tencent cloud


Deploying Containerized Applications in the Cloud

Last updated: 2022-07-13 15:36:50


    All cloud users want their migrations to the cloud to be efficient, stable, and highly available, but this depends on system availability, data reliability, and OPS stability. This document describes the check items for deploying containerized applications to the cloud from three perspectives: evaluation item, impact, and reference. This will help ensure you experience a smooth and efficient migration to Tencent Kubernetes Engine (TKE).

    Check Items

    System availability

    Cluster Before creating a cluster, plan the node network and container network to suit your application scenario to prevent restricted capacity scaling in the future. Network planning If you have small-scale subnets or container IP ranges, your cluster may support fewer nodes than your application actually needs.
  • Network Planning
  • Network Settings for Containers and Nodes
  • Before creating a cluster, review your planning of direct connect, peering connection, container IP ranges, and subnet IP ranges to prevent IP range conflicts and impacts on your applications. Network planning For simple networking scenarios, follow the instructions on the page to configure cluster-related IP ranges to avoid conflicts. For complex networking scenarios, such as peering connection, direct connect, and VPN, improper network planning can affect the normal communication within your application. -
    When you create a cluster, a new security group is automatically bound to the cluster. You can also set custom security group rules to meet the needs of your application. Deployment Security groups provide an important means of security isolation. Improper security policy configuration may lead to security-related risks, service connectivity issues, and other problems.Configuring TKE Security Groups
    As the runtime components currently supported by TKE, Containerd and Docker suit different scenarios. When creating a cluster, select the appropriate container runtime component according to your application scenarios.DeploymentOnce the cluster is created, modifications to the runtime component and version only take effect to new nodes that are not assigned to any node pool. Existing nodes are not affected.How to Choose Between Containerd and Docker
    By default, Kube-proxy uses iptables to balance the load between Service and Pod. When creating a cluster, you can quickly enable IPVS for traffic distribution and load balancing. Deployment You can enable IPVS when creating a cluster. It will take effect for the entire cluster and cannot be disabled. Enabling IPVS for a Cluster
    When creating a cluster, choose the independent cluster mode or managed cluster mode as needed.DeploymentThe Master and Etcd of the managed cluster are not user resources and are managed and maintained by Tencent Cloud's technical team. You cannot modify the deployment scale and service parameters of Master and Etcd. If you do need to modify them, choose the independent deployment mode.
  • Cluster Overview
  • Introduction to Cluster Hosting Modes
  • Workload
    When creating a workload, set the CPU and memory limits to improve the robustness of your application. Deployment When multiple applications are deployed on one node, if an application without resource upper and lower limits encounters a resource leak, exceptions will occur in other applications on the same node due to the lack of resources, and they will report monitoring information errors.Setting Resource Limits for Workloads
    When creating a workload, you can configure container health checks, which are "liveness check" and "readiness check".ReliabilityIf container health checks are not configured, when application exceptions occur, the pod will not be able to detect them to automatically restart the application for recovery. In this case, while the pod seems normal, the application in the pod will behave abnormally.Configuring Health Checks for Workloads
    When creating a service, choose the appropriate service access method as needed. Four access methods are currently supported: Via Internet, Intra-cluster, Via VPC, and Node Port Access. Deployment An improper access method may cause access logic confusion and waste resources inside and outside the service.Service Management
    When creating a workload, do not set the number of pod replicas to 1. Set a node scheduling policy based on the needs of your application. Reliability Setting the number of pod replicas to 1 incurs service exceptions when node exceptions or pod exceptions occur. To ensure that your pod can be scheduled successfully, ensure that the node has resources available for container scheduling after setting the scheduling rules.
  • Adjusting the Pod Quantity
  • Setting Scheduling Rules for Workloads
  • Data reliability

    Container data persistenceApply pod data storage and choose an appropriate volume type as needed.ReliabilityWhen a node fails to be restored following an exception, the data in the local disk cannot be restored. However, cloud storage can provide extremely high data reliability in this situation.Volume Management

    Ops stability

    EngineeringCheck whether the quotas of resources such as CVMs, VPCs, subnets, and CBS disks can meet customer needs.DeploymentInsufficient quotas will cause resource creation to fail. If you have enabled auto scaling, ensure that you have sufficient quotas for your Tencent Cloud services
  • Quota Limits for Cluster Purchase
  • Quota Limits
  • We recommend that you do not modify the kernel parameters, system configurations, versions of cluster core components, security groups, and LB parameters on the nodes in your cluster.DeploymentThis may cause TKE cluster features or Kubernetes components installed on the node to fail, making the node unavailable for application deployment.High-risk Operations in TKE
    TKE provides multidimensional monitoring and alarm features, along with basic resource monitoring provided by Cloud Monitor, to provide more refined metrics. Configuring monitoring and alarm helps you receive prompt alarms and locate faults in case of exceptions.MonitoringIf the monitoring and alarm features are not configured, no normal standard can be established for container cluster performance, and alarms will not be promptly received when an exception occurs. In this case, you will have to manually inspect your environment.
  • Setting Alarms
  • Viewing Monitoring Data
  • List of Monitoring and Alarm Metrics
  • Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support