Feature | Cloud container engine | Self-built Kubernetes |
Cluster Management | Users can create clusters with one click through the console, including highly available clusters across zones (AZ). Provide container-optimized Operating System image, and stable tested and security-reinforced Kubernetes and Docker versions. Support multi-cluster management, high availability clusters across AZ, and federated cluster management. | Users can manually deploy and self-develop clusters. Users can explore and self-develop clusters. |
Application Management | Support both gray release and blue-green release. Support application monitoring and autoscaling. Provide a built-in template market, and support one-click deployment of Helm applications; support service catalog to simplify cloud service integration. | Users can explore and self-develop clusters. |
Network Management | Provide high-performance VPC/ENI network plug-ins optimized for eSurfing Cloud, outperforming standard network solutions. Support container's access policies and container bandwidth limiting. | Users need to select community network plug-ins for adaptation. Users can explore and self-develop clusters. |
Storage Management | Support mounting of eSurfing Cloud Storage, providing standard CSI and FlexVolume drivers. Support automatic creation and migration of persistent volumes. | Users can explore and self-develop clusters. |
O&M Management | Support one-click upgrade to new Kubernetes versions, life cycle management of cluster components, and both manual scaling and autoscaling. Provide high-performance log collection Agent, which automatically integrates log service. | Users need to operate and maintain control plane manually. |
Service Assurance | China Telecom has implemented internal cloud applications on a large scale, with over 400 clusters, over 80,000 application instances, and a single cluster capacity of up to 5000 nodes. The professional container team at eSurfing Cloud delivers technical support and guarantees prompt responses for cluster stability and security. | Users need to establish a dedicated team. |
Security Management | Support image scanning and image signing. Support runtime security checks for containers. | Users need to build security capabilities on their own. |