Book description
“This book continues the very high standard we have come to expect from ServiceTech Press. The book provides well-explained vendor-agnostic patterns to the challenges of providing or using cloud solutions from PaaS to SaaS. The book is not only a great patterns reference, but also worth reading from cover to cover as the patterns are thought-provoking, drawing out points that you should consider and ask of a potential vendor if you’re adopting a cloud solution.”
--Phil Wilkins, Enterprise Integration Architect, Specsavers
“Thomas Erl’s text provides a unique and comprehensive perspective on cloud design patterns that is clearly and concisely explained for the technical professional and layman alike. It is an informative, knowledgeable, and powerful insight that may guide cloud experts in achieving extraordinary results based on extraordinary expertise identified in this text. I will use this text as a resource in future cloud designs and architectural considerations.”
--Dr. Nancy M. Landreville, CEO/CISO, NML Computer Consulting
The Definitive Guide to Cloud Architecture and Design
Best-selling service technology author Thomas Erl has brought together the de facto catalog of design patterns for modern cloud-based architecture and solution design. More than two years in development, this book’s 100+ patterns illustrate proven solutions to common cloud challenges and requirements. Its patterns are supported by rich, visual documentation, including 300+ diagrams.
The authors address topics covering scalability, elasticity, reliability, resiliency, recovery, data management, storage, virtualization, monitoring, provisioning, administration, and much more. Readers will further find detailed coverage of cloud security, from networking and storage safeguards to identity systems, trust assurance, and auditing.
This book’s unprecedented technical depth makes it a must-have resource for every cloud technology architect, solution designer, developer, administrator, and manager.
Topic Areas
Enabling ubiquitous, on-demand, scalable network access to shared pools of configurable IT resources
Optimizing multitenant environments to efficiently serve multiple unpredictable consumers
Using elasticity best practices to scale IT resources transparently and automatically
Ensuring runtime reliability, operational resiliency, and automated recovery from any failure
Establishing resilient cloud architectures that act as pillars for enterprise cloud solutions
Rapidly provisioning cloud storage devices, resources, and data with minimal management effort
Enabling customers to configure and operate custom virtual networks in SaaS, PaaS, or IaaS environments
Efficiently provisioning resources, monitoring runtimes, and handling day-to-day administration
Implementing best-practice security controls for cloud service architectures and cloud storage
Securing on-premise Internet access, external cloud connections, and scaled VMs
Protecting cloud services against denial-of-service attacks and traffic hijacking
Establishing cloud authentication gateways, federated cloud authentication, and cloud key management
Providing trust attestation services to customers
Monitoring and independently auditing cloud security
Solving complex cloud design problems with compound super-patterns
Table of contents
- About This eBook
- Title Page
- Copyright Page
- Praise for This Book
- Dedication Page
- Contents at a Glance
- Contents
- Acknowledgments
-
Chapter 1. Introduction
- Objective of This Book
- What This Book Does Not Cover
- Who This Book Is For
- Origin of This Book
- Recommended Reading
-
How This Book Is Organized
- Chapter 3: Sharing, Scaling and Elasticity Patterns
- Chapter 4: Reliability, Resiliency and Recovery Patterns
- Chapter 5: Data Management and Storage Device Patterns
- Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns
- Chapter 7: Monitoring, Provisioning and Administration Patterns
- Chapter 8: Cloud Service and Storage Security Patterns
- Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns
- Chapter 10: Common Compound Patterns
- Appendix A: Cloud Computing Mechanisms Glossary
- Appendix B: Alphabetical Design Patterns Reference
-
Additional Information
- Symbol Legend
- Pattern Documentation Conventions
- Updates, Errata, and Resources (www.servicetechbooks.com)
- Cloud Computing Design Patterns (www.cloudpatterns.org)
- What Is Cloud? (www.whatiscloud.com)
- Referenced Specifications (www.servicetechspecs.com)
- The Service Technology Magazine (www.servicetechmag.com)
- CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com)
- Social Media and Notification
- Chapter 2. Understanding Design Patterns
-
Chapter 3. Sharing, Scaling and Elasticity Patterns
- Shared Resources
- Workload Distribution
- Dynamic Scalability
- Service Load Balancing
- Elastic Resource Capacity
- Elastic Network Capacity
- Elastic Disk Provisioning
- Load Balanced Virtual Server Instances
- Load Balanced Virtual Switches
- Service State Management
- Storage Workload Management
- Dynamic Data Normalization
- Cross-Storage Device Vertical Tiering
- Intra-Storage Device Vertical Data Tiering
- Memory Over-Committing
- NIC Teaming
- Broad Access
-
Chapter 4. Reliability, Resiliency and Recovery Patterns
- Resource Pooling
- Resource Reservation
- Hypervisor Clustering
- Redundant Storage
- Dynamic Failure Detection and Recovery
- Multipath Resource Access
- Redundant Physical Connection for Virtual Servers
- Synchronized Operating State
- Zero Downtime
- Storage Maintenance Window
- Virtual Server Auto Crash Recovery
- Non-Disruptive Service Relocation
-
Chapter 5. Data Management and Storage Device Patterns
- Direct I/O Access
- Direct LUN Access
- Single Root I/O Virtualization
- Cloud Storage Data at Rest Encryption
- Cloud Storage Data Lifecycle Management
- Cloud Storage Data Management
- Cloud Storage Data Placement Compliance Check
- Cloud Storage Device Masking
- Cloud Storage Device Path Masking
- Cloud Storage Device Performance Enforcement
- Virtual Disk Splitting
- Sub-LUN Tiering
- RAID-Based Data Placement
- IP Storage Isolation
-
Chapter 6. Virtual Server and Hypervisor Connectivity and Management Patterns
- Virtual Server Folder Migration
- Persistent Virtual Network Configuration
- Virtual Server Connectivity Isolation
- Virtual Switch Isolation
- Virtual Server NAT Connectivity
- External Virtual Server Accessibility
- Cross-Hypervisor Workload Mobility
- Virtual Server-to-Host Affinity
- Virtual Server-to-Host Anti-Affinity
- Virtual Server-to-Host Connectivity
- Virtual Server-to-Virtual Server Affinity
- Virtual Server-to-Virtual Server Anti-Affinity
- Stateless Hypervisor
- Chapter 7. Monitoring, Provisioning and Administration Patterns
-
Chapter 8. Cloud Service and Storage Security Patterns
- Trusted Platform BIOS
- Geotagging
- Hypervisor Protection
- Cloud VM Platform Encryption
- Trusted Cloud Resource Pools
- Secure Cloud Interfaces and APIs
- Cloud Resource Access Control
- Detecting and Mitigating User-Installed VMs
- Mobile BYOD Security
- Cloud Data Breach Protection
- Permanent Data Loss Protection
- In-Transit Cloud Data Encryption
-
Chapter 9. Network Security, Identity & Access Management and Trust Assurance Patterns
- Secure On-Premise Internet Access
- Secure External Cloud Connection
- Secure Connection for Scaled VMs
- Cloud Denial-of-Service Protection
- Cloud Traffic Hijacking Protection
- Automatically Defined Perimeter
- Cloud Authentication Gateway
- Federated Cloud Authentication
- Cloud Key Management
- Trust Attestation Service
- Collaborative Monitoring and Logging
- Independent Cloud Auditing
- Threat Intelligence Processing
-
Chapter 10. Common Compound Patterns
- “Compound Pattern” vs. “Composite Pattern”
- Compound Pattern Members
- Joint Application vs. Coexistent Application
- Private Cloud
- Public Cloud
- Software-as-a-Service (SaaS)
- Platform-as-a-Service (PaaS)
- Infrastructure-as-a-Service (IaaS)
- Elastic Environment
- Multitenant Environment
- Resilient Environment
- Cloud Bursting
- Burst Out to Private Cloud
- Burst Out to Public Cloud
- Burst In
- Secure Burst Out to Private Cloud/Public Cloud
- Cloud Balancing
- Cloud Authentication
- Resource Workload Management
- Isolated Trust Boundary
-
Appendix A. Cloud Computing Mechanisms Glossary
- Application Delivery Controller (ADC)
- Attestation Service
- Attribute Authority
- Attribute-Based Access Control (ABAC) System
- Audit Monitor
- Authentication Gateway Service (AGS)
- Automated Scaling Listener
- Automatically Defined Perimeter (ADP) Controller
- Billing Management System
- Certificate
- Certificate Authority (CA)
- Certificate Revocation List (CRL)
- Certificate Trust Store
- Certificate Validation Service (CVS)
- Cloud Consumer Gateway (CCG)
- Cloud Storage Data Placement Auditor
- Cloud Storage Device
- Cloud Storage Device Performance Monitor
- Cloud Storage Management Portal
- Cloud Usage Monitor
- Cloud Workload Scheduler
- Cloud-based Security Groups
- Cryptographic Key Management System (CKMS)
- Digital Signature
- Domain Name Service (DNS)
- Encryption
- Endpoint Threat Detection and Response (ETDR)
- Enterprise Mobility Management (EMM) System
- Failover System
- Geotag
- Hardened Virtual Server Image
- Hardware-Based VM Discovery System
- Hardware Security Module (HSM)
- Honeypot
- Host-Based Security System (HBSS)
- Hypervisor
- Identity and Access Management (IAM)
- Intrusion Detection and Prevention System (IDPS)
- Live VM Migration
- Load Balancer
- Logical Network Perimeter
- LUN Masking
- Malware Hash
- Multi-Device Broker
- Network Forensics Monitor
- Orchestration Engine
- Pay-Per-Use Monitor
- Physical Uplink
- Platform Trust Policy
- Public Key Infrastructure (PKI)
- RAID-level Idenfitier
- Ready-Made Environment
- Remote Administration System
- Resource Cluster
- Resource Management System
- Resource Replication
- Sandbox
- Secure Token Service (STS)
- Security Information and Event Management (SIEM) System
- Single Sign-On (SSO)
- SLA Management System
- SLA Monitor
- State Management Database
- Storage Path Masking
- Sub-LUN Migration
- Threat Intelligence System
- Traffic Filter
- Traffic Monitor
- Trusted Platform Module (TPM)
- Virtual Appliance
- Virtual CPU (vCPU)
- Virtual Disk (vDisk)
- Virtual Firewall
- Virtual Infrastructure Manager (VIM)
- Virtual Network
- Virtual Private Cloud (VPC)
- Virtual Private Network (VPN)
- Virtual RAM (vRAM)
- Virtual Server
- Virtual Server Snapshot
- Virtual Server State Manager
- Virtual Switch
- Virtualization Agent
- Virtualization Monitor
- VPN Cloud Hub
- Appendix B. Alphabetical Design Patterns Reference
- About the Authors
- Index
Product information
- Title: Cloud Computing Design Patterns
- Author(s):
- Release date: March 2017
- Publisher(s): Pearson
- ISBN: 9780133858624
You might also like
book
Design Patterns for Cloud Native Applications
With the immense cost savings and scalability the cloud provides, the rationale for building cloud native …
book
Cloud Native Patterns
Cloud Native Patterns is your guide to developing strong applications that thrive in the dynamic, distributed, …
book
Cloud Architecture Patterns
If your team is investigating ways to design applications for the cloud, this concise book introduces …
book
Implementing Azure Cloud Design Patterns
A hands-on guide to mastering Azure cloud design patterns and best practices. About This Book Master …