitenant Environment
    • Resilient Environment
    • Cloud Bursting
    • Burst Out to Private Cloud
    • Burst Out to Public Cloud
    • Burst In
    • Secure Burst Out to Private Cloud/Public Cloud
    • Cloud Balancing
    • Cloud Authentication
    • Resource Workload Management
    • Isolated Trust Boundary
  • Appendix A: Cloud Computing Mechanisms Glossary
  • Appendix B: Alphabetical Design Patterns
  • Reference
  • About the Authors
    • Thomas Erl
    • Robert Cope
    • Amin Naserpour
  • Index