Updated on 2024-11-08 GMT+08:00

Data Protection

CCE takes different measures to keep data secure and reliable.

Table 1 CCE data protection methods and features

Measure

Description

Documentation

Certificate for service discovery

Applications in CCE clusters can use HTTPS for secure data transmission. You can create Services (Layer-4) and ingresses (Layer-7) to connect to a load balancer as required.

Configuring HTTPS Certificates

Enabling HTTP for Services

HA deployment

HA solutions in CCE:

  • Deploy three master nodes for a cluster.
  • Distribute worker nodes in different AZs
  • Create a workload and distribute it to different AZs or nodes.

Implementing High Availability for Containers in CCE

Disk encryption

CCE supports multiple types of storage resources, as well as HA and encryption measures to secure your data.

Storage Overview

Cluster secret

A secret is a cluster resource that holds sensitive data, such as authentication and key information. Its contents are user-defined. After creating secrets, you can use them as files or environment variables in a containerized workload.

Creating a Secret

Protection for critical operations

With this function enabled, the system authenticates user's identity when they perform any risky operation like deleting a cluster.

Critical Operation Protection