Cloudflare Workers database integration with Upstash

Cloudflare Workers database integration with Upstash
Cloudflare Workers database integration with Upstash

During Developer Week we announced Database Integrations on Workers  a new and seamless way to connect with some of the most popular databases. You select the provider, authorize through an OAuth2 flow and automatically get the right configuration stored as encrypted environment variables to your Worker.

Today we are thrilled to announce that we have been working with Upstash to expand our integrations catalog. We are now offering three new integrations: Upstash Redis, Upstash Kafka and Upstash QStash. These integrations allow our customers to unlock new capabilities on Workers. Providing them with a broader range of options to meet their specific requirements.

Add the integration

We are going to show the setup process using the Upstash Redis integration.

Select your Worker, go to the Settings tab, select the Integrations tab to see all the available integrations.

Cloudflare Workers database integration with Upstash

After selecting the Upstash Redis integration we will get the following page.

Cloudflare Workers database integration with Upstash

First, you need to review and grant permissions, so the Integration can add secrets to your Worker. Second, we need to connect to Upstash using the OAuth2 flow. Third, select the Redis database we want to use. Then, the Integration will fetch the right information to generate the credentials. Finally, click “Add Continue reading

Schneider and Compass partner to streamline modular data center deployments

Schneider Electric and Compass Datacenters have announced a partnership that's aimed at expanding the two companies' production capabilities for modular data centers. They're building a 110,000 square-foot facility where they'll integrate Schneider’s power management equipment with Compass’s prefabricated data center modules in an effort to speed deployments across the US.It’s an ideal match. Schneider makes the infrastructure that runs data centers, such as power generators and HVAC systems, and Compass designs and builds data centers for hyperscalars and cloud service providers worldwide. Compass builds standard-design data centers as well as the newer modular type, which is gaining in popularity.To read this article in full, please click here

Schneider and Compass partner to streamline modular data center deployments

Schneider Electric and Compass Datacenters have announced a partnership that's aimed at expanding the two companies' production capabilities for modular data centers. They're building a 110,000 square-foot facility where they'll integrate Schneider’s power management equipment with Compass’s prefabricated data center modules in an effort to speed deployments across the US.It’s an ideal match. Schneider makes the infrastructure that runs data centers, such as power generators and HVAC systems, and Compass designs and builds data centers for hyperscalars and cloud service providers worldwide. Compass builds standard-design data centers as well as the newer modular type, which is gaining in popularity.To read this article in full, please click here

Moving tasks from foreground to background and back again

When working on the Linux command line, you can start a task, move it to the background, and, when you’re ready to reverse the process, bring it back to the foreground. When you run a command or script in the foreground, it occupies your time on the command line – until it’s finished. When you need to do something else while still allowing that first task to complete, you can move it to the background where it will continue processing and spend your time working on something else.The easiest way to do this is by typing ^z (hold the Ctrl key and press “z”) after starting the process. This stops the process. Then type “bg” to move it to the background. The jobs command will show you that it is still running.To read this article in full, please click here

Moving tasks from foreground to background and back again

When working on the Linux command line, you can start a task, move it to the background, and, when you’re ready to reverse the process, bring it back to the foreground. When you run a command or script in the foreground, it occupies your time on the command line – until it’s finished. When you need to do something else while still allowing that first task to complete, you can move it to the background where it will continue processing and spend your time working on something else.The easiest way to do this is by typing ^z (hold the Ctrl key and press “z”) after starting the process. This stops the process. Then type “bg” to move it to the background. The jobs command will show you that it is still running.To read this article in full, please click here

C. Part 00. How I have appeared here after many years in Python?

Hello my friend,

It has been a long, very long break in posting. In fact, it was almost for half a year, which are not proud of in any capacity. However, this was needed to allow my to accomplish a few things in my own study and get back even more loaded, so that I can share more useful information and insights about networking, computing, software development and IT in general.

So, Have You Stopped Doing Automation?

We have absolutely not. In fact, developing software for distributes systems, which requires network connectivity between their components, I see how critical is to have the entire IT infrastructure (including networking) to have done right. By “done right” I mean the IT/network infrastructure, which is stable, predictable and deterministic. And in the fast pace environment, where you scale your infrastructure quick up and down (we are not talking about Kubernetes here), the network automation is the only way to achieve this level of precision and sustainability. So, my dudes, network automation is THE ONLY way how the network can be operated in now and in future. Your software development/business teams will be happy if you do things in your network automated way, I Continue reading

Changing Diapers, Not Lives

When was the last time you heard a product pitch that included words like paradigm shift or disruptive or even game changing? Odds are good that covers the majority of them. Marketing teams love to sell people on the idea of radically shifting the way that they do something or revolutionizing an industry. How often do you feel that companies make something that accomplishes the goal of their marketing hype? Once a year? Once a decade? Of the things that really have changed the world, did they do it with a big splash? Or was it more of a gradual change?

Repetition and Routine

When children are small they are practically helpless. They need to be fed and held and have their diapers changed. Until they are old enough to move and have the motor functions to feed themselves they require constant care. In fact, potty training is usually one of the last things on that list above. Kids can feed themselves and walk places and still be wearing diapers. It’s just one of those things that we do as parents.

Yet, changing diapers represents a task that we usually have no issue with. Sure it’s not the most glamorous Continue reading

Flight to cloud drives IaaS networking adoption

As data, applications, and workloads continue to move to the cloud, demand for IaaS networking is surging. The market for cloud-based IaaS networking will reach $19.4 billion in total global revenues this year, according to IDC, with a compound annual growth rate of 28% projected through 2026.Increasing cloud-native application architectures, distributed workloads, and their respective integration needs are the biggest drivers of IaaS cloud networking adoption, says IDC analyst Taranvir Singh."Traditional network architectures, transports and operational models are no longer able to meet the growing requirements and objectives of enterprises’ modern networking needs," he says. "Networks need to be aligned with cloud principles."To read this article in full, please click here

Cisco buys Internet BGP monitoring firm Code BGP

Aiming to bolster its assessment of Internet traffic health, Cisco has acquired Code BGP, a privately held BGP monitoring startup, for an undisclosed amount.Code BGP will slide into Cisco’s ThousandEyes network intelligence product portfolio and bring a cloud-based platform that, among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. Border Gateway Protocol (BGP) tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco’s ThousandEyes in a blog about the acquisition. To read this article in full, please click here

Cisco buys Internet BGP monitoring firm Code BGP

Aiming to bolster its assessment of Internet traffic health, Cisco has acquired Code BGP, a privately held BGP monitoring startup, for an undisclosed amount.Code BGP will slide into Cisco’s ThousandEyes network intelligence product portfolio and bring a cloud-based platform that, among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. Border Gateway Protocol (BGP) tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco’s ThousandEyes in a blog about the acquisition. To read this article in full, please click here

Cisco buys Internet BGP monitoring firm CodeBGP

Aiming to bolster its assessment of Internet traffic health Cisco said it would buy  startup Border Gateway Protocol monitoring firm Code BGP for an undisclosed amount.Privately held Code BGP will slide into Cisco’s ThousandEyes network intelligence product portfolio and bring a cloud-based platform that among other features,  maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. BGP tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company.  Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco’s ThousandEyes in a blog about the acquisition. To read this article in full, please click here

Cisco buys Internet BGP monitoring firm CodeBGP

Aiming to bolster its assessment of Internet traffic health Cisco said it would buy  startup Border Gateway Protocol monitoring firm Code BGP for an undisclosed amount.Privately held Code BGP will slide into Cisco’s ThousandEyes network intelligence product portfolio and bring a cloud-based platform that among other features,  maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. BGP tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company.  Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco’s ThousandEyes in a blog about the acquisition. To read this article in full, please click here

Vast Data Intentionally Blurs The Line Between Storage And Database

Depending on how you look at it, a database is a kind of sophisticated storage system or storage is a kind of a reduction of a database.

The post Vast Data Intentionally Blurs The Line Between Storage And Database first appeared on The Next Platform.

Vast Data Intentionally Blurs The Line Between Storage And Database was written by Timothy Prickett Morgan at The Next Platform.

Cisco brings ransomware protection to XDR SaaS package

Cisco has added ransomware detection and recovery support to its recently unveiled Extended Detection and Response (XDR) system.The new features target recovery from ransomware attacks and come courtesy of integration with Cohesity’s DataProtect and DataHawk offerings which offer configurable ransomware recovery and rescue support for systems assigned to a protection plan. Cohesity’s platform can preserve potentially infected virtual machines for forensic investigation and protect enterprise workloads from future attacks.Cisco said that the exponential growth of ransomware and cyber extortion has made a platform approach crucial to effectively counter adversaries.  It also noted that during the second quarter of 2023, the Cisco Talos Incident Response team responded to the highest number of ransomware engagements in more than a year.To read this article in full, please click here

Cisco brings ransomware protection to XDR SaaS package

Cisco has added ransomware detection and recovery support to its recently unveiled Extended Detection and Response (XDR) system.The new features target recovery from ransomware attacks and come courtesy of integration with Cohesity’s DataProtect and DataHawk offerings which offer configurable ransomware recovery and rescue support for systems assigned to a protection plan. Cohesity’s platform can preserve potentially infected virtual machines for forensic investigation and protect enterprise workloads from future attacks.Cisco said that the exponential growth of ransomware and cyber extortion has made a platform approach crucial to effectively counter adversaries.  It also noted that during the second quarter of 2023, the Cisco Talos Incident Response team responded to the highest number of ransomware engagements in more than a year.To read this article in full, please click here

Exploring AKS networking options

At Kubecon 2023 in Amsterdam, Azure made several exciting announcements and introduced a range of updates and new options to Azure-CNI (Azure Container Networking Interface). These changes will help Azure Kubernetes Services (AKS) users to solve some of the pain points that they used to face in previous iterations of Azure-CNI such as IP exhaustion and big cluster deployments with custom IP address management (IPAM). On top of that, with this announcement Microsoft officially added an additional dataplane to the Azure platform.

The big picture

Worker nodes in an AKS (Azure Kubernetes Service) cluster are Azure VMs pre-configured with a version of Kubernetes that has been tested and certified by Azure. These clusters communicate with other Azure resources and external sources (including the internet) via the Azure virtual network (VNet).

Now, let’s delve into the role of the dataplane within this context. The dataplane operations take place within each Kubernetes node. It is responsible for handling the communication between your workloads, and cluster resources. By default, an AKS cluster is configured to utilize the Azure dataplane, which Continue reading