Benefit | Description |
Powerful cluster management | Three types of clusters: ACK dedicated clusters, ACK managed clusters, and ACK Serverless clusters. By default, the management nodes of an ACK managed cluster are deployed across three zones for high availability. A single cluster supports thousands of Elastic Compute Service (ECS) nodes. For more information about quota limits, see Quota limits. Supports cross-zone clusters and registered clusters.
|
Highly elastic resource scaling | Automatically and quickly adjusts the number of containers based on resource usage. Scales out to thousands of nodes within minutes. If you use ACK Serverless and Elastic Container Instance (ECI), you can start 500 pods in 30 seconds. Supports one-click vertical scaling. Supports horizontal application scaling and resource affinity policies. Provides standard community features such as Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA), and Cluster Autoscaler. Provides scheduled scaling similar to CronHPA and serverless elastic scaling similar to vk-autoscaler. Provides fine-grained elastic scheduling for online services based on elastic workloads. Provides the alibaba-metrics-adapter for different scaling scenarios to optimize application layer scaling, such as for Ingress gateways and Sentinel-based microservice throttling.
|
All-in-one container management | |
Variety of worker nodes | By resource type: x86 computing resources: ECS instances of x86 instance families. Heterogeneous computing resources: GPU-accelerated, Field-Programmable Gate Array (FPGA)-accelerated, and Application-Specific Integrated Circuit (ASIC)-accelerated ECS instances. Bare metal computing resources: ECS Bare Metal Instances. Serverless computing resources: ACK virtual nodes. Edge nodes: ACK Edge clusters support unified management of cloud and edge nodes, and unified application publishing. This improves publishing efficiency by 3 times. For more information, see What is ACK Edge?.
By billing method: Spot instances Subscription Pay-as-you-go
|
Optimized IaaS layer capabilities | |
Enterprise-grade security and stability | ACK integrates multi-layer security protection features from the beginning of the development lifecycle. It provides comprehensive protection for cloud-native architectures, from the underlying infrastructure and intermediate software supply chain to the top-level runtime environment. End-to-end security capabilities: Infrastructure security: Supports comprehensive network security isolation and control, and end-to-end data encryption. It integrates Alibaba Cloud accounts and RAM users with the Kubernetes Role-Based Access Control (RBAC) permission system, and supports fine-grained permission management and complete auditing. Software supply chain security: Supports a complete DevSecOps pipeline that consists of image scanning, secure cloud-native delivery chains, image signing, and image synchronization. Runtime security: Provides defense-in-depth capabilities for runtimes, such as application-level security policy management, configuration inspection, runtime monitoring and alerting, and secret key encryption and management.
Default security: Provides container-optimized operating system images, and stable, security-hardened versions of Kubernetes and containerd. Hardens the security compliance of cluster configurations and system components/images based on ACK security hardening and container security best practices. Minimizes the default cloud resource permissions for nodes.
Sandboxed containers: Sandboxed-Container is a container runtime developed by ACK to enhance container security. You can use Sandboxed-Container to run an application in a sandboxed and lightweight VM, which has a dedicated kernel. Sandboxed-Container is suitable for isolating untrusted applications, unhealthy applications, low-performance applications, and workloads among users. TEE-based confidential computing: ACK provides a cloud-native, all-in-one solution for confidential computing based on Intel Software Guard Extensions (Intel SGX). This solution ensures data security, integrity, and confidentiality when you develop, manage, and deliver trusted applications and confidential computing tasks. The confidential computing capabilities provided by ACK allow you to isolate sensitive data and code by using a trusted execution environment.
|
24/7 technical support | Provides 24/7 professional technical support through a ticket system. |