What is the provided version of Valkey?
Stackhero strives to always provide a recent and stable version of Valkey, ensuring access to the latest features and full capabilities of your Valkey instance.
What is Valkey compared to Redis?
Valkey is an open source fork of Redis.
Redis was historically developed as an open source product. Unfortunately, Redis Inc., the company that acquired Redis, has decided to change this licence to a more restrictive one, and Redis is no longer an open source product.
Following this announcement, the Linux Foundation, the Redis community, and some core maintainers of Redis have decided to create a fork of the latest open source version of Redis, called Valkey.
Valkey now has its own development team, regular updates, and new features.
Are some Valkey commands restricted?
We do not restrict access to any Valkey command. You have full and unlimited access.
Is it possible to connect to the instance using SSH?
Since Stackhero provides managed services, SSH access is not available. For any installation needs, please contact support to explore possible solutions.
Is it possible to restrict access based on IPs using a firewall?
Absolutely! Your instance has its own firewall where you can decide which IPs have access to which port in two clicks.
Which cloud providers are used by Stackhero?
We developed our own cloud software solution, making us entirely independent from cloud providers. We deploy this innovative solution directly on bare-metal servers, offering you exceptional performance and stability.
Where is the data hosted?
Stackhero is a French company operating under European and French laws.
Servers are located, depending on your choice, either in the European Union (France) or in the USA.
Backups are stored in the European Union.
What is the software infrastructure?
Your service consists of multiple subservices. All of them operate in containers within a virtual machine entirely dedicated to you.
This VM is completely private and isolated from other clients, providing a highly secure environment with very high performance.
It is hosted on a bare-metal server running Stackhero DC OS, our own Linux distribution.
What about disk performance?
We use disks that are physically connected to your instances.
We do not use network disks, unlike traditional cloud solutions, which are slow and costly.
This way, we ensure optimal performance and exceptional IOPS.
What is the atomic backup system?
The issue with traditional backup systems is that files are saved at different time intervals.
Let's say you have 2 files, a.txt and b.txt. Your backup starts at 9am and finishes at 10am.
The file a.txt will contain data from 9am and b.txt will contain data from 10am.
This is typical in backup systems and presents a significant problem leading to consistency issues.
This is why we developed an in-house backup system that captures an atomic image of your instance at a precise moment.
Atomic in the sense that we can guarantee all files from the backup are taken exactly at the same time.
If your backup starts at 9am, all files will have data from 9am. You have a perfectly consistent and reliable backup.
Are the backups encrypted?
Backups are initially sent to a dedicated server, which verifies and validates the data. Once these checks are approved, the backups are encrypted and archived.
Encryption employs ECDH and Curve25519 as part of the OpenPGP protocol, with a unique key generated for each backup.
How does billing work?
At the start of each month, our system calculates the number of hours your services were operational, and a detailed invoice is generated.
You receive a single monthly invoice that consolidates all your services, clearly explained and easy to understand. Your accounting department will appreciate that!
What certifications does Stackhero hold?
The primary mission of Stackhero is to provide a platform that is easy to use, extremely reliable, and highly secure.
A key element in achieving this mission is the annual attainment of the ISO 27001 certification, a globally recognised quality and security label.
This certification, awarded following a rigorous audit conducted by an independent external body, attests to compliance with the strictest international standards in information security.