Image for post
Image for post

By Shantanu Kaushik

Firewall is a word that induces a sense of security and protection. For many years, firewalls have been the core of basic computing security, but with the introduction and evolution of the cloud, security threats, and malicious iterations of code have also evolved. To deal with evolving threats, tech giants like Alibaba Cloud created a Cloud firewall solution.

Before we discuss the Alibaba Cloud Firewall, let’s discuss some of the basics of a Cloud Firewall. A Cloud Firewall is a multi-application tool that performs security, monitoring, reporting, and self-learning using AI. …

Image for post
Image for post

As cliché as it may sound, 2020 has indeed been a challenging year for all of us, perhaps the most difficult year yet. Looking back, we’ve done well to overcome unprecedented challenges through innovative ideas, including maintaining our position as the third largest global provider for IaaS for the third consecutive year, hosting our very first fully-digital Apsara Conference, and the wide adoption of cloud native technologies for this year’s Double 11. We’ve weathered the storm of 2020, and we can only expect the best for 2021.

In this blog, we’d like to share some of our biggest achievements and innovations this year amid the “new normal”. We’d also like to take this opportunity to thank all of you for your incessant support in this eventful year.

Image for post
Image for post

By Shantanu Kaushik

A Web Application Firewall (WAF) enables the protection of your web applications by standing between the Internet and your web applications. It monitors and filters out web traffic that travels to and from your application. Web Application Firewall (WAF) works within the seventh layer of the OSI model and provides a defense mechanism against certain types of attacks, including SQL injections, cross-site scripting, Challenge Collapsar, and many more.

Alibaba Cloud Web Application Firewall is a service that competes and leads many other WAF solutions available but is different from the Cloud Firewall service we discussed previously. Alibaba Cloud WAF is primarily used as a defense mechanism to protect your website and applications.

Image for post
Image for post

By Shantanu Kaushik

DataOps is an approach to data analytics that combines storage and access to allow data engineers to adapt and leverage the benefits based on the same principles that the DevOps pipeline utilizes. As a developer, tester, or administrator, you have worked with DevOps. However, as a data analyst, you may feel left out of the DevOps revolution. Well, that is changing.

When you combine the functionality and principles associated with DevOps and Data Analytics, you get DataOps. DataOps is an extension of DevOps practices combined with Data Analytics. DevOps is all about seamless collaboration between the Developer Team, QA, and Operation Teams. …

Image for post
Image for post

By Shantanu Kaushik

DataOps or Data Operations is based on Agile methodology. It is an emerging trend for data analytics that shows the potential to revolutionize DevOps. It could be the next evolutionary step for DevOps methodology. DataOps is process-oriented and works to bring DevOps, data scientists, and engineers together to form a data-focused organizational structure with more productive tools and practices.

Alibaba Cloud has provided enterprises with the latest tools of the trade and platforms, such as IAC, to build and deploy. If you want to deploy with Alibaba Cloud, DataOps can be incorporated into your DevOps cycle easily.

Image for post
Image for post

By Fanrui

After reading this article, you will learn:

  • How to configure Apache Flink when using a large state
  • Common load balancing policies
  • Problems caused when a state disk is selected for RocksDB in the Flink source code
  • Solutions and their respective advantages and disadvantages

1. Background

Apache Flink supports multiple types of state backends. When the state is large, only RocksDBStateBackends are available.

RocksDB is a key-value (KV) database based on the Log-Structured Merge-tree (LSM-tree). Due to the severe read amplification of the LSM tree, high disk performance is required in RocksDB. We recommend using a solid-state drive (SSD) as the storage medium for RocksDB in the production environment. However, some clusters may be configured with common hard disk drives (HDDs) instead of SSDs. When Flink processes large jobs with frequent state accesses, the high I/O of the HDD may restrict the performance. …

Image for post
Image for post

The Alibaba Cloud Academy is the Training and Certification arm of Alibaba Cloud. The Academy offers over 130 online and offline certification courses that prepare customers, partners, and developers to tackle Cloud solutions with Alibaba Cloud products. In order to ensure that our materials are tailored to the needs of every customer, our certifications are divided into 5 categories: Professional, Specialty, Clouder, Free E-Learning, and Offline.

Image for post
Image for post

By Song Xintong (Wuzang)

Edited by Wang Wenjie (volunteer of Flink community)

This article is composed based on the Apache Flink series live broadcasts and shared by Song Xintong, a senior development engineer at Alibaba. It helps developers understand Flink resource management mechanism in depth from three aspects: basic concepts, current mechanisms and policies, and future development directions.

  1. Basic Concepts
  2. Current Mechanisms and Policies
  3. Future Development Directions

1. Basic Concepts

1.1 Related Components

The components introduced in this article are related to Flink resource management. A Flink cluster consists of one Flink master and multiple task managers. The Flink master and task managers are process-level components. …

Image for post
Image for post

By Li Kang

This article mainly describes the CheckPoint mechanism, backpressure mechanism, and memory model of Flink. They are the basis of Flink optimization. This article introduces Flink from the following aspects:

  1. Mechanism Explanation
  2. Performance Orientation
  3. Classic Scenario Optimization
  4. Memory Tuning

Checkpoint Mechanism

1. What Is a Checkpoint?

Flink periodically persists states to implement fault tolerance and exactly-once semantics. The persistence process is called a checkpoint. It is the snapshot of the global state of a Flink Job at a certain moment.

When you want to implement a global state retention function for a distributed system, the traditional solution introduces a unified clock and broadcasts the clock to each secondary node through the primary node in the distributed system. …

Image for post
Image for post

By Raghav K.

Almost every IT organization is making a shift to embrace DevOps. The opportunity of a considerable speed increase to the software development lifecycle and greater business agility is hard to pass. Streamlined and accelerated interactions between development and operations are simple when defined but a more complex structure when implemented.

About

Alibaba Cloud

Follow me to keep abreast with the latest technology news, industry insights, and developer trends.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store