Chapter 1: Introduction
Objective of This Book
What This Book Does Not Cover
Who This Book Is For
Origin of This Book
Recommended Reading
How This Book Is Organized
Chapter 3: Sharing, Scaling and Elasticity Patterns
Chapter 4: Reliability, Resiliency and Recovery Patterns
Chapter 5: Data Management and Storage Device Patterns
Chapter 6: Virtual Server and Hypervisor Connectivity and
Management Patterns
Chapter 7: Monitoring, Provisioning and Administration Patterns
Chapter 8: Cloud Service and Storage Security Patterns
Chapter 9: Network Security, Identity & Access Management
and Trust Assurance Patterns
Chapter 10: Common Compound Patterns
Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns Reference
Additional Information
Symbol Legend
Pattern Documentation Conventions
Updates, Errata, and Resources (www.servicetechbooks.com)
Cloud Computing Design Patterns (www.cloudpatterns.org)
What Is Cloud? (www.whatiscloud.com)
Referenced Specifications (www.servicetechspecs.com)
The Service Technology Magazine (www.servicetechmag.com)
CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)
Chapter 2: Understanding Design Patterns
About Pattern Profiles
Requirement
Icon
Problem
Solution
Application
Mechanisms
About Compound Patterns
Design Pattern Notation.
Capitalization
Page Number References
Measures of Design Pattern Application
Working with This Catalog
Chapter 3: Sharing, Scaling and Elasticity Patterns
Shared Resources
Problem
Solution
Application
Mechanisms
Workload Distribution
Problem
Solution
Application
Mechanisms
Dynamic Scalability
Problem
Solution
Application
Mechanisms
Service Load Balancing
Problem
Solution
Application
Mechanisms
Elastic Resource Capacity
Problem
Solution
Application
Mechanisms
Elastic Network Capacity
Problem
Solution
Application
Mechanisms
Elastic Disk Provisioning
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Server Instances
Problem
Solution
Application
Mechanisms
Load Balanced Virtual Switches
Problem
Solution
Application
Mechanisms
Service State Management
Problem
Solution
Application
Mechanisms
Storage Workload Management
Problem
Solution
Application
Mechanisms
Dynamic Data Normalization
Problem
Solution
Application
Mechanisms
Cross-Storage Device Vertical Tiering
Problem
Solution
Application
Mechanisms
Intra-Storage Device Vertical Data Tiering
Problem
Solution
Application
Mechanisms
Memory Over-Committing
Problem
Solution
Application
Mechanisms
NIC Teaming
Problem
Solution
Application
Mechanisms
Broad Access
Problem
Solution
Application
Mechanisms
Chapter 4: Reliability, Resiliency and Recovery Patterns
Resource Pooling
Problem
Solution
Application
Mechanisms
Resource Reservation
Problem
Solution
Application
Mechanisms
Hypervisor Clustering
Problem
Solution
Application
Mechanisms
Redundant Storage
Problem
Solution
Application
Mechanisms
Dynamic Failure Detection and Recovery
Problem
Solution
Application
Mechanisms
Multipath Resource Access
Problem
Solution
Application
Mechanisms
Redundant Physical Connection for Virtual Servers
Problem
Solution
Application
Mechanisms
Synchronized Operating State
Problem
Solution
Application
Mechanisms
Zero Downtime
Problem
Solution
Application
Mechanisms
Storage Maintenance Window
Problem
Solution
Application
Mechanisms
Virtual Server Auto Crash Recovery
Problem
Solution
Application
Mechanisms
Non-Disruptive Service Relocation
Problem
Solution
Application
Mechanisms
Chapter 5: Data Management and Storage
Device Patterns
Direct I/O Access
Problem
Solution
Application
Mechanisms
Direct LUN Access
Problem
Solution
Application
Mechanisms
Single Root I/O Virtualization
Problem
Solution
Application
Mechanisms
Cloud Storage Data at Rest Encryption
Problem
Solution
Application
Mechanisms
Cloud Storage Data Lifecycle Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Management
Problem
Solution
Application
Mechanisms
Cloud Storage Data Placement Compliance Check
Problem
Solution
Application
Mechanisms
Cloud Storage Device Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Path Masking
Problem
Solution
Application
Mechanisms
Cloud Storage Device Performance Enforcement
Problem
Solution
Application
Mechanisms
Virtual Disk Splitting
Problem
Solution
Application
Mechanisms
Sub-LUN Tiering
Problem
Solution
Application
Mechanisms
RAID-Based Data Placement
Problem
Solution
Application
Mechanisms
IP Storage Isolation
Problem
Solution
Application
Mechanisms
Chapter 6: Virtual Server and Hypervisor
Connectivity and Management Patterns
Virtual Server Folder Migration
Problem
Solution
Application
Mechanisms
Persistent Virtual Network Configuration
Problem
Solution
Application
Mechanisms
Virtual Server Connectivity Isolation
Problem
Solution
Application
Mechanisms
Virtual Switch Isolation
Problem
Solution
Application
Mechanisms
Virtual Server NAT Connectivity
Problem
Solution
Application
Mechanisms
External Virtual Server Accessibility
Problem
Solution
Application
Mechanisms
Cross-Hypervisor Workload Mobility
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Anti-Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Host Connectivity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Affinity
Problem
Solution
Application
Mechanisms
Virtual Server-to-Virtual Server Anti-Affinity
Problem
Solution
Application
Mechanisms
Stateless Hypervisor
Problem
Solution
Application
Mechanisms
Chapter 7: Monitoring, Provisioning and Administration Patterns
Usage Monitoring
Problem
Solution
Application
Mechanisms
Pay-as-You-Go
Problem
Solution
Application
Mechanisms
Realtime Resource Availability
Problem
Solution
Application
Mechanisms
Rapid Provisioning
Problem
Solution
Application
Mechanisms
Platform Provisioning
Problem
Solution
Application
Mechanisms
Bare-Metal Provisioning
Problem
Solution
Application
Mechanisms
Automated Administration
Problem
Solution
Application
Mechanisms
Centralized Remote Administration
Problem
Solution
Application
Mechanisms
Resource Management
Problem
Solution
Application
Mechanisms
Self-Provisioning
Problem
Solution
Application
Mechanisms
Power Consumption Reduction
Problem
Solution
Application
Mechanisms
Chapter 8: Cloud Service and Storage Security Patterns
Trusted Platform BIOS
Problem
Solution
Application
Mechanisms
Geotagging
Problem
Solution
Application
Mechanisms
Hypervisor Protection
Problem
Solution
Application
Mechanisms
Cloud VM Platform Encryption
Problem
Solution
Application
Mechanisms
Trusted Cloud Resource Pools
Problem
Solution
Application
Mechanisms
Secure Cloud Interfaces and APIs
Problem
Solution
Application
Mechanisms
Cloud Resource Access Control
Problem
Solution
Application
Mechanisms
Detecting and Mitigating User-Installed VMs
Problem
Solution
Application
Mechanisms
Mobile BYOD Security
Problem
Solution
Application
Mechanisms
Cloud Data Breach Protection
Problem
Solution
Application
Mechanisms
Permanent Data Loss Protection
Problem
Solution
Application
Mechanisms
In-Transit Cloud Data Encryption
Problem
Solution
Application
Mechanisms
Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns
Secure On-Premise Internet Access
Problem
Solution
Application
Mechanisms
Secure External Cloud Connection
Problem
Solution
Application
Mechanisms
Secure Connection for Scaled VMs
Problem
Solution
Application
Mechanisms
Cloud Denial-of-Service Protection
Problem
Solution
Application
Mechanisms
Cloud Traffic Hijacking Protection
Problem
Solution
Application
Mechanisms
Automatically Defined Perimeter
Problem
Solution
Application
Mechanisms
Cloud Authentication Gateway
Problem
Solution
Application
Mechanisms
Federated Cloud Authentication
Problem
Solution
Application
Mechanisms
Cloud Key Management
Problem
Solution
Application
Mechanisms
Trust Attestation Service
Problem
Solution
Application
Mechanisms
Collaborative Monitoring and Logging
Problem
Solution
Application
Mechanisms
Independent Cloud Auditing
Problem
Solution
Application
Mechanisms
Threat Intelligence Processing
Problem
Solution
Application
Mechanisms
Chapter 10: Common Compound Patterns
“Compound Pattern” vs. “Composite Pattern”
Compound Pattern Members
Joint Application vs. Coexistent Application
Private Cloud
Public Cloud
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (IaaS)
Elastic Environment
Multitenant Environment
Resilient Environment
Cloud Bursting
Burst Out to Private Cloud
Burst Out to Public Cloud
Burst In
Secure Burst Out to Private Cloud/Public Cloud
Cloud Balancing
Cloud Authentication
Resource Workload Management
Isolated Trust Boundary
Appendix A: Cloud Computing Mechanisms Glossary
Appendix B: Alphabetical Design Patterns
Reference
About the Authors
Thomas Erl
Robert Cope
Amin Naserpour