TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

What would make AWS even better

28 点作者 ManWith2Plans将近 3 年前

24 条评论

maxcan将近 3 年前
Long running lambda functions are called AWS Batch. It’s a relatively unknown service but pretty decent if you need something like a GPU or long running jobs and can tolerate a 90 second cold start.
评论 #32697511 未加载
评论 #32697243 未加载
pid-1将近 3 年前
Long running lambdas would be sick for infrequent &#x2F; low concurrency data pipelines.<p>My wet dream is &quot;bidirectional IaC&quot;. Let me make changes using the GUI, commit to repo automatically.
评论 #32697242 未加载
评论 #32698536 未加载
develatio将近 3 年前
Make it possible to set actual cost limits, not alarms.
评论 #32697497 未加载
mattbillenstein将近 3 年前
I feel like I&#x27;m the only engineer out there who just doesn&#x27;t care for all the complexity of the modern cloud - like, I just run Ubuntu VMs on ec2, I don&#x27;t use all the whizbang services, I just don&#x27;t care.<p>And this model lets me be cloud agnostic for the most part - I run data workloads on gcp, dev&#x2F;build workloads on linode, I&#x27;ve run bare metal in some places where I needed on-prem stuff. It&#x27;s all just very much simpler than every cloud&#x27;s flavor of doing everything slightly differently through different apis and tooling...
teilo将近 3 年前
At my company, I&#x27;ve seen too many developers trying to cram fairly complex Flask websites (providing business tools) into Lambda functions. They deploy, and then the users complain that the website, which used to be immediately available, now runs very slow, because every request is also initiating the Flask app from scratch. That&#x27;s a ridiculous amount of overhead. Tools like this belong in ECS, not Lambda. Or rewrite as a SPA and use microservices. A classic case of hammer and screw.
mocha_nate将近 3 年前
i was told that AWS Glue solves the &quot;15 minutes or more&quot; need that lambda cannot provide. never tried it so i cant say if its a good substitute.<p>that&#x27;s the only service i see OP did not mention
评论 #32697062 未加载
mchusma将近 3 年前
I am pretty surprised they don&#x27;t compete with Stripe. They have some Amazon pay thing I&#x27;d never use, but competing with Stripe seems obvious.<p>Same with Twilio. They do kind of compete with them, but not really.<p>Their managed airflow is insanely basically unusably expensive, I don&#x27;t get that.
评论 #32697304 未加载
social_quotient将近 3 年前
We have a process where we strip out the text of PDFs and shove in to elastic. The lambda starts by counting the pages and if it’s 250 or less it handles the job. If it’s larger than that we make the lambda kick the job to a temp ec2 instance which takes over the job. Our cutoff is around 250 pages but it’s highly dependent on text density.<p>It would be great if the lambda could handle running long. Id probably even be fine if the duration was punitive in that the longer you run over X time it becomes progressively more expensive. This would create a disincentive for using the service wrongly but would allow for oddball tasks.
评论 #32697484 未加载
评论 #32698552 未加载
评论 #32697408 未加载
Karunamon将近 3 年前
The audit logging story sucks unless you give them more money to understand the data they are throwing at you. I had a problem recently that was entirely Amazons fault and resulted in a massive increase in billing. I&#x27;m still trying to scrape the data together that they want to issue a credit but it&#x27;s a pain in the ass scouring through all the event logs because of all the internal stuff (do I really need a log entry every time an AWS internal process hits another AWS internal process for data?) polluting the output.
robertlagrant将近 3 年前
Having just started with AWS, I would say: letting me make a Kubernetes cluster that doesn&#x27;t require so many different cloud objects before it will start to function.
评论 #32697039 未加载
RavlaAlvar将近 3 年前
Everyone complains about the 15 minutes problem on lambda, but am I the only that have a problem with the 250MB deployment size limit?
评论 #32697496 未加载
评论 #32697156 未加载
评论 #32697255 未加载
hactually将近 3 年前
Being able to save state and restore it. Bonus points for being able to browse other configs, remix them and deploy them too.
lucb1e将近 3 年前
TL;DR: &quot;Long running lambda functions. Subscribe and hit the bell to learn when I announce the next one!&quot;
datalopers将近 3 年前
Lambda is insanely expensive is why they don’t allow long-running jobs. A 1GB allocation is $43&#x2F;mo. And most lambda users are running 1 single task&#x2F;process per lambda invocation.
评论 #32697049 未加载
评论 #32698015 未加载
astonex将近 3 年前
I would feel better about using AWS if Amazon they treated all of their employees properly, including those in the warehouses doing hard physical labour.
raverbashing将近 3 年前
Yes, it can be improved<p>It feels things like the S3 API are design by committee. If you use tools like the cli you&#x27;ll notice how clunky it is
thiht将近 3 年前
Environment variables on lambda aliases would be a good thing to implement, to make the thing somewhat usable.
taf2将近 3 年前
IMO discounts would make aws better… the kind you get when you use more and can negotiate
评论 #32697475 未加载
nowandlater将近 3 年前
For long running tasks I like to use CodeBuild, ECS Fargate (task) is also an option.
评论 #32697286 未加载
nathants将近 3 年前
a good pattern is using lambda to boot and then monitor ec2 spot. you the flexibility of lambda and the power of ec2 spot.<p>some external event triggers the boot lambda.<p>1 minute schedule triggers the monitor lambda.
smcleod将近 3 年前
Completely scrap Cloudformation and CDK and come up with something that requires &#x2F;less&#x2F; code - not more, and has resource changes applied in parallel where possible. CFn is pretty garage - CDK just makes it more complex.
评论 #32697965 未加载
yrgulation将近 3 年前
Anything.
paranoidrobot将近 3 年前
Network Load Balancers supporting security groups.<p>I&#x27;ve gone through a bunch of audits, and automated scans, and I constantly have to explain this shit, even to AWS Employees.<p>How it works with ALBs, which do support security groups:<p>You want to receive traffic on port :443, and allow it to be accessible to the world. You have EC2 instances, and they are listening on the VPC at port :1234<p>So, you create:<p>- ALB my_alb which listens on :443, and forwards traffic to tg_traffic<p>- Target group tg_traffic, which contains the EC2 instances and targets the EC2 instance with port 1234<p>- Security Group sg_alb, attached to my_alb with two rules:<p><pre><code> - rule 1, inbound, from 0.0.0.0&#x2F;0:443 - rule 2, outbound, to sg_servers:1234 </code></pre> - Security Group sg_servers, attached to the EC2 instances with one rule:<p><pre><code> - rule 1, inbound from sg_alb:1234 </code></pre> This makes everyone happy. The rules require that traffic from the internet has to go through the ALB.<p>Now how it works on a NLB, with the same scenario:<p>You want to receive traffic on port :443, and allow it to be accessible to the world. You have EC2 instances, and they are listening on the VPC at port :1234<p>However, NLBs, as mentioned, don&#x27;t support security groups.<p>So, you create:<p>- NLB my_nlb which listens on :443, and forwards traffic to tg_traffic<p>- Target group tg_traffic, which contains the EC2 instances and targets the EC2 instance with port 1234<p>- Security Group sg_servers, attached to the EC2 instances with one rule:<p><pre><code> - rule 1, inbound from 0.0.0.0:1234 (not :443, because the NLB translates the port for you, but not the source ip) </code></pre> ...that&#x27;s it.<p>However, now every audit&#x2F;automated scan of the EC2 instance &amp; it&#x27;s security group is going to see that you&#x27;re listening on some random port, and allowing traffic from anywhere. This throws errors&#x2F;alerts all the time. Even AWS&#x27;s automated scans are throwing these alerts.<p>When it&#x27;s an auditor you have to take the time to explain that, no, that&#x27;s how NLBs work. For automated scans, you have to just ignore the warnings&#x2F;errors constantly.<p>If your instance has no public IP associated, then at least only that port is exposed, and traffic does have to go through the NLB.<p>If for some reason the instance does have a public IP associated, then anyone who can reach the public IP can bypass your NLB.<p>If you could have a SG attached, then you could force the traffic to go via the NLB and not come direct to the instance.
评论 #32698046 未加载
评论 #32699890 未加载
killyourcar将近 3 年前
What about, &quot;treat AWS workers better&quot;? Pay your people for their on call hours! Let them work on side projects and games in their spare time! Give them more than seven paid holidays. Give them more than two weeks vacation!<p>Only six weeks of paid parental leave?<p>I would absolutely be willing to pay more for AWS if I knew that amount was going to treating the poor folks who built it all better.
评论 #32697562 未加载
评论 #32697561 未加载
评论 #32697331 未加载
评论 #32697316 未加载