Comparison Between Cluster Types
Comparison
CCE provides different types of clusters for you to select. The following table lists the differences between them.
Category |
Subcategory |
CCE Standard |
CCE Turbo |
CCE Autopilot |
---|---|---|---|---|
Positioning |
- |
Standard clusters that provide highly reliable and secure containers for commercial use |
Next-generation clusters designed for Cloud Native 2.0, with accelerated compute, networking, and scheduling |
Serverless clusters without user nodes and billed by actual CPU and memory usage In such clusters, no node deployment, management, or security maintenance is needed. |
Application scenario |
- |
For users who expect to use container clusters to manage applications, obtain elastic compute resources, and enable simplified management on compute, network, and storage resources |
For users who have higher requirements on performance, resource utilization, and full-scenario coverage |
For users whose services suffer frequent traffic surges, such as users in the online education and e-commerce sectors |
Specification difference |
Network model |
Cloud native 1.0 networks: for scenarios where requirements on performance are not high and there are not so many containers
|
Cloud Native 2.0 networks: for scenarios where requirements on performance are high and there are many containers Max networking scale: 2,000 nodes |
Cloud Native 2.0 networks: for scenarios where requirements on performance are high and there are many containers |
Network performance |
The container network is overlaid with the VPC network, causing certain performance loss. |
The VPC network and container network are flattened into one for zero performance loss. |
The VPC network and container network are flattened into one for zero performance loss. |
|
Network isolation |
|
Pods can be associated with security groups for isolation. This isolation policy, based on security groups, ensures consistent security isolation both within and outside of a cluster. |
Pods can be associated with security groups for isolation. This isolation policy, based on security groups, ensures consistent security isolation both within and outside of a cluster. |
|
Security isolation |
cgroups are used to isolate common containers. |
|
VM-level isolation |
|
Edge infrastructure management |
Not supported |
Management of CloudPond edge sites |
Not supported |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot