What is the provided version of Valkey?
Stackhero strives to always provide a recent and stable version of Valkey, ensuring access to the latest features and full capabilities of your Valkey instance.
What is Valkey compared to Redis?
Valkey is an open-source fork of Redis.
Redis was historically developed as an open-source product. Unfortunately, Redis Inc., the company that acquired Redis, decided to change this license to a more restrictive one, and Redis is no longer an open-source product.
Following this announcement, the Linux Foundation, the Redis community, and some core maintainers of Redis decided to create a fork of the latest open-source version of Redis, called Valkey.
Valkey now has its own development team, regular updates, and new features.
Are some Valkey commands restricted?
We do not restrict access to any Valkey command. You have full and unlimited access.
Is it possible to connect to the instance using SSH?
Since Stackhero provides managed services, SSH access is not available. For any installation needs, please contact support to explore possible solutions.
Is it possible to restrict access based on IPs with a firewall?
Absolutely! Your instance has its own firewall where you can decide which IPs have access to which port in just 2 clicks.
Which cloud providers are used by Stackhero?
We developed our own cloud software solution, making us entirely independent from cloud providers. We deploy this innovative solution directly on bare-metal servers, offering you exceptional performance and stability.
Where is the data hosted?
Stackhero is a French company operating under European and French laws.
Servers are located, depending on your choice, either in the European Union (France) or in the USA.
Backups are stored in the European Union.
What is the software infrastructure?
Your service consists of multiple subservices. All of them run in containers within a virtual machine that is entirely dedicated to you.
This VM is completely private and isolated from other clients, providing a highly secure environment with very high performance.
It is hosted on a bare-metal server running Stackhero DC OS, our own Linux distribution.
What about disk performance?
We use disks that are physically connected to your instances.
We don't use network disks, unlike traditional cloud solutions, which are slow and costly.
This way, we ensure optimal performance and exceptional IOPS.
What is the atomic backup system?
The issue with traditional backup systems is that files are saved at different time intervals.
Let's say you have 2 files, a.txt and b.txt. Your backup starts at 9 a.m. and finishes at 10 a.m.
The file a.txt will contain data from 9 a.m. and b.txt will contain data from 10 a.m.
This is common in backup systems and leads to significant consistency issues.
This is why we developed an in-house backup system that captures an atomic image of your instance at a precise moment.
Atomic in the sense that we can guarantee all files in the backup are captured at exactly the same time.
If your backup starts at 9 a.m., all files will have data from 9 a.m. You have a perfectly consistent and reliable backup.
Are the backups encrypted?
Backups are initially sent to a dedicated server, which verifies and validates the data. Once these checks are approved, the backups are encrypted and archived.
Encryption uses ECDH and Curve25519 as part of the OpenPGP protocol, with a unique key generated for each backup.
How does billing work?
At the start of each month, our system calculates the number of hours your services were operational, and a detailed invoice is generated.
You receive a single monthly invoice that consolidates all your services, clearly explained and easy to understand. Your accounting department will love it!
What certifications does Stackhero hold?
Stackhero's primary mission is to provide a platform that is easy to use, extremely reliable, and highly secure.
A key element in achieving this mission is the annual attainment of the ISO 27001 certification, a globally recognized quality and security label.
This certification, awarded following a rigorous audit conducted by an independent external body, attests to compliance with the strictest international standards in information security.