All Products
Search
Document Center

Container Service for Kubernetes:Create an ACK Serverless cluster

Last Updated:Mar 10, 2026
Important

Starting February 17, 2025, Container Service for Kubernetes (ACK) Serverless no longer allows new users to create clusters. If you have never created an ACK Serverless cluster, use one of the following alternatives:

ACK Serverless clusters run containerized workloads without requiring you to provision or manage nodes. Pods scale within seconds based on CPU and memory requests, and you pay only for the resources each pod consumes. ACK Serverless fits variable workloads where on-demand scheduling reduces compute costs.

Prerequisites

Before you begin, make sure that you have:

Step 1: Open the cluster creation page

  1. Log on to the ACK console. In the left-side navigation pane, click Clusters.

  2. In the top navigation bar, select the resource group and region where you want to create the cluster. image

  3. On the Clusters page, click Create Kubernetes Cluster.

  4. Click the ACK Serverless tab.

Step 2: Configure cluster settings

Basic settings

Parameter

Description

Cluster Name

A custom name for the cluster.

Cluster Specification

Select a cluster type. You can select Pro or Basic. Pro is recommended for production and test environments. Basic is for learning and individual testing only. For more information about the differences between cluster specifications, see Comparison.

Region

The region for the cluster. Choose a region close to your users and workloads to minimize latency.

Kubernetes Version

The Kubernetes version to run. Use the latest available version unless you have a specific compatibility requirement. For supported versions, see Kubernetes versions supported by ACK.

Automatic Update

Enables periodic automatic updates of control plane components. ACK applies updates during the configured maintenance window. For details, see Automatically update a cluster.

Maintenance Window

ACK automatically updates the cluster within the maintenance window based on your configurations. You can click Set to configure the detailed maintenance policies.

Network settings

Parameter

Description

IPv6 Dual-stack

Enables IPv4/IPv6 dual-stack networking. This feature is in public preview. To enable it, submit a request in the Quota Center console. Requires Kubernetes 1.20.11-aliyun.1 or later. The VPC must support IPv4/IPv6 dual-stack.

VPC

The Virtual Private Cloud (VPC) for the cluster. Specify a zone and let ACK create a VPC automatically, or select an existing VPC from the list.

Configure SNAT for VPC

Configures Source Network Address Translation (SNAT) so that pods can access the internet. When selected, ACK handles SNAT setup automatically. See SNAT behavior for details. Do not select this option if the cluster uses a shared VPC.

vSwitch

Select an existing vSwitch from the vSwitch list or click Create vSwitch to create a vSwitch. The control plane and the default node pool use the vSwitch that you select. For high availability, select multiple vSwitches in different zones.

Security Group

The security group for the cluster. Options: Create Basic Security Group, Create Advanced Security Group, or Select Existing Security Group (available only when using an existing VPC). See Security group considerations for details.

Access to API Server

Controls how you connect to the Kubernetes API server. By default, ACK creates a pay-as-you-go internal-facing Classic Load Balancer (CLB) instance as the internal endpoint. To reuse an existing CLB instance, submit a ticket to request access first. Select Expose API server with EIP to attach an elastic IP address (EIP) and enable public access. Clear this checkbox to restrict access to the VPC only. See API server access notes for details.

Service CIDR

The CIDR block for Kubernetes Services. This block must not overlap with the VPC CIDR block, other ACK cluster CIDR blocks in the same VPC, or the pod CIDR block. This setting cannot be changed after the cluster is created. For planning guidance, see Network planning of an ACK managed cluster.

IPv6 Service CIDR Block

The IPv6 CIDR block for Services. Only applicable when IPv4/IPv6 dual-stack is enabled. Specify a Unique Local Unicast Address (ULA) range within fc00::/7 with a prefix length between 112 and 120 bits. Match the address count to your Service CIDR block. For planning guidance, see Network planning.

SNAT behavior

When you select Configure SNAT for VPC, ACK applies the following rules:

  • No existing NAT gateway: ACK creates a NAT gateway and adds vSwitch-level SNAT rules for all vSwitches used by the cluster.

  • Existing NAT gateway, no VPC-level SNAT rules: ACK adds vSwitch-level SNAT rules for all vSwitches used by the cluster.

  • Existing NAT gateway with VPC-level SNAT rules: No changes are made.

If you leave this option unselected, configure a NAT gateway and SNAT rules manually after creating the cluster. For instructions, see Create and manage an Internet NAT gateway.

Security group considerations

  • Auto-created security groups allow all outbound traffic by default. If you modify the security group rules, keep the 100.64.0.0/10 CIDR block open. This range is required for pulling container images and querying Elastic Compute Service (ECS) metadata.

  • When you select an existing security group, ACK does not configure any rules automatically. Configure the required rules manually. For details, see Configure security groups for clusters.

API server access notes

  • Do not delete the default CLB instance. Deleting it makes the API server unreachable.

  • Attaching an EIP exposes the API server to public traffic, but resources inside the cluster still cannot access the internet. To allow pods to pull public images, also select Configure SNAT for VPC.

  • The API server restarts briefly when you associate or disassociate an EIP. Avoid running cluster operations during the restart.

  • Starting December 1, 2024, newly created CLB instances incur an instance fee. For details, see CLB billing adjustments.

Advanced settings

Parameter

Description

Deletion Protection

Prevents the cluster from being accidentally deleted. Enable this for production clusters.

Resource Group

The resource group for the cluster. Each resource belongs to exactly one resource group.

Labels

Key-value pairs that help you organize and identify cloud resources.

Cluster Domain

The top-level domain suffix for in-cluster DNS. Defaults to cluster.local. For example, a Service named my-service in the default namespace resolves to my-service.default.svc.cluster.local. For notes on custom domains, see Container network FAQ.

Time Zone

The time zone of the cluster. Defaults to your browser's time zone.

Step 3: Configure components

Click Next: Component Configurations and configure the following components.

Component

Description

Service Discovery

Disable, PrivateZone, or CoreDNS. Alibaba Cloud DNS PrivateZone resolves private domain names to IP addresses within one or more VPCs. CoreDNS is a flexible DNS server and the standard Kubernetes service discovery component.

Ingress

Do Not Install, Nginx Ingress, ALB Ingress, or MSE Ingress. Nginx Ingress provides flexible routing based on Ingress resources. ALB Ingress delivers Layer-7 load balancing through Application Load Balancer (ALB) instances with support for automatic certificate discovery, HTTP/HTTPS/QUIC, and high-elasticity traffic handling. MSE Ingress uses Microservices Engine (MSE) cloud-native gateways for advanced ingress traffic management.

Container Monitoring

Enables Managed Service for Prometheus for predefined dashboards and performance metrics. Optionally install the metrics-server component for offline monitoring data.

Log Service

Select Enable Log Service to integrate with Simple Log Service (SLS). If disabled, cluster auditing is unavailable. For more information, see Quick start with Logtail.

Knative

Select Enable Knative to install the Knative serverless framework. Knative supports request-based auto scaling, scale-to-zero, version management, and canary releases.

Step 4: Confirm and create the cluster

  1. Click Next: Confirm Order.

  2. Review the cluster configuration and read the terms of service.

  3. Click Create Cluster.

Cluster creation takes approximately 10 minutes.

Verify cluster creation

After the cluster is created, it appears on the Clusters page in the ACK console.

  1. On the Clusters page, find your cluster and click Details in the Actions column.

  2. Click the Basic Information tab to view basic information about the cluster.

  3. Click the Connection Information tab to view information about how to connect to the cluster. The following information is displayed:

    • API server Public Endpoint: The IP address and port that the Kubernetes API Server uses to provide services over the Internet. It allows you to manage the cluster by using kubectl or other tools on the client.

    • API server Internal Endpoint: The IP address and port that the API server uses to provide services within the cluster. The IP address belongs to the SLB instance that is associated with the cluster.

  4. Click the Cluster Logs tab to review cluster event logs.

Manage EIP association

After cluster creation, you can associate or disassociate an EIP for public API server access:

  • Associate EIP: Select an existing EIP or create a new one. The API server restarts during this operation.

  • Disassociate EIP: Removes public access to the API server. The API server restarts during this operation.

Avoid running cluster operations while the API server restarts.