Cloud bursting is an application deployment technique in which an application running in aprivate cloudor data center bursts its extra workload to apublic cloud when the demand for computing capacity spikes. This deployment model gives an organization access to more computing resources as needed.
When compute demand exceeds the capacity of a private cloud, cloud bursting gives an organization additional flexibility to deal with peaks in IT demand and frees up local resources for other critical applications.
The advantage of ahybrid cloud deployment model like cloud bursting is that an organization only pays for extra compute resources when they are needed.
In a cloud bursting model, the private cloud is the primary means of deployment, with public cloud resources being used in times of increased traffic. When a private cloud reaches its resource capacity, overflow traffic is directed toward a public cloud without service interruption. Once reduced to normal traffic levels, data is moved back to the private cloud. Cloud bursts can be triggered either automatically based on high usage demands or manually by request.
When using cloud bursting, an organization shouldconsider its level of security, platform compatibilities and compliance requirements. Because private clouds are generally more protected than public clouds, critical applications or data are not recommended for cloud bursting since that data will transition between clouds, potentiallyintroducing security and compliance risks.
IT administrators helpestablish capacity thresholds for applications in the private cloud. When workload capacity nears its threshold, the used application automatically switches to the public cloud and traffic is directed toward it. Once the spike in resource demands diminishes, the application is moved back to the private cloud or on-premises infrastructure.
An organization can take one of the following approaches to cloud bursting:
Distributed load balancing. With distributedload balancing, applications operate between a public cloud and a data center. When traffic hits its predefined threshold, an identical environment redirects workload traffic to a public cloud. This method needs an application to be deployed locally and in the public cloud and requires load balancing operations to share traffic.
Pros: This method is highly scalable, promoteshigh availability, optimizes performance and is cost-efficient.
Cons: Data consistency can be challenging. Moreendpoints can mean more security risks or a larger attack surface. Configuration can be complex, requiring specialized knowledge.
Automated bursting. This method requires an organization to set policies to define how bursting is handled. Once set, an application hosted in a private cloud can automatically burst over to a public cloud. Software is used to automatically switch the application over. This helps an organization provision cloud resources exactly when needed without delay.
Pros: This method offers elastic scalability, cost and operational efficiencies, enhanced performance and availability. Automated cloud bursting can improve the resilience of applications and services.
Cons:Data latency issues can affect performance, integration can be difficult, configuration can be complex, and automated scaling can cause costs to spike.
Manual bursting. Manual bursting enables an organization to manuallyprovision and de-provision cloud services and resources. It is suitable for temporary large cloud deployments when increased traffic is expected or to free up local resources for business-critical applications.
Pros: This method's costs are predictable. It offers greater resource control, enhanced security, and a lower risk of unauthorized data transfer.
Cons: This method takes longer to scale compared to automated methods. It requires human intervention for resource allocation and management. There can be increased operational costs and inconsistencies in process management.
Cloud bursting is recommended for high-performance, noncritical applications that handle nonsensitive information. An application can be deployed locally and then burst to the cloud to meet peak demands, or it can be moved to the public cloud to free up local resources for business-critical applications. Cloud bursting works best for applications that do not depend on a complex application delivery infrastructure or integration with other applications, components and systems internal to the data center.
When considering cloud bursting, an organization must also examine security and regulatory compliance requirements. For example, cloud bursting is often cited as a viable option for retailers that experience peaks in demand during the holiday shopping season. However, cloud computing service providers do not necessarily offer an environment compliant with thePayment Card Industry Data Security Standard, and retailers could be putting sensitive data at risk by bursting it to the public cloud.
Other applications of cloud bursting include the following:
Cloud service providers Amazon Web Services, Google Cloud and Microsoft Azure can support cloud bursting.
The main benefits of cloud bursting include the following:
Cloud bursting does come with some challenges, however. These include the following:
Other issues related to cloud bursting arise from the potential for incompatibility between the different environments and the limited availability of management tools. Cloud computing service providers andvirtualization vendors have developed tools to send workloads to the cloud and manage hybrid environments, but they often require all environments to be based on the same platform. These challenges typically lead to few companies being able to deploy cloud-bursting architectures.
The following are some tips for implementing a cloud bursting strategy:
Learn more abouthow cloud bursting worksand which applications can benefit from it.
Decentralized data centers enhance scalability, reduce latency and improve data compliance, offering a strategic shift for ...
Data center admins should adopt a composable architecture to improve resource utilization, reduce costs and enhance AI workload ...
There are regulated requirements to maintain data center equipment and functionality. ISO 14644 cleanroom standards lay out ...
The director of engineering for a Fortune 20 automotive company spoke on the latest cloud-native tools for platform engineering, ...
CIOs face mounting talent challenges as tech skills rapidly become obsolete and companies poach top performers. Five proven ...
Presentations at KubeCon 2025 detailed efforts since last year's conference to enhance support for AI on Kubernetes platforms and...
Compare Datadog vs. New Relic capabilities including alerts, log management, incident management and more. Learn which tool is ...
Many organizations struggle to manage their vast collection of AWS accounts, but Control Tower can help. The service automates ...
There are several important variables within the Amazon EKS pricing model. Dig into the numbers to ensure you deploy the service ...
Take advantage of Horizon 7 with VMC on AWS for a better hybrid cloud user experience, new use cases, and several different ...
Hock Tan talked only for several minutes during the keynote at VMware Explore 2025, but in that time, he laid the groundwork for ...
The first major revision of the VMware platform under Broadcom's ownership is now available to all VMware Cloud Foundation and ...
