TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

What would make AWS even better

28 pointsby ManWith2Plansover 2 years ago

24 comments

maxcanover 2 years ago
Long running lambda functions are called AWS Batch. It’s a relatively unknown service but pretty decent if you need something like a GPU or long running jobs and can tolerate a 90 second cold start.
评论 #32697511 未加载
评论 #32697243 未加载
pid-1over 2 years ago
Long running lambdas would be sick for infrequent &#x2F; low concurrency data pipelines.<p>My wet dream is &quot;bidirectional IaC&quot;. Let me make changes using the GUI, commit to repo automatically.
评论 #32697242 未加载
评论 #32698536 未加载
develatioover 2 years ago
Make it possible to set actual cost limits, not alarms.
评论 #32697497 未加载
mattbillensteinover 2 years ago
I feel like I&#x27;m the only engineer out there who just doesn&#x27;t care for all the complexity of the modern cloud - like, I just run Ubuntu VMs on ec2, I don&#x27;t use all the whizbang services, I just don&#x27;t care.<p>And this model lets me be cloud agnostic for the most part - I run data workloads on gcp, dev&#x2F;build workloads on linode, I&#x27;ve run bare metal in some places where I needed on-prem stuff. It&#x27;s all just very much simpler than every cloud&#x27;s flavor of doing everything slightly differently through different apis and tooling...
teiloover 2 years ago
At my company, I&#x27;ve seen too many developers trying to cram fairly complex Flask websites (providing business tools) into Lambda functions. They deploy, and then the users complain that the website, which used to be immediately available, now runs very slow, because every request is also initiating the Flask app from scratch. That&#x27;s a ridiculous amount of overhead. Tools like this belong in ECS, not Lambda. Or rewrite as a SPA and use microservices. A classic case of hammer and screw.
mocha_nateover 2 years ago
i was told that AWS Glue solves the &quot;15 minutes or more&quot; need that lambda cannot provide. never tried it so i cant say if its a good substitute.<p>that&#x27;s the only service i see OP did not mention
评论 #32697062 未加载
mchusmaover 2 years ago
I am pretty surprised they don&#x27;t compete with Stripe. They have some Amazon pay thing I&#x27;d never use, but competing with Stripe seems obvious.<p>Same with Twilio. They do kind of compete with them, but not really.<p>Their managed airflow is insanely basically unusably expensive, I don&#x27;t get that.
评论 #32697304 未加载
social_quotientover 2 years ago
We have a process where we strip out the text of PDFs and shove in to elastic. The lambda starts by counting the pages and if it’s 250 or less it handles the job. If it’s larger than that we make the lambda kick the job to a temp ec2 instance which takes over the job. Our cutoff is around 250 pages but it’s highly dependent on text density.<p>It would be great if the lambda could handle running long. Id probably even be fine if the duration was punitive in that the longer you run over X time it becomes progressively more expensive. This would create a disincentive for using the service wrongly but would allow for oddball tasks.
评论 #32697484 未加载
评论 #32698552 未加载
评论 #32697408 未加载
Karunamonover 2 years ago
The audit logging story sucks unless you give them more money to understand the data they are throwing at you. I had a problem recently that was entirely Amazons fault and resulted in a massive increase in billing. I&#x27;m still trying to scrape the data together that they want to issue a credit but it&#x27;s a pain in the ass scouring through all the event logs because of all the internal stuff (do I really need a log entry every time an AWS internal process hits another AWS internal process for data?) polluting the output.
robertlagrantover 2 years ago
Having just started with AWS, I would say: letting me make a Kubernetes cluster that doesn&#x27;t require so many different cloud objects before it will start to function.
评论 #32697039 未加载
RavlaAlvarover 2 years ago
Everyone complains about the 15 minutes problem on lambda, but am I the only that have a problem with the 250MB deployment size limit?
评论 #32697496 未加载
评论 #32697156 未加载
评论 #32697255 未加载
hactuallyover 2 years ago
Being able to save state and restore it. Bonus points for being able to browse other configs, remix them and deploy them too.
lucb1eover 2 years ago
TL;DR: &quot;Long running lambda functions. Subscribe and hit the bell to learn when I announce the next one!&quot;
datalopersover 2 years ago
Lambda is insanely expensive is why they don’t allow long-running jobs. A 1GB allocation is $43&#x2F;mo. And most lambda users are running 1 single task&#x2F;process per lambda invocation.
评论 #32697049 未加载
评论 #32698015 未加载
astonexover 2 years ago
I would feel better about using AWS if Amazon they treated all of their employees properly, including those in the warehouses doing hard physical labour.
raverbashingover 2 years ago
Yes, it can be improved<p>It feels things like the S3 API are design by committee. If you use tools like the cli you&#x27;ll notice how clunky it is
thihtover 2 years ago
Environment variables on lambda aliases would be a good thing to implement, to make the thing somewhat usable.
taf2over 2 years ago
IMO discounts would make aws better… the kind you get when you use more and can negotiate
评论 #32697475 未加载
nowandlaterover 2 years ago
For long running tasks I like to use CodeBuild, ECS Fargate (task) is also an option.
评论 #32697286 未加载
nathantsover 2 years ago
a good pattern is using lambda to boot and then monitor ec2 spot. you the flexibility of lambda and the power of ec2 spot.<p>some external event triggers the boot lambda.<p>1 minute schedule triggers the monitor lambda.
smcleodover 2 years ago
Completely scrap Cloudformation and CDK and come up with something that requires &#x2F;less&#x2F; code - not more, and has resource changes applied in parallel where possible. CFn is pretty garage - CDK just makes it more complex.
评论 #32697965 未加载
yrgulationover 2 years ago
Anything.
paranoidrobotover 2 years ago
Network Load Balancers supporting security groups.<p>I&#x27;ve gone through a bunch of audits, and automated scans, and I constantly have to explain this shit, even to AWS Employees.<p>How it works with ALBs, which do support security groups:<p>You want to receive traffic on port :443, and allow it to be accessible to the world. You have EC2 instances, and they are listening on the VPC at port :1234<p>So, you create:<p>- ALB my_alb which listens on :443, and forwards traffic to tg_traffic<p>- Target group tg_traffic, which contains the EC2 instances and targets the EC2 instance with port 1234<p>- Security Group sg_alb, attached to my_alb with two rules:<p><pre><code> - rule 1, inbound, from 0.0.0.0&#x2F;0:443 - rule 2, outbound, to sg_servers:1234 </code></pre> - Security Group sg_servers, attached to the EC2 instances with one rule:<p><pre><code> - rule 1, inbound from sg_alb:1234 </code></pre> This makes everyone happy. The rules require that traffic from the internet has to go through the ALB.<p>Now how it works on a NLB, with the same scenario:<p>You want to receive traffic on port :443, and allow it to be accessible to the world. You have EC2 instances, and they are listening on the VPC at port :1234<p>However, NLBs, as mentioned, don&#x27;t support security groups.<p>So, you create:<p>- NLB my_nlb which listens on :443, and forwards traffic to tg_traffic<p>- Target group tg_traffic, which contains the EC2 instances and targets the EC2 instance with port 1234<p>- Security Group sg_servers, attached to the EC2 instances with one rule:<p><pre><code> - rule 1, inbound from 0.0.0.0:1234 (not :443, because the NLB translates the port for you, but not the source ip) </code></pre> ...that&#x27;s it.<p>However, now every audit&#x2F;automated scan of the EC2 instance &amp; it&#x27;s security group is going to see that you&#x27;re listening on some random port, and allowing traffic from anywhere. This throws errors&#x2F;alerts all the time. Even AWS&#x27;s automated scans are throwing these alerts.<p>When it&#x27;s an auditor you have to take the time to explain that, no, that&#x27;s how NLBs work. For automated scans, you have to just ignore the warnings&#x2F;errors constantly.<p>If your instance has no public IP associated, then at least only that port is exposed, and traffic does have to go through the NLB.<p>If for some reason the instance does have a public IP associated, then anyone who can reach the public IP can bypass your NLB.<p>If you could have a SG attached, then you could force the traffic to go via the NLB and not come direct to the instance.
评论 #32698046 未加载
评论 #32699890 未加载
killyourcarover 2 years ago
What about, &quot;treat AWS workers better&quot;? Pay your people for their on call hours! Let them work on side projects and games in their spare time! Give them more than seven paid holidays. Give them more than two weeks vacation!<p>Only six weeks of paid parental leave?<p>I would absolutely be willing to pay more for AWS if I knew that amount was going to treating the poor folks who built it all better.
评论 #32697562 未加载
评论 #32697561 未加载
评论 #32697331 未加载
评论 #32697316 未加载