このチュートリアルでは、Cymbal Bank サンプル アプリケーションの Pod と Service を単一の Namespace にデプロイします。このアプローチでは、デプロイの複雑さが軽減しますが、本番環境で行うように、Namespace を使用してさまざまなチームやユーザーにリソースを割り当てることはできません。複数の Namespace を使用する Cymbal Bank サンプル アプリケーションの、より安全でプロダクション レディな例については、Cymbal Bank アプリケーション アーキテクチャをご覧ください。
Pod Disruption Budget
Pod Disruption Budget(PDB)ポリシーは、システムを変更する際に Pod が同時に停止しないようにすることで、アプリのパフォーマンスを保証します。また、複製されたアプリケーションで同時に使用できない Pod の数を制限します。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-07-10 UTC。"],[],[],null,["# Learning Path: Scale applications - Production considerations\n\n[Autopilot](/kubernetes-engine/docs/concepts/autopilot-overview)\n\n*** ** * ** ***\n\nIn this set of tutorials, some of the planning considerations are simplified\nso that you can focus on learning key Google Kubernetes Engine (GKE) features and\nservices. Before you start to create your own Google Kubernetes Engine environment similar\nto the one described in this set of tutorials, there are some additional\nplanning considerations to keep in mind. These considerations include the\ncluster management level, networking, and availability types.\n\nNetworking\n----------\n\nGKE clusters require careful IP address planning. The networking\noptions that you choose impact the architecture of your GKE\nclusters. Some of these options can't be changed after they're configured\nwithout recreating the cluster.\n\nIn this set of tutorials, you use Autopilot mode clusters that always\nuse VPC-native mode networking. VPC-native\nclusters use alias IP address ranges on GKE nodes, and are\nrequired for creating clusters on Shared VPCs. VPC-native\nclusters scale more easily than routes-based clusters without consuming\nGoogle Cloud routes and so are less susceptible to hitting routing\nlimits.\n\nBefore you create your own GKE environment and deploy workloads,\nreview the following networking guidance:\n\n- [GKE network overview](/kubernetes-engine/docs/concepts/network-overview)\n- [Best practices for GKE networking](/kubernetes-engine/docs/best-practices/networking)\n- [Plan IP addresses for GKE](/kubernetes-engine/docs/concepts/gke-ip-address-mgmt-strategies)\n\nCluster modes\n-------------\n\nIn this set of tutorials you create a regional GKE cluster that\nuses Autopilot mode. Autopilot clusters are pre-configured\nwith an optimized cluster configuration that is ready for production workloads.\nYou can alternatively use Standard mode clusters for more advanced\nconfiguration flexibility over the underlying infrastructure.\n\nFor a more comprehensive overview, review the planning documents that start with\nthe\n[cluster configuration choices](/kubernetes-engine/docs/concepts/types-of-clusters).\n\nNamespaces\n----------\n\nNamespaces let you organize your applications and isolate components from each\nother. Each namespace has its own set of resources, such as Pods, Services, and\nDeployments. For example, you can create a namespace for all your frontend\nservices and a namespace for your backend services. This grouping makes it\neasier to manage your services and to control access to them.\n\nIn this set of tutorials, you deploy the Pods and Services for the Cymbal Bank\nsample application into a single namespace. This approach reduces deployment\ncomplexity, but doesn't let you use namespaces to assign resources to different\nteams and users, as you might do in a production environment. For a more secure\nand production-ready example of the Cymbal Bank sample application that uses\nmultiple namespaces, see\n[Cymbal Bank application architecture](/architecture/enterprise-application-blueprint/cymbal-bank).\n\nPod disruption budgets\n----------------------\n\nPod Disruption Budget (PDB) policies help ensure app performance by preventing\nPods going down at the same time when you make a change to the system and limit\nthe number of simultaneously unavailable Pods in a replicated application.\n\nIn this set of tutorials, you don't configure and use PDBs. When you complete\nthe tutorial to simulate failure, your Services and nodes should all respond as\nexpected. When you deploy your own workloads, PDBs on nodes might block node\ndraining.\n\nIf you use PDBs, review your configuration before you try to cordon and drain\nnodes. If the nodes can't successfully drain, you might have problems with\nscheduled maintenance events.\n\nWhat's next\n-----------\n\nGet started by completing the\n[first tutorial to a deploy a single GKE cluster](/kubernetes-engine/docs/learn/scalable-apps-basic-deployment)\nthat runs a microservices-based application."]]