load balancing

Kufan Cloud load balancing, a load balancing service that distributes traffic to multiple ECS servers, can expand the external service capabilities of the application system through traffic distribution, and improve the availability of the application system by eliminating single points of failure.

SHOP NOW Management Console

One day no reason refund service

Product features

Product advantages

  • advantage
  • performance
  • usability
  • Scalability
  • cost
  • security
  • Kufan Cloud Load Balancing
  • The maximum concurrent number of a single cluster exceeds 10 million, which can handle the peak traffic of 20Gbps. You can safely deploy e-commerce websites, social app software, and game businesses with daily visits of more than 10 million to Kufan Cloud.
  • High availability, providing redundant backup, automatic failover, and ensuring that the back-end provides services normally, the cluster system will automatically eliminate the failed instances, and users only need to consider the back-end business code.
  • The cluster scales horizontally according to the business load to expand the external service capability of the application system, so that you don't need to worry about expansion. Users accessing resources in this process are transparent.
  • There is no need to purchase load balancing hardware, which greatly saves the cost of load balancing hardware by more than 90%.
  • Professional DDoS protection equipment is used to provide users with sophisticated anti DDOS attack capabilities for Internet applications, such as UDP, Flood, SYN Flood and CC attacks.
  •  
  • Traditional load balancing hardware
  • Traditional hardware devices, such as F5 BIG-IP and Netcaler, only support millions of connections, and the throughput is less than 5Gbps, which cannot meet the sudden and massive Web access requests such as "rush buying" and "second killing".
  • The dual host HA scheme provided by traditional hardware equipment is not enough to cope with the complex and changeable public network environment.
  • When traditional hardware devices, such as F5 BIG-IP and Netscape, encounter business bottlenecks, they need to re purchase hardware devices of higher specifications for redeployment, affecting business development.
  • The price of traditional hardware devices ranges from tens of thousands to hundreds of thousands per set, which is difficult to deploy; Professional operation and maintenance personnel are required, and hardware costs and labor costs have increased dramatically.
  • Traditional hardware equipment has limited ability to prevent DDoS intrusion
  • Open source solution
  • Self built schemes such as Nginx and HAProxy often have only tens of thousands of connections, which cannot cope with the massive concurrent requests of the Internet.
  • High requirements for technical capabilities, miscellaneous schemes, and availability can not be guaranteed.
  • Manual configuration requires manual intervention, with a long time cycle, great impact on business, and risk of operational errors.
  • The open source solution is free, but there is no unified standard, and the maintenance cost is high
  • Lack of mature security protection solutions.

Product Functions

Architecture deployment