TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Firecracker – Lightweight Virtualization for Serverless Computing

368 点作者 leef超过 6 年前

21 条评论

sudhirj超过 6 年前
What this is allows, and I&#x27;m hoping a full fledged service will be announced on Thursday or Friday, is running containers as Lambdas. i.e. if you application starts fast enough, you can just set a container to start and run as a request comes in. It can also shut down when it&#x27;s done running.<p>This allows things like per second billing for container runs, serverless containers (there&#x27;s no container running 24&#x2F;7, only when there&#x27;s traffic), etc.
评论 #18542675 未加载
评论 #18544253 未加载
评论 #18540841 未加载
评论 #18539792 未加载
评论 #18539870 未加载
评论 #18540946 未加载
blasdel超过 6 年前
There&#x27;s a Github Pages FAQ describing why it was made and how it fits with other solutions: <a href="https:&#x2F;&#x2F;firecracker-microvm.github.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;firecracker-microvm.github.io&#x2F;</a><p>and a high-level design document about how it works <a href="https:&#x2F;&#x2F;github.com&#x2F;firecracker-microvm&#x2F;firecracker&#x2F;blob&#x2F;master&#x2F;docs&#x2F;design.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;firecracker-microvm&#x2F;firecracker&#x2F;blob&#x2F;mast...</a>
评论 #18545320 未加载
krat0sprakhar超过 6 年前
&gt; Firecracker was built in a minimalist fashion. We started with crosvm and set up a minimal device model in order to reduce overhead and to enable secure multi-tenancy. Firecracker is written in Rust, a modern programming language that guarantees thread safety and prevents many types of buffer overrun errors that can lead to security vulnerabilities.<p>This is awesome! Really excited to try this out!
talawahtech超过 6 年前
This is huge! It basically removes the VM as the security boundary for something like Fargate [1]. This should lead to a significant reduction in pricing since Fargate will no longer need to over provision in the background because VMs were being used even for tiny Fargate launch types.<p>It should hopefully eliminate the cost disparity between using Fargate vs running your own instances. Should also mean much faster scale out since you containers don&#x27;t need to wait on an entire VM to boot!<p>Will be interesting to see what kind of collaboration they get on the project. This is a big test of AWS stewardship of an open source project. It seems to be competing directly with Kata Containers [2] so it will be interesting to see which solution is deemed technically superior.<p>[1] <a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;fargate&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;fargate&#x2F;</a> [2] <a href="https:&#x2F;&#x2F;katacontainers.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;katacontainers.io&#x2F;</a>
评论 #18540830 未加载
评论 #18540252 未加载
kraemate超过 6 年前
Clear containers (now called kata containers) did this more than three years ago, with similar performance numbers (sub 200 ms boot times). It is frustrating, but not surprising, to see the same regurgitated solution receive this much excitement. The firecracker documentation also does not mention the similarity with prior work, oh well.<p>[Not affiliated with Intel in any way---just a long-time proponent of the clear containers approach.]
评论 #18543179 未加载
评论 #18542773 未加载
评论 #18543690 未加载
xaduha超过 6 年前
&gt; microVMs, which provide enhanced security and workload isolation over traditional VMs, while enabling the speed and resource efficiency of containers.<p>Reminds me of rkt + kvm stage 1 <a href="https:&#x2F;&#x2F;github.com&#x2F;rkt&#x2F;rkt&#x2F;blob&#x2F;master&#x2F;Documentation&#x2F;running-kvm-stage1.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rkt&#x2F;rkt&#x2F;blob&#x2F;master&#x2F;Documentation&#x2F;running...</a><p>Too bad it didn&#x27;t take off.
tlrobinson超过 6 年前
This looks great, I’m just wondering what Amazon’s motivation for open sourcing it is. It seems like some pretty critical secret sauce for making services like Lambda and Fargate both secure and efficient.
评论 #18542532 未加载
评论 #18540596 未加载
xrd超过 6 年前
My big question is: is this something only exciting for people doing lambda at massive scale?<p>Qemu is exciting technology and has paved the way for all kinds of interesting layers. So, creating a slimmed down improvement that really makes it faster and provides a new lambda-ish execution context is great.<p>I&#x27;m sure Amazon cares about that. I&#x27;m sure people doing millions of lambda calls a day care about that.<p>But, if I&#x27;m an entrepreneur thinking about building something entirely new, is there something I&#x27;m missing about this that would make me want to consider it?<p>Lambda and Firebase Functions are exciting partially because they break services into easy to deploy chunks. And, perhaps more importantly, easy things to reason about.<p>But that&#x27;s not the big deal: the integration with storage, events, and everything else in AWS (or Firebase) is what really makes it shine. It&#x27;s all about the integration.<p>When I read this documentation, I&#x27;m left wondering whether I want to write something that uses the REST API to manage thousands of micro vms. That seems like extra work that Amazon should do, not me.<p>Am I missing something important here? Surely Amazon will integrate this solution somewhat soon and connect it to all the fun pieces of AWS, but the fact that they didn&#x27;t consider or mention it makes me think it is something I should not consider now.
Tehnix超过 6 年前
I really hope this helps with the cold start times on Lambda. We were currently looking heavily into moving our API from Lambda to EKS, but if this impacts cold start times, I think we will look at how it ends up looking like in practice.
评论 #18539958 未加载
评论 #18546855 未加载
colemickens超过 6 年前
The crosvm and Rust have me intrigued. I was hoping for something like this since I saw the first hints of Rust showing up in ChromeOS in crosvm.<p>A compare&#x2F;contrast with Kata Containers would also be interesting. Their architectures look similar. (Kata Containers [1] being another solution for running containers in KVM-isolated VMs, that has working integrations with Kubernetes and containerd already. Not affiliated, but I&#x27;m tinkering with it in a current project, though I&#x27;m also now keen to get `firecracker` working as well.)<p>Obviously, if nothing else, qemu vs crosvm is a big difference, and probably significant since my understanding is that Google chose to also eschew using qemu for Google Cloud.<p>[1]: <a href="https:&#x2F;&#x2F;katacontainers.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;katacontainers.io&#x2F;</a>
评论 #18540022 未加载
评论 #18591454 未加载
tatoalo超过 6 年前
It’s QEMU without all the legacy stuff, they also open sourced it, interesting.
评论 #18541655 未加载
mcrute超过 6 年前
More discussion here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18539532" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18539532</a>
sudhirj超过 6 年前
@zackbloom, @kentonv hint hint. Isn&#x27;t this roughly the same memory footprint as a Worker? CONTAINERS ON ALL THE CLOUDFLARE THINGS!
评论 #18542494 未加载
评论 #18540618 未加载
评论 #18540496 未加载
whalesalad超过 6 年前
I’m very excited to play with this technology in the same way I love playing with Elixir&#x2F;Erlang and userland concurrency models. I also love the <i>idea</i> of docker (and use it daily) but dislike the ergonomics. My first thought is, particularly with the emphasis on oversubscription, how does the kernel of the host schedule work?
mark212超过 6 年前
still seems much slower than the model used by Cloudflare for what they call &quot;workers.&quot;[1] A recent blog post a few weeks back was the subject of considerable discussion here[2], and it seems to me to be doing much the same thing as Firecracker, but still faster because there&#x27;s less overhead. But maybe I&#x27;m missing something.<p>[1] <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;cloud-computing-without-containers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;cloud-computing-without-containe...</a><p>[2] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18415708" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=18415708</a>
评论 #18543981 未加载
评论 #18544620 未加载
solatic超过 6 年前
&quot;Process Jail – The Firecracker process is jailed using cgroups and seccomp BPF, and has access to a small, tightly controlled list of system calls.&quot;<p>So basically, a gVisor alternative?
评论 #18540909 未加载
评论 #18540130 未加载
sdart超过 6 年前
Does this provide any multi host cluster management capabilities?
polskibus超过 6 年前
Does it support Windows?
评论 #18542737 未加载
评论 #18540791 未加载
testbotlo2超过 6 年前
Can someone explain me how does this work? Is it an orchestration service for containers like Kubernetes or is it any different?
nunez超过 6 年前
I am extremely excited by this. i wonder if this can be used to provision jit kubernetes workers.
polskibus超过 6 年前
How does this compare to containers?
评论 #18540920 未加载