TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Firecracker – Lightweight Virtualization for Serverless Computing

368 pointsby leefover 6 years ago

21 comments

sudhirjover 6 years ago
What this is allows, and I&#x27;m hoping a full fledged service will be announced on Thursday or Friday, is running containers as Lambdas. i.e. if you application starts fast enough, you can just set a container to start and run as a request comes in. It can also shut down when it&#x27;s done running.<p>This allows things like per second billing for container runs, serverless containers (there&#x27;s no container running 24&#x2F;7, only when there&#x27;s traffic), etc.
评论 #18542675 未加载
评论 #18544253 未加载
评论 #18540841 未加载
评论 #18539792 未加载
评论 #18539870 未加载
评论 #18540946 未加载
blasdelover 6 years ago
There&#x27;s a Github Pages FAQ describing why it was made and how it fits with other solutions: <a href="https:&#x2F;&#x2F;firecracker-microvm.github.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;firecracker-microvm.github.io&#x2F;</a><p>and a high-level design document about how it works <a href="https:&#x2F;&#x2F;github.com&#x2F;firecracker-microvm&#x2F;firecracker&#x2F;blob&#x2F;master&#x2F;docs&#x2F;design.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;firecracker-microvm&#x2F;firecracker&#x2F;blob&#x2F;mast...</a>
评论 #18545320 未加载
krat0sprakharover 6 years ago
&gt; Firecracker was built in a minimalist fashion. We started with crosvm and set up a minimal device model in order to reduce overhead and to enable secure multi-tenancy. Firecracker is written in Rust, a modern programming language that guarantees thread safety and prevents many types of buffer overrun errors that can lead to security vulnerabilities.<p>This is awesome! Really excited to try this out!
talawahtechover 6 years ago
This is huge! It basically removes the VM as the security boundary for something like Fargate [1]. This should lead to a significant reduction in pricing since Fargate will no longer need to over provision in the background because VMs were being used even for tiny Fargate launch types.<p>It should hopefully eliminate the cost disparity between using Fargate vs running your own instances. Should also mean much faster scale out since you containers don&#x27;t need to wait on an entire VM to boot!<p>Will be interesting to see what kind of collaboration they get on the project. This is a big test of AWS stewardship of an open source project. It seems to be competing directly with Kata Containers [2] so it will be interesting to see which solution is deemed technically superior.<p>[1] <a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;fargate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;fargate&#x2F;</a> [2] <a href="https:&#x2F;&#x2F;katacontainers.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;katacontainers.io&#x2F;</a>
评论 #18540830 未加载
评论 #18540252 未加载
kraemateover 6 years ago
Clear containers (now called kata containers) did this more than three years ago, with similar performance numbers (sub 200 ms boot times). It is frustrating, but not surprising, to see the same regurgitated solution receive this much excitement. The firecracker documentation also does not mention the similarity with prior work, oh well.<p>[Not affiliated with Intel in any way---just a long-time proponent of the clear containers approach.]
评论 #18543179 未加载
评论 #18542773 未加载
评论 #18543690 未加载
xaduhaover 6 years ago
&gt; microVMs, which provide enhanced security and workload isolation over traditional VMs, while enabling the speed and resource efficiency of containers.<p>Reminds me of rkt + kvm stage 1 <a href="https:&#x2F;&#x2F;github.com&#x2F;rkt&#x2F;rkt&#x2F;blob&#x2F;master&#x2F;Documentation&#x2F;running-kvm-stage1.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rkt&#x2F;rkt&#x2F;blob&#x2F;master&#x2F;Documentation&#x2F;running...</a><p>Too bad it didn&#x27;t take off.
tlrobinsonover 6 years ago
This looks great, I’m just wondering what Amazon’s motivation for open sourcing it is. It seems like some pretty critical secret sauce for making services like Lambda and Fargate both secure and efficient.
评论 #18542532 未加载
评论 #18540596 未加载
xrdover 6 years ago
My big question is: is this something only exciting for people doing lambda at massive scale?<p>Qemu is exciting technology and has paved the way for all kinds of interesting layers. So, creating a slimmed down improvement that really makes it faster and provides a new lambda-ish execution context is great.<p>I&#x27;m sure Amazon cares about that. I&#x27;m sure people doing millions of lambda calls a day care about that.<p>But, if I&#x27;m an entrepreneur thinking about building something entirely new, is there something I&#x27;m missing about this that would make me want to consider it?<p>Lambda and Firebase Functions are exciting partially because they break services into easy to deploy chunks. And, perhaps more importantly, easy things to reason about.<p>But that&#x27;s not the big deal: the integration with storage, events, and everything else in AWS (or Firebase) is what really makes it shine. It&#x27;s all about the integration.<p>When I read this documentation, I&#x27;m left wondering whether I want to write something that uses the REST API to manage thousands of micro vms. That seems like extra work that Amazon should do, not me.<p>Am I missing something important here? Surely Amazon will integrate this solution somewhat soon and connect it to all the fun pieces of AWS, but the fact that they didn&#x27;t consider or mention it makes me think it is something I should not consider now.
Tehnixover 6 years ago
I really hope this helps with the cold start times on Lambda. We were currently looking heavily into moving our API from Lambda to EKS, but if this impacts cold start times, I think we will look at how it ends up looking like in practice.
评论 #18539958 未加载
评论 #18546855 未加载
colemickensover 6 years ago
The crosvm and Rust have me intrigued. I was hoping for something like this since I saw the first hints of Rust showing up in ChromeOS in crosvm.<p>A compare&#x2F;contrast with Kata Containers would also be interesting. Their architectures look similar. (Kata Containers [1] being another solution for running containers in KVM-isolated VMs, that has working integrations with Kubernetes and containerd already. Not affiliated, but I&#x27;m tinkering with it in a current project, though I&#x27;m also now keen to get `firecracker` working as well.)<p>Obviously, if nothing else, qemu vs crosvm is a big difference, and probably significant since my understanding is that Google chose to also eschew using qemu for Google Cloud.<p>[1]: <a href="https:&#x2F;&#x2F;katacontainers.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;katacontainers.io&#x2F;</a>
评论 #18540022 未加载
评论 #18591454 未加载
tatoaloover 6 years ago
It’s QEMU without all the legacy stuff, they also open sourced it, interesting.
评论 #18541655 未加载
mcruteover 6 years ago
More discussion here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18539532" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18539532</a>
sudhirjover 6 years ago
@zackbloom, @kentonv hint hint. Isn&#x27;t this roughly the same memory footprint as a Worker? CONTAINERS ON ALL THE CLOUDFLARE THINGS!
评论 #18542494 未加载
评论 #18540618 未加载
评论 #18540496 未加载
whalesaladover 6 years ago
I’m very excited to play with this technology in the same way I love playing with Elixir&#x2F;Erlang and userland concurrency models. I also love the <i>idea</i> of docker (and use it daily) but dislike the ergonomics. My first thought is, particularly with the emphasis on oversubscription, how does the kernel of the host schedule work?
mark212over 6 years ago
still seems much slower than the model used by Cloudflare for what they call &quot;workers.&quot;[1] A recent blog post a few weeks back was the subject of considerable discussion here[2], and it seems to me to be doing much the same thing as Firecracker, but still faster because there&#x27;s less overhead. But maybe I&#x27;m missing something.<p>[1] <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;cloud-computing-without-containers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;cloud-computing-without-containe...</a><p>[2] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18415708" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18415708</a>
评论 #18543981 未加载
评论 #18544620 未加载
solaticover 6 years ago
&quot;Process Jail – The Firecracker process is jailed using cgroups and seccomp BPF, and has access to a small, tightly controlled list of system calls.&quot;<p>So basically, a gVisor alternative?
评论 #18540909 未加载
评论 #18540130 未加载
sdartover 6 years ago
Does this provide any multi host cluster management capabilities?
polskibusover 6 years ago
Does it support Windows?
评论 #18542737 未加载
评论 #18540791 未加载
testbotlo2over 6 years ago
Can someone explain me how does this work? Is it an orchestration service for containers like Kubernetes or is it any different?
nunezover 6 years ago
I am extremely excited by this. i wonder if this can be used to provision jit kubernetes workers.
polskibusover 6 years ago
How does this compare to containers?
评论 #18540920 未加载