Not Hacker News Logo

Not

Hacker

News!

Home
Hiring
Products
Companies
Discussion
Q&A
Users
Not Hacker News Logo

Not

Hacker

News!

AI-observed conversations & context

Daily AI-observed summaries, trends, and audience signals pulled from Hacker News so you can see the conversation before it hits your feed.

LiveBeta

Explore

  • Home
  • Hiring
  • Products
  • Companies
  • Discussion
  • Q&A

Resources

  • Visit Hacker News
  • HN API
  • Modal cronjobs
  • Meta Llama

Briefings

Inbox recaps on the loudest debates & under-the-radar launches.

Connect

© 2025 Not Hacker News! — independent Hacker News companion.

Not affiliated with Hacker News or Y Combinator. We simply enrich the public API with analytics.

Not Hacker News Logo

Not

Hacker

News!

Home
Hiring
Products
Companies
Discussion
Q&A
Users
  1. Home
  2. /Discussion
  3. /Leaving serverless led to performance improvement and a simplified architecture
  1. Home
  2. /Discussion
  3. /Leaving serverless led to performance improvement and a simplified architecture
Last activity about 1 month agoPosted Oct 15, 2025 at 7:20 AM EDT

Leaving Serverless Led to Performance Improvement and a Simplified Architecture

vednig
480 points
260 comments

Mood

heated

Sentiment

mixed

Category

other

Key topics

Serverless Architecture
Cloud Computing
Performance Optimization
Debate intensity80/100

The author of the article discusses how abandoning serverless architecture improved their application's performance and simplified their architecture, sparking a debate among commenters about the merits and drawbacks of serverless computing.

Snapshot generated from the HN discussion

Discussion Activity

Very active discussion

First comment

39m

Peak period

145

Day 1

Avg / period

53.3

Comment distribution160 data points
Loading chart...

Based on 160 loaded comments

Key moments

  1. 01Story posted

    Oct 15, 2025 at 7:20 AM EDT

    about 1 month ago

    Step 01
  2. 02First comment

    Oct 15, 2025 at 7:59 AM EDT

    39m after posting

    Step 02
  3. 03Peak activity

    145 comments in Day 1

    Hottest window of the conversation

    Step 03
  4. 04Latest activity

    Oct 24, 2025 at 4:10 PM EDT

    about 1 month ago

    Step 04

Generating AI Summary...

Analyzing up to 500 comments to identify key contributors and discussion patterns

Discussion (260 comments)
Showing 160 comments of 260
pjmlp
about 1 month ago
6 replies
Their problem isn't serverless, rather Cloudflare Workers and WebAssembly.

All major cloud vendors have serveless solutions based on containers, with longer managed lifetimes between requests, and naturally the ability to use properly AOT compiled languages on the containers.

OvervCW
about 1 month ago
2 replies
Agree, it seems like they decided to use Cloudflare Workers and then fought them every step of the way instead of going back and evaluating if it actually fit the use case properly.

It reminds me of the companies that start building their application using a NoSQL database and then start building their own implementation of SQL on top of it.

CuriouslyC
about 1 month ago
Ironically, I really like cloudflare but actively dislike workers and avoid them when possible. R2/KV/D1 are all fantastic and being able to shard customer data via DOs is huge, but I find myself fighting workers when I use them for non-trivial cases. Now that Cloudflare has containers I'm pushing people that way.
zaphirplane
about 1 month ago
Hey! Bet I can guess who
keyle
about 1 month ago
1 reply
You're saying serverless can have really low latency and fast 24/7?

Isn't serverless at the base the old model, of shared vms, except with a ton of people?

I'm old school I guess, baremetal for days...

pjmlp
about 1 month ago
Yes, check Cloud Run, AWS Lambda, Azure Functions with containers.
fabian2k
about 1 month ago
4 replies
At that point, why should I use serverless at all? If I have to think about the lifetime of the servers running my serverless functions?
pjmlp
about 1 month ago
4 replies
Because it is still less management effort than taking full control of the whole infrastructure.

Usually a decision factor between more serverless, or more DevOps salaries.

fabian2k
about 1 month ago
2 replies
I would doubt that this is categorically true. Serverless inherently makes the whole architecture more complex with more moving parts in most cases compared to classical web applications.
9rx
about 1 month ago
> Serverless inherently makes the whole architecture more complex with more moving parts

Why's that? Serverless is just the generic name for CGI-like technologies, and CGI is exactly how classical web application were typically deployed historically, until Rails became such a large beast that it was too slow to continue using CGI, and thus running your application as a server to work around that problem in Rails pushed it to become the norm across the industry — at least until serverless became cool again.

Making your application the server is what is more complex with more moving parts. CGI was so much simpler, albeit with the performance tradeoff.

Perhaps certain implementations make things needlessly complex, but it is not clear why you think serverless must fundamentally be that way.

pjmlp
about 1 month ago
Depends pretty much where those classical web applications are hosted, how big is the infrasture taking care of security, backups, scalability, failovers, and the amount of salaries being paid, including on-call bonus.
array_key_first
about 1 month ago
1 reply
There's a huge gap between serverless and full infra management. Also, IMO, serverless still requires engineers just to manage that. Your concerns shift, but then you need platform experts.
pjmlp
about 1 month ago
A smaller team, and from business point of view others take care of SLAs, which matters in cost center budgets.
fijiaarone
about 1 month ago
Pay 1 devops engineer 10% more and you'll get more than twice the benefit of 2 average engineers.
ramraj07
about 1 month ago
Serverless is not a panacea. And the alternative isn't always "multiple devops salaries" - unless the only two options you see are server serverless vs outrageously stupid complicated kubernetes cluster to host a website.
daxfohl
about 1 month ago
1 reply
It can be good for connecting AWS stuff to AWS stuff. "On s3 update, sync change to dynamo" or something. But even then, now you've got a separate coding, testing, deployment, monitoring, alerting, debugging pipeline from your main codebase, so is it actually worth it?

But no, I'd not put any API services/entrypoints on a lambda, ever. Maybe you could manufacture a scenario where like the API gets hit by one huge spike at a random time once per year, and you need to handle the scale immediately, and so it's much cheaper to do lambda than make EC2 available year-round for the one random event. But even then, you'd have to ensure all the API's dependencies can also scale, in which case if one of those is a different API server, then you may as well just put this API onto that server, and if one of them is a database, then the EC2 instance probably isn't going to be a large percentage of the cost anyway.

daxfohl
about 1 month ago
Actually I don't even think connecting AWS services to each other is a good reason in most cases. I've seen too many cases where things like this start off as a simple solution, but eventually you get a use case where some s3 updates should not sync to dynamo. And so then you've got to figure out a way to thread some "hints" through to the lambda, either metadata on the s3 blob, or put it in a redis instance that the lambda can query, etc., and it gets all convoluted. In those kinds of scenarios, it's almost always better just to have the logic that writes to s3 also update dynamo. That way it's all in one place, can be stepped through in a debugger, gets deployed together, etc.

There are probably exceptions, but I can't think of a single case where doing this kind of thing in a lambda didn't cause problems at some point, whereas I can't really think of an instance where putting this kind of logic directly into my main app has caused any regrets.

johannes1234321
about 1 month ago
For a thing, which permanently has load it makes little sense.

It can make sense if you have very differing load, with few notable spikes or on an all in on managed services, where serverless things are event collectors from other services ("new file in object store" - trigger function to update some index)

OvervCW
about 1 month ago
Serverless only makes sense if the lifetime doesn't matter to your application, so if you find that you need to think about your lifetime then serverless is simply not the right technology for your use case.
CuriouslyC
about 1 month ago
1 reply
Cloudflare has containers now too, and having used AppRunner and Cloud Run, it's much easier to work with. Once they get rid of the container caps and add more flexibility in terms of container resources, I would never go back to the big cloud containers, the price and ease of use of Cloudflare's containers just destroy them.
pjmlp
about 1 month ago
1 reply
I doubt that the bill would be that much cheaper, nonetheless thanks for making me aware they are a thing now.
CuriouslyC
about 1 month ago
1 reply
They're much cheaper, they're just DOs, and they get billed as such. They also have faster cold start times and automatic multi-region support.
OvervCW
about 1 month ago
1 reply
What does DO mean in this context?
CuriouslyC
about 1 month ago
Durable Object
iainmerrick
about 1 month ago
1 reply
In that scenario, how do you keep cold startup as fast as possible?

The nice thing about JS workers is that they can start really fast from cold. If you have low or irregular load, but latency is important, Cloudflare Workers or equivalent is a great solution (as the article says towards the end).

If you really need a full-featured container with AOT compiled code, won't that almost certainly have a longer cold startup time? In that scenario, surely you're better off with a dedicated server to minimise latency (assuming you care about latency). But then you lose the ability to scale down to zero, which is the key advantage of serverless.

pjmlp
about 1 month ago
Apparently not nice enough, given that they rewrote the application in Go.

Serverless with containers is basically managed Kubernetes, where someone else has the headache to keep the whole infrastructure running.

Quarrel
about 1 month ago
Indeed.

They get to the bottom of the post and drop:

> Fargate handles scaling for us without the serverless constraints

They dropped workers for containers.

muragekibicho
about 1 month ago
1 reply
Interesting writeup. The serverless approach helped with GTM. (I speculate) raising capital afforded them extra devs who noticed the cache latency.
saidinesh5
about 1 month ago
> The serverless approach helped with GTM

Unlikely? They could've just as well deployed their single go binary to a vm from day 1 and it would've been smooth sailing for their use case, while they acquire customers.

The cloudflare workers they chose aren't really suited for latency critical, high throughput APIs they were designing.

seethishat
about 1 month ago
5 replies
Linux servers running Go apps? Would be nice to see server cost and specs, backup strategy, etc.
wltr
about 1 month ago
2 replies
Backup strategy? What do you mean by that?
seethishat
about 1 month ago
3 replies
Servers go down. What is the plan to get them "backup" and running ;)
wltr
about 1 month ago
1 reply
But is this not needed with the so-called cloud systems?
hunterpayne
about 1 month ago
Only if that system is stateless. If you have any sort of internal memory that sticks around between requests, then either you face a cold start problem (because of empty caches) or you somehow need to persist that state somewhere. And persisting that state either means you need a backup solution or your latency is terrible because you are hitting network for something that only needs to hit RAM.
stackskipton
about 1 month ago
Most server outages are caused by hardware failures which EC2 MOSTLY abstracts from you.

Also, if it's just Golang, point Ansible or whatever deploys at new server and trigger a deploy.

fabian2k
about 1 month ago
They probably don't need one for the application servers. And they probably already have a backup strategy for their DBs.
illuminator83
about 1 month ago
I'm assuming "High Availability" is what is really meant here.
tpetry
about 1 month ago
1 reply
They just use two servers and configure a loadbalancer within Cloudflare. Come on. Self-Hosting is no rocket science. You don‘t have to make it seem complicated. People have been doing this decades before AWS invented serverless.
kordlessagain
about 1 month ago
Yet, idiots remain.
sgarland
about 1 month ago
TFA states that they’re running on AWS Fargate.

That said, as an example, an m8g.8xlarge gives you 32 vCPU / 128 GiB RAM for about $1000/month in us-east-1 for current on-demand pricing, and that drops to just under $700 if you can do a 1-year RI. I’m guessing this application isn’t super memory-heavy, so you could save even more by switching to the c-family: same vCPU, half the RAM.

Stick two of those behind a load balancer, and you have more compute than a lot of places actually need.

Or, if you have anything resembling PMF, spend $10K or so on a few used servers and put them into some good colo providers. They’ll do hardware replacement for you (for a fee).

gethly
about 1 month ago
What do you find so peculiar about it? A lot of people are running Go apps on VPSs.
ape4
about 1 month ago
Next article - why we switched from our own servers to serverless for reliability. A small performance hit was worth it.
1GZ0
about 1 month ago
2 replies
Somewhere in Denmark, DHH is smiling
Sammi
about 1 month ago
1 reply
I often don't know what to make of DHH. He's a living contradiction. On one hand he will continually rant about how bad the overhead and waste of cloud services is, and on the other hand he will staunchly defend the most inefficient programming language that is regularly used for backend development, as well as defend the enourmous overfetching that active record leads to.

Really I think DHH just likes to tell others what he likes.

hunterpayne
about 1 month ago
In all fairness, the performance penalty for virtualization is 4x and the penalty for interpreted code is 1.5x. So he comes out ahead, but its more in a broken watch is right twice a day sort of way.
noir_lord
about 1 month ago
Gives him a break from writing out of touch screeds about countries he knows nothing about I guess.
kburman
about 1 month ago
8 replies
The takeaway here isn’t that serverless doesn’t work, it’s that the authors didn’t understand what they were building on. Putting a latency-critical API on a stateless edge runtime was a rookie mistake, and the pain they describe was entirely predictable.
nougati
about 1 month ago
2 replies
The takeaway isn't that they didn't understand, it's that they are sharing information which you agree is valuable
kburman
about 1 month ago
2 replies
What's valuable about rediscovering that stateless architectures requiring network round-trips for state access are slower than in-memory state? This isn't new information, it's a predictable consequence of their architecture choice that anyone with distributed systems experience could have told them on day zero.
chronark_
about 1 month ago
3 replies
Not everyone is born with experience in distributed systems
sgarland
about 1 month ago
1 reply
Sure, but there are some fundamentals about latency that any programmer should know [0] (absolute values outdated, but still useful as relative comparisons), like “network calls are multiple orders of magnitude slower than IPC.”

I’m assuming you’re an employee of the company based on your comments, so please don’t take this poorly - I applaud any and all public efforts to bring back sanity to modern architecture, especially with objective metrics.

0: https://gist.github.com/hellerbarde/2843375

chronark_
about 1 month ago
I cofounded it yeah

And yeah you’re right in hindsight it was a terrible idea to begin with

I thought it could work but didn’t benchmark it enough and didn’t plan enough. It all looked great in early POCs and all of these issues cropped up as we built it

kburman
about 1 month ago
1 reply
That's fair, but then the framing matters. The article criticizes serverless architecture rather than acknowledging an evaluation failure.

"Serverless was fighting us" vs "We didn't understand serverless tradeoffs" - one is a learning experience, the other is misdirected criticism.

chronark_
about 1 month ago
Yeah that’s fair
lossolo
about 1 month ago
1 reply
You don't need experience and there is not really a lot to know about "distributed systems" in this case, that's basic CS knowledge about networks, latency and what "serverless" actually is, you can read about it. To be honest, to me it reads like people who don't understand the problem they're solving, haven't acquired the necessary knowledge to solve it (either by learning themselves or by asking/hiring people who have it), and seeing such an amateurish mistake doesn't inspire confidence for the future. You should either hire people that know what they are doing or upgrade your knowledge about systems you are using before making decisions to use them.
nougati
about 1 month ago
Sometimes I see a post about sorting algorithms online. Some people seem to benefit from reading about these things, but often, I find there isn't much new information for me. That's OK, because I know somebody somewhere benefits from knowing this.

It is your decision to make this a circlejerk of musings about how the company must be run by amateurs. Whatever crusade you're fighting in vividly criticising them is not valuable at all. People need to learn and share so we can all improve, stop distracting from that point.

bcrosby95
about 1 month ago
Uh, no, 95% of our architectures are stateless and its fine because RTT isn't dogshit, unlike AWS lambda.
ramraj07
about 1 month ago
1 reply
Bo Burmham said, "self awareness does not absolve anyone of anything"

But here I dont think they (or their defenders) are still aware of the real lesson here.

Theres literally zero information thats valuable here. Its like saying "we used an 18 wheeler as our family car and then we switched over to a regular camry and solved all our problems." What is the lesson to be learned in that statement?

The real interesting post mortem would be if they go, "god in retrospect what a stupid decision we took; what were we thinking? Why did we not take a step back earlier and think, why are we doing it this way?" If they wrote a blog post that way, that would likely have amazing takeaways.

chronark_
about 1 month ago
1 reply
I can assure you that was pretty close to the internal conversation lol

Not sure what the different takeaways would be though?

ramraj07
about 1 month ago
2 replies
What did your internal discussion conclude for the question "Why did we not take a step back earlier and think, why are we doing it this way?"

Im genuinely curious because this is not singling out your team or org, this is a very common occurrence among modern engineering teams, and I've often found myself on the losing end of such arguments. So I am all ears to hear at least one such team telling what goes on in their mind when they make terrible architecture decisions and if they learned anything philosophical that would prevent a repeat.

chronark_
about 1 month ago
Oh we had it coming for quite some time and knew we would need to rebuild it, we just didn’t have the capacity to do it unfortunately.

I was working on it on and off moving one endpoint at a time but it was very slow until we hired someone who was able to focus on it.

It didn’t feel good at all. We knew the product had massive flaws due to the latency but couldn’t address it quickly. Especially cause we he to build more workarounds as time went on. Workarounds we knew would be made redundant by the reimplementation.

I think we had that discussion if “wtf are we doing here” pretty early, but we didn’t act on it in the beginning, instead we tried different approaches to make it work within the serverless constraints cause that’s what we knew well.

hrimfaxi
about 1 month ago
I have had CTOs (two in my career) tell me we had to use our AWS credits since they were going to expire worthless. Both experiences were at vc-backed startups.
czhu12
about 1 month ago
2 replies
> Putting a latency-critical API on a stateless edge runtime

Isn’t this the whole point of serverless edge?

It’s understood to be more complex, with more vendor lockin, and more expensive.

Trade off is that it’s better supported and faster by being on the edge.

Why would anyone bother to learn a proprietary platform for non critical, latency agnostic service?

kburman
about 1 month ago
1 reply
You're confusing network proximity with application architecture. Edge deployment helps connection latency. Stateless runtime destroys it by forcing every cache access through the network.

The whole point of edge is NOT to make latency-critical APIs with heavy state requirements faster. It's to make stateless operations faster. Using it for the former is exactly the mismatch I'm describing.

Their 30ms+ cache reads vs sub-10ms target latency proves this. Edge proximity can't save you when your architecture adds 3x your latency budget per cache hit.

osigurdson
about 1 month ago
Realistically, they should be able to do sub ms cache hits which land in the same datacenter. I know cloudflare doesn't have "named" datacenters like other providers but at the end of the day, there are servers somewhere and if your lambda runs twice in the same one there is no reason why a pull-through cache can't experience a standard intra data-center latency hit.

I wonder if there is anything other than good engineering getting in the way of this and even sub us intra-process pull through caches for busy lambda functions. After all, if my lambda is getting called 1000X per second from the same point of presence, why wouldn't they keep the process in memory?

whynotmaybe
about 1 month ago
On serverless, whenever you call your code, it has to be executed but first the infrastructure has to find a place to run it and sometimes if there's no running instance available, it must fire up a new instance to run your code.

That's hot start VS cold start.

torginus
about 1 month ago
2 replies
My personal experience is that if you want guaranteed anything (quick scaling, latency, CPU, disk or network throughput), your best bet is to manually provision EC2 instances (or use some API that does). Once you give up control hoping to gain performance for free, you usually end up with an unfixable bottleneck.
randomtoast
about 1 month ago
2 replies
If you're looking for a middle ground between VMs and serverless, ECS Fargate is a good option. Because a container is always running, you won't experience any cold start times.
sgarland
about 1 month ago
1 reply
Yes, though unless you’re provisioning your own EC2s for them to run on, you have no guarantee about the server generation, and IME AWS tends to provision older stuff for Fargate.

This may or may not matter to you depending on your application’s needs, but there is a significant performance difference between, say, an m4 family (Haswell / Broadwell) and an m7i family (Sapphire Rapids) - literally a decade of hardware improvements. Memory performance in particular can be a huge hit for latency-sensitive applications.

raw_anon_1111
about 1 month ago
https://aws.amazon.com/blogs/aws/announcing-amazon-ecs-manag...
evantbyrne
about 1 month ago
3 replies
ECS is good, just expensive and still requires more devops than it should. Docker Swarm is an easy way to run production container services on VMs. I built a free golang tool called Rove that provisions fresh Ubuntu VMs in one command and diffs updates. It's also easy-enough to use Swarm directly.
TheTaytay
about 1 month ago
1 reply
Sounds useful! I hear mixed things about Swarm. You like it?

Edit: found it. Cool! https://rove.dev/

evantbyrne
about 1 month ago
Yeah I haven't had any issues with Swarm. Heard good things from people running substantial clusters. Would be interested in hearing about what rough edges people have run into as well!
torginus
about 1 month ago
2 replies
Honestly I didn't have a good experience with ECS (Fargate) - I remember I had to write a ton of CF deployment scripts+bash scripts, setting up a private AWS docker registry, having a terrible time debugging while my CF deployment always failed, deploys taking forever, finding out that AWS is too miserly to pay Docker to use the official repo so they are stuck on the free tier, meaning sometimes deploys would fail due to Dockerhub kicking the AWS docker agent out etc. It had limitations like not being able to attach a block volume to the docker instance, so overall I remember spending a week setting up the IaC for a simple-ass CRUD app on Fargate ECS.

Setting up the required roles and permissions was also a nightmare. The deployment round trip time was also awful.

The 2 good experiences I had with AWS was when we had a super smart devops guy who set up the whole docker pipeline on top of actual instances, so we could deploy our docker compose straight to a server in under 1 minute (this wasn't a scaled app), and had everything working.

Lambda is also pretty cool, you can just zip everything up and do a deploy from aws cli without much scripting and pretty straightforward IaC.

evantbyrne
about 1 month ago
A lot of AWS requires way too much config. It is a mystery to me why AWS doesn't lean into extending the capabilities of App Runner. I actually built a whole continuous deployment PaaS for AWS ECS with a Heroku-like UX, ended up shutting it down eventually because although useful, their pricing is pretty awful. What I need to do is figure out how to bring it back, just minus the hosted service so I can use it on corporate projects that require AWS...
raw_anon_1111
about 1 month ago
I posted a link to a CloudFormation template I’ve used to deploy to ECS off an on for 8 years in a sibling reply. It’s stupid simple.

But the easy solution is just to use AWS’s own Docker registry and copy the images to it. Fargate has allowed you to attach EFS volumes for years.

raw_anon_1111
about 1 month ago
1 reply
I’ve used a modified version of this for 8 years - I didn’t write it. Updating your ECS Docker image is just passing in the parameter of your new image and updating the cloudformation stack.

https://github.com/1Strategy/fargate-cloudformation-example/...

evantbyrne
about 1 month ago
Thanks for sharing! I'll bookmark that.
osigurdson
about 1 month ago
There isn't much for them to mess with in EKS either. It is very close to the metal and easy to reason about.
Esophagus4
about 1 month ago
5 replies
I’ve found this to be true, with one caveat.

Most cloud pain people experience is from a misunderstanding / abuse of solutions architecture and could have been avoided with a more thoughtful design. It tends to be a people problem, not a tool problem.

However, in my experience cloud vendors sell the snot out of their offerings, and the documentation is closer to marketing than truthful technical documentation. Their products’ genuine performance is a closely guarded proprietary secret, and the only way to find out… e.g. whether Lambdas are fast enough for your use case, or whether AWS RDS cross-region replication is good enough for you… is to run your own performance testing.

I’ve been burned enough times by AWS making it difficult to figure out exactly how performant their services are, and I’ve learned to test everything myself for the workloads I’ll be running.

Danjoe4
about 1 month ago
1 reply
This is exactly why I'd rather get a fat VPS from a reputable provider. As long as the bandwidth is sufficient the only limitation is vertical scaling.
dlisboa
about 1 month ago
3 replies
I'm partial to this, the only thing I've found that is harder to achieve is the "edge" part of cloud services. Having a server at each continent is enough for most needs but having users route to the closest one is not as clear to me.

I know about Anycast but not how to make it operational for dynamic web products (not like CDN static assets). Any tips on this?

whstl
about 1 month ago
Someone correct me if I’m wrong but:

DIY Anycast is probably beyond most people’s reach, as you need to deal with BGP directly.

One cool trick is using GeoDNS to route the same domain to a different IP depending on the location of the user, but there are some caveats of course due to caching and TTL.

EDIT: Back to Anycast, there are also some providers who allow you BGP configuration, like those: https://www.virtua.cloud/features/your-ip-space - https://us.ovhcloud.com/network/byoip - https://docs.hetzner.com/robot/colocation/pricing/ ... However you still need to get the IPs by yourself, by dealing with your Regional Registry (RIPE in my case, in Europe)

toast0
about 1 month ago
To get anycast working, you need BGP, and to get it working well, I think you need a good understanding of BGP and a lot of points of presence and well connected at each. BGP's default metric of distance is number of networks traversed, which does funny things.

Say you're in city A where you use transit provider 1 and city B where you use transit provider 2. If a user is in city B and their ISP is only connected to transit provider 1, BGP says deliver your traffic to city A, because then traffic doesn't leave transit provider 1 until it hits your network. So for every transit network you use, you really want to connect to it at all your PoPs, and you probably want to connect to as many transit networks as feasible. If you're already doing multihoming at many sites, it's something to consider; if not, it's probably a whole lot of headache.

GeoDNS as others suggested is a good option. Plenty of providers out there, it's not perfect, but it's alright.

Less so for web browsers, but you can also direct users to specific servers. Sample performance for each /24 and /48 and send users to the best server based on the statistics, use IP location as a fallback source of info. Etc. Not great for simple websites, more useful for things with interaction and to reduce the time it takes for tcp slow start (and similar) to reach the available bandwidth.

stackskipton
about 1 month ago
You could start using DNS Traffic Shaping where DNS server looks at IP making the request and returns the IP of closest server.

Azure/AWS/GCP all have solutions for this and does not require you to use their services. There are probably other DNS providers that can do it as well.

Cloudflare can also do this as well but it's probably more expensive than DNS.

whstl
about 1 month ago
2 replies
> the documentation is closer to marketing than truthful technical documentation

I participated in AWS training and certification given by AWS for a company to obtain a government contract and I can 100% say that the PAID TRAINING itself is also 100% marketing and developer evangelism.

ivape
about 1 month ago
1 reply
Infra will always be full of so much nonsense because it’s really hard to tell successful developers their code and system design is unusable. People use it because they are paid to do so usually, but it’s literally some of the worst product development I’ve ever seen.

AWS will hopefully be reduced to natural language soon enough with AI, and their product team can move on (most likely they moved on a long time ago, and the revolving door at the company meant it was going remain a shittily thought out platform in long term maintenance).

hylaride
about 1 month ago
Some things never change. I remember ~20 years ago a bunch of expensive F5s suddenly showing up to our offices because the CTO and enterprise architects were convinced that irules could solve all their performance problems for something that wasn't even cacheable (gaming results) and would have shoved too much of our logic into the underpowered CPUs on them.

They were a much nicer, if overpriced, load balancing alternative to the Cisco Content Switch we were using, though.

ecshafer
about 1 month ago
2 replies
100% agree with you. I took a corporate training, and at one point crammed for the developer cert. It it just marketing. There is never a question where the answer is "Just run this service on EC2 yourself". It is about maximizing your usage of AWS services.
raw_anon_1111
about 1 month ago
Running on EC2 is hardly ever the correct answer. I’ve had to deploy to EC2 over the years and every method is a pain.

Just use Docker, there are plenty of services where deployment is simply - “hand your container to us and we run it”.

Even the most complicated popular ways to deploy Docker are simpler than deploying to a VM and a lot less error prone.

jrs235
about 1 month ago
Platform dependency/lockin is never mentioned as a con[cern].
osigurdson
about 1 month ago
1 reply
>> is to run your own performance testing

I think they are shooting themselves in the foot with this approach. If you have to run a monte carlo simulation on every one of their services at your own time and expense just to understand performance and costs, people will naturally shy away from such black boxes.

usui
about 1 month ago
1 reply
> people will naturally shy away from such black boxes.

I don't this isn't true. In fact, it seems that in the industry, many developers don't proceed with caution and go straight into usage, only to find the problems later down the road. This is a result of intense marketing on the part of cloud providers.

ecshafer
about 1 month ago
1 reply
The fact is most developers in most companies have very little choice. Many medium to large companies (1k-50k employees) the CTO gets wined and dined by AWS/Azure/Oracle and they decide to move to that cloud. They bring in their solutions architects and do the training. The corporate architects for the divisions set the goals. So the rank and file developers get told that they have to make this work in AWS using RDS and they have almost zero power over this choice.
whstl
about 1 month ago
1 reply
It doesn't even have to be in companies that big. The AWS salespeople took the CTO and a couple of directors of engineering for diner in a fancy restaurant. That was in a fintech that had around 200 employees. AWS also paid for the mandatory marketing... sorry, mandatory training sessions we tech managers had to do.

This is how much it takes for a CTO to demand the next week that "everything should be done with AWS cloud-native stuff if possible".

osigurdson
about 1 month ago
1 reply
If the wined and dined CTO doesn't care about the costs, then the team shouldn't care either.
whstl
about 1 month ago
It does matter because it caused certain tools to be forced on the team.
stego-tech
about 1 month ago
You took the words right out of my mouth. Between aggressive salespeople marketing any given product as a panacea for everything and mandates from above to arbitrarily use X thing to do Y, there’s a lot of just plain bad architecture out there.
gonzo41
about 1 month ago
I feel like every cloud build meeting should have a moment where everyone has to defend the question "Wait! could this be a regular database with a regular app on a server with a regular cache?"
bunderbunder
about 1 month ago
1 reply
I would not assume this was a "rookie mistake". I've been here once or twice, and a common story is that engineers don't want to do it a certain way, but management overrules them for some vague hand-wavy reason like, "This way is more modern." Another common story is that you know you're not choosing the most [scalable|robust|performant|whatever] design, but ancillary constraints like time and money push you into a "worse is better" decision.

Or maybe the original implementation team really didn't know what they were doing. But I'd rather give them the benefit of the doubt. Either way, I appreciate them sharing these observations because sharing these kinds of stories is how we collectively get better as a professional community.

sunrunner
about 1 month ago
1 reply
> but management overrules them for some vague hand-wavy reason like, "This way is more modern."

This matches my experience. It's very difficult to argue against costly and/or inappropriate technical decisions in environments where the 'Senior Tech Leadership' team are just not that technical but believe they are, and so are influenced by every current industry trend masquerading as either 'scalable', 'modern' or (worst of all) 'best practice'.

bunderbunder
about 1 month ago
1 reply
What's even more dangerous is when senior tech leadership used to be technical but haven't actually got their hands dirty in 5 or 10 years, and don't realize that this means they aren't actually holding all the cards when they try to dictate these kinds of tactical, detail-oriented technical decisions.

I see this a lot in startups that grew big before they had a chance to grow up.

sunrunner
about 1 month ago
> used to be technical

And to add, this rarely indicates anything about the depth and/or breadth of the 'used to' experience.

A lot of the strongest individual contributors I see want to stay in that track and use that experience to make positive and sensible change, while the ones that move into the management tracks don't always have such motivations. There's no gatekeeping intended here, just an observation that the ones that are intrinsically motivated by the detailed technical work naturally build that knowledge base through time spent hands-on in those areas and are best able to make more impactful systemic decisions.

People in senior tech leadership also are not often exposed to the direct results of their decisions too (if they even stay in the company for long enough to see the outcome of longer-term decisions, which itself is rare).

While it's not impossible to find the folk that do have breadth of experience and depth of knowledge but are comfortable and want to be in higher-level decision making places, it's frustratingly rare. And in a lot of cases, the really good ones that speak truth to power end up in situations where 'Their last day was yesterday, we wish them all the best in their future career endeavours.' It's hardly surprising that it's a game that the most capable technical folks just don't want to play, even if they're the ones that should be playing it.

This all could just be anecdata from a dysfunctional org, of course...

ochronus
about 1 month ago
But but it's webscale!
smrtinsert
about 1 month ago
Agreed. Wondering what sort of discovery or design phase their legacy arch went thru.
compiler-guy
about 1 month ago
This is basically criticizing them for admitting to being one of today's 10,000.

https://xkcd.com/1053/

Personally, I appreciate the info and the admission.

chronark_
about 1 month ago
4 replies
Author of that blog here, happy to answer any questions :)
flerchin
about 1 month ago
1 reply
Really great writeup. The charts tell the story beautifully, and the latency gains are surely a win for your company and customers. I always wonder about the tradeoffs. Is there a measurable latency difference for your non-colocated customers? What does maintenance look like for your Go servers? I assume that your Cloudflare costs dropped?
chronark_
about 1 month ago
It’s faster for non-colocated customers too weirdly

I think cause connections can be reused more often. Cloud flare workers are really prone to doing a lot of TLS handshakes cause they spin up new ones constantly

Right now were just hang aws far hate for the go servers, so there really isn’t much maintenance at all. We’ll be moving that into eks soon though cause we are starting to add more stuff and need k8s anyways

wiether
about 1 month ago
1 reply
Not a question: thanks for the writeup and for the honesty of saying that serverless is not inherently bad, just not the right fit for your usecase!

Unfortunately too many comments here are quick to come to the wrong conclusion, based only on the title. Not a reason to change it though!

chronark_
about 1 month ago
Thanks

It’s totally fair criticism that the title and wording is a bit clickbaity

But that’s ok

synunlimited
about 1 month ago
Have you done new benchmarks since Cloudflare announced their latest round of performance improvements for Workers?

Just curious if this workload also saw some of the same improvements (on a quick read it seems like you could have been hitting the routing problem CF mentions)

Sammi
about 1 month ago
Do you have a clearer picture of what use-cases you would use serverless functions for in the future (if any)?
yilugurlu
about 1 month ago
1 reply
These two have resonated with me deeply.

- Eliminated complex caching workarounds and data pipeline overhead

- Simplified architecture from distributed system to straightforward application

We, as developers/engineers (put whatever title you want), tend to make things complex for no reason sometimes. Not all systems have to follow state-of-the-art best practices. Many times, secure, stable, durable systems outperform these fancy techs and inventions. Don't get me wrong, I love to use all of these technologies and fancy stuff, but sometimes that old, boring, monolithic API running on an EC2 solves 98% of your business problems, so no need to introduce ECS, K8S, Serverless, or whatever.

Anyway, I guess I'm getting old, or I understand the value of a resilient system, and I'm trying to find peace xD.

ramraj07
about 1 month ago
1 reply
But when were serverless systems like lambda and cloud workers "best practices" for low latency apis?
hedora
about 1 month ago
1 reply
According to their marketing material, when they started supporting running in edge pop's, they became the best option for low-latency APIs.
daxfohl
about 1 month ago
Last I heard (~5 years ago), lambda@edge doesn't actually run on edge POPs anyway; they're just hooks that you can put in your edge configs that execute logic in the nearest region before/after running your edge config. But it's definitely a datacenter round-trip to invoke them.

Adding that much compute to an edge POP is a big lift; even firecracker gets heavy at scale. And security risk for executing arbitrary code since these POPs don't have near the physical security of a datacenter, small scale makes more vulnerable to timing attacks, etc.

voodooEntity
about 1 month ago
6 replies
As someone who worked with serverless for multiple years (mostly amazon lambda but others too) i can absolutely apporove the authors points.

While it "takes away" some work from you, it adds this work on other points to solve the "artificial induced problems".

Another example i hit was a hard upload limit. Ported an application to a serverless variant, had an import API for huge customer exports. Shouldnt be a problem right? Just setup an ingest endpoint and some background workers to process the data.

Tho than i learned : i cant upload more than 100mb at a time through the "api gateway" (basically their proxy to invoke your code) and when asking if i could change it somehow i just was told to tell our customers to upload smaller file chunks.

While from a "technical" perspective this sounds logical, our customers not gonne start exchanging all their software so we get a "nicer upload strategy".

For me this is comparable with "it works in a vacuum" type of things. Its cool in theory, but as soon it hits reality you will realice quite fast that the time and money you safed on changing from permanent running machines to serverless, you will spend in other ways to solve the serverless specialities.

akdev1l
about 1 month ago
3 replies
The way to work around this issue is to provide a presigned S3 url

Have the users upload to s3 directly and then they can either POST you what they uploaded or you can find some other means of correlating the input (eg: files in s3 are prefixed with the request id or something)

I agree this is annoying and maybe I’ve been in AWS ecosystem for too long.

However having an API that accepts an unbounded amount of data is a good recipe for DoS attacks, I suppose the 100MB is outdated as internet has gotten faster but eventually we do need some limit

voodooEntity
about 1 month ago
1 reply
Well i partly agree, and if i would be the one building the counterpart, i prolly had used presigned s3 urls also.

In this specific case im getting oldschool file upload request from software that was partly written before the 2000s - noones gonne adjust anything any more.

And ye, just accepting giant size uploads is far from good in terms of "Security" like DoS - but ye we talking about stupidly somewhere between 100 and 300mb CSV files (called them "huge" because in terms of product data 200-300mb text include quite alot) - not great but well we try to satisfy our customers needs.

But ye like all the other points - everything is solvable somehow - just needs us to spend more time to solve something that technickly wasn't a real problem in first place.

Edit: Another funny example. In a similar process on another provider i downloaded files in a similar size range from S3 to parse them - which died again and again. After contacting the hoster, because their logs litearlly just stopped no error tracing nothing) they told me that basically their setup only allows for 10mb local storing - and the default (in this case aws s3 adapter for PHP) always downloads it even if you tell it to "stream". So i build a solution that used HTTP ranged requests to "fake stream" the file into memory in smaller chunks so i could process it afterwards without completely download it. Just another example of : yes its solvable, but annoying.

conductr
about 1 month ago
1 reply
I find with these types of customers it’s always easier to just ask them to save files locally and grant me privileges to read the data. Sometimes they’ll be on Google, Dropbox, Microsoft, etc and I also run a SFTP for this in case they want to move them over to my service.

Then I either batch/schedule the processing or give them an endpoint to just to trigger it (/data/import?filename=demo.csv)

It’s actually so common that I just have the “data exchange” conversation and let them decide which fits their needs best. Most of it is available for self service configuration.

darkwater
about 1 month ago
Yep, I concur. You need to meet them on their (legacy) terrain, get access to their data and then you can do any fancy thing you want to do.
reactordev
about 1 month ago
5 replies
Uploads to an S3 bucket can trigger a lambda… don’t complicate things. The upload trigger can tell the system about the upload and the client can continue on their day.

Uploader on the client uses presigned url. S3 triggers lambda. Lambda function takes file path and tells background workers about it either via queue, mq, rest, gRPC, or doing the lift in workflow etl functions.

Easy peasy. /s

stuartjohnson12
about 1 month ago
2 replies
> Uploads to an S3 bucket can trigger a lambda… don’t complicate things.

I read this and was getting ready to angrily start beating my keyboard. The best satire is hard to detect.

Dylan16807
about 1 month ago
2 replies
I don't really get the joke. S3 triggering a lambda doesn't sound meaningfully more complicated than using a lambda by itself. What am I missing?
reactordev
about 1 month ago
1 reply
Solving a serverless limitation with more serverless so you can continue doing serverless when you can’t FormUpload a simple 101mb zip file as an application/octet-stream. Doubling down on it for a triple beat.
Dylan16807
about 1 month ago
1 reply
I wouldn't really call it "more" severless to rearrange the order a bit. Which makes it "solving a serverless limitation so you can continue doing severless". And that's just a deliberately awkward way of saying "solving a serverless limitation" because if you can solve it easily why would you not continue? Spite?

So I still don't see how it's notably worse than the idea of using serverless at all.

reactordev
about 1 month ago
The controversy here is the fact that the API Gateway limits the upload resulting in having to engineer a workaround workflow using s3 and triggers (even if this is the serverless way) when all you want to do is upload a file. A POST call with an octet-octet stream. Let http handle resume. But you can’t and you end up going around the side door, when all you really want is client_body_max_size

The sarcasm of correctness yet playing down its complexity is entirely my own. We used to be able to do things easily.

akdev1l
about 1 month ago
It gets really complex in this workflow to even achieve something like “file coprocessor successfully” on the client side with this approach

how will your client know if you backend lambda crashed or whatever? All it knows is the upload to s3 succeeded

Basically you’re turning a synchronous process into asynchronous

fragmede
about 1 month ago
1 reply
unfortunately they ruined it at the end with that /s
reactordev
about 1 month ago
Did I? I don’t think I did.
themafia
about 1 month ago
2 replies
> Easy peasy. /s

It actually is though. I don't need to build a custom upload client, I don't need to manage restart behavior, I get automatic restarts if any of the background workers fail, I have a dead letter queue built in to catch unusual failures, I can tie it all together with a common API that's a first class component of the system.

Working in the cloud forces you to address the hard problems first. If you actually take the time to do this everything else becomes _absurdly_ easy.

I want to write programs. I don't want to manage failures and fix bad data in the DB directly. I personally love the cloud and this separation of concerns.

sunrunner
about 1 month ago
2 replies
> Working in the cloud forces you to address the hard problems first.

It also forces you to address all the non-existent problems first, the ones you just wish you had like all the larger companies that genuinely have to deal with thousands of file upload per second.

And don't forget all the new infrastructure you added to do the job of just receiving the file in your app server and putting it into the place it was going to go anyway but via separate components that all always seem to end up with individual repositories, separate deployment pipelines, and that can't be effectively tested in isolation without going into their target environment.

And all the additional monitoring you need on each of the individual components that were added, particularly on those helpful background workers to make sure they're actually getting triggered (you won't know they're failing if they never got called in the first place due to misconfiguration).

And you're now likely locked into your upload system being directly coupled to your cloud vendor. Oh wait, you used Minio to provide a backend-agnostic intermediate layer? Great, that's another layer that needs managing.

Is a content delivery network better suited to handling concurrent file uploads from millions of concurrent users than your app server? I'd honestly hope so, that's what it's designed for. Was it necessary? I'd like to see the numbers first.

At the end of the day, every system design decision is a trade off and almost always involves some kind of additional complexity for some benefit. It might be worth the cost, but a lot of these system designs don't need this many moving parts to achieve the same results and this only serves to add complexity without solving a direct problem.

If you're actually that company, good for you and genuinely congratulations on the business success. The problem is that companies that don't currently and may never need that are being sold system designs that, while technically more than capable, are over-designed for the problem they're solving.

themafia
about 1 month ago
2 replies
> the ones you just wish you had

You will have these problems. Not as often as the larger companies but to imagine that they simply don't exist is the opposite of sound engineering.

> if they never got called in the first place due to misconfiguration

Centralized logging is built into all these platforms. Debugging these issues is one of the things that becomes absurdly easy.

> likely locked into your upload system

The protocol provided by S3 is available through dozens of vendors.

> Was it necessary?

It only matters if it is of equivalent or lessor cost.

> every system design decision is a trade off

Yet you explicitly ignore these.

> are being sold system designs

No, I just read the documentation, and then built it. That's one of those "trade offs" you're willingly ignoring.

sunrunner
about 1 month ago
> You will have these problems. Not as often as the larger companies but to imagine that they simply don't exist is the opposite of sound engineering.

A lot of those failure mode examples seem well suited to client-side retries and appropriate rate limiting. If we're talking file uploads then sure, there absolutely are going to be cases where the benefits of having clients go to the third-party is more beneficial than costly (high variance in allowed upload size would be one to consider), but for simple upload cases I'm not so convinced that high-level client retries aren't something that would work.

> if they never got called in the first place due to misconfiguration

I find it hard to believe that having more components to monitor will ever be simpler than fewer. If we're being specific about vendors, the AWS console is IMHO the absolute worst place to go for a good centralized logging experience, so you almost certainly end up shipping your logs into a better centralized logging system that has more useful monitoring and visualisation features than CloudWatch and has the added benefit of not being the AWS console. The cost here? Financial, time, and complexity/moving parts for moving data from one to the other. Oh and don't forget to keep monitoring on the log shipping component too, that can also fail (and needs updates).

> The protocol provided by S3 is available through dozens of vendors.

It's become a de facto standard for sure, and is helpful for other vendors to re-implement it but at varying levels of compatibility.

> It only matters if it is of equivalent or lessor cost.

This is precisely the point, I'm saying that adding boxes in the system diagram is a guaranteed cost as much as a potential benefit.

> Yet you explicitly ignore these

I repeatedly mentioned things that to me count as complexity that should be considered. Additional moving parts/independent components, the associated monitoring required, repository sprawl, etc.

> No, I just read the documentation, and then built it.

I also just 'read the documention and built it', but other comments in the thread allude to vendor-specific training pushing for not only vendor-specific solutions (no surprise) but also the use of vendor-specific technology that maybe wasn't necessary for a reliable system. Why use a simple pull-based API with open standards when you can tie everything up in the world of proprietary vendor solutions that have their own common API?

jamesblonde
about 1 month ago
> The protocol provided by S3 is available through dozens of vendors.

But not all of the S3 API is supported by other vendors - the asynchronous triggers for lambdas and the CloudTrail logs that you write code to parse.

j45
about 1 month ago
Enjoyed reading this, thanks for writing it.

People often don't know how different might be easier for their case.

Following others, or the best practices, when they might not apply in their case can lead to to social proof architecture a little too often.

whstl
about 1 month ago
2 replies
> I don't need to build a custom upload client

GP said this is an app from the 2000s.

For S3 you do need to generate a presigned URL, so you would have to add this logic there somewhere instead of "just having a generic HTTP upload endpoint".

Unless the solution is "don't have the problem in the first place" the cloud limitations are just getting in the way here.

not_kurt_godel
about 1 month ago
The solution is to use the appropriate tool for the job. If you're locked in to highly crusty legacy software, it's inevitably going to require workarounds. There are good technical reasons why arbitrary-size single-part file uploads are now considered an anti-pattern. If you must support them, then don't be shocked if you wind up needing EC2 or other lower-level service as a point of ingress into your otherwise-serverless ecosystem.

If we want to treat the architectural peculiarities of GP's stack as an indictment of serverless in general, then we could just as well point to the limitations of running LAMP on a single machine as an indictment of servers in general (which obviously would be silly, since LAMP is still useful for some applications, as are bare metal servers).

reactordev
about 1 month ago
We down play how trivial it is to generate a signed url, it’s only like a few lines and a function call to get but, you then have to send this to the client. The client has to then use this url, then check back with you to see if it arrived resulting in a kind of pea soup architecture unless your application is also entirely event driven. Oh how we get suckered in…
MrDarcy
about 1 month ago
1 reply
If you don’t do it this way you fail the system design interview.
reactordev
about 1 month ago
Nope, you didn’t use terracottax so you failed anyway. 6 months before you can reapply in case the first humiliation wasn’t enough. Boss was looking for AWS Glue in there and you didn’t use it.
raw_anon_1111
about 1 month ago
1 reply
And while you are being sarcastic, this is the Right Way to use queues.

Upload file to S3 -> trigger an SNS message for fanout if you need it -> SNS -> SQS trigger -> SQS to ETL jobs.

The ETL job can then be hosted using Lambda (easiest) or ECS/Docker/Fargate (still easy and scales on demand) or even a set of EC2 instances that scale based on the items in a queue (don’t do this unless you have a legacy app that can’t be containerized).

If your client only supports SFTP, there is the SFTP Transfer Service on AWS that will allow them to send the file via SFTP and it is automatically copied to an S3 bucket.

Alternatively, there are products that treat S3 as a mountable directory and they can just use whatever copy commands on their end to copy the file to a “folder”

lumost
about 1 month ago
1 reply
If I have a user facing upload button, why can't I simply have a webserver that receives the data and pushes it into s3 via multi-part upload. Something that can be written in a framework of your choice in 10 minutes with 0 setup?

For uploads under 50 MB you could also skip the multipart upload and take a naive approach without taking a significant hit.

raw_anon_1111
about 1 month ago
You can - you generate the pre-signed S3 URL and they upload it to the place your URL tells it to.

https://fullstackdojo.medium.com/s3-upload-with-presigned-ur...

And before you cry “lock in”, S3 API compatible services are a dime a dozen outside of AWS including GCP and even Backblaze B2.

isoprophlex
about 1 month ago
Every day we stray further from the light
pluto_modadic
about 1 month ago
this kinda proves the point that you have to know a silly workaround
mulmen
about 1 month ago
1 reply
The hardest problem in computer science is coping a file from one computer to another.
hinkley
about 1 month ago
Some architectural arguments I kick myself for not establishing a bibliography of all of my justifications. The thing with mastering something is that you copy the rules into the intuitive part of your brain and you no longer have to reason through it step by step like Socrates's lectures. You just know and you do.

The biggest one I regret is "communicating through the file system is 10x dumber than you think it is, even if you think you know how dumb it is." I should have a three page bibliography on that. Mostly people don't challenge you on this, but I had one brilliant moron at my last job who did, and all I could do was stare at him like he had three heads.

markstos
about 1 month ago
1 reply
I also thought Lambda looked promising at first, but we ultimately abandoned all our Lambda projects and started using containers as needed.

Lambda still requires that you need to update the Node runtime every year or two, while with your own containers, you can decide on your own upgrade schedule.

raw_anon_1111
about 1 month ago
Not if you deploy your container to Lambda…
lumost
about 1 month ago
I've observed massive back office pipelines using dozens of interconnected lambda, batching, streaming, distributed storage for ephemeral data and other rube Goldberg contraptions to build what was ultimately a cron job on a modest server running for 1 hour.

Being in the cloud doesn't mean you need to accept timeouts/limitations. CDK+fargate can easily run an ephemeral container to perform some offline processing.

hinkley
about 1 month ago
We became the flagship customer for a division of AWS that was responsible for managing SSL certificates. We were doing vanity URLs and vanity URLs generally require individual SSL certificates for each domain name. We needed thousands and AWS tools for cert management at the time was really only happy with hundreds and they had backlog items to fix it but those were behind a year or two of other work. It took them about three months to get far enough along for our immediate needs. It's surprising the parts of AWS that have not adjusted to outliers that don't seem really to be that exceptional.
jasonjayr
about 1 month ago
Just to help future readers, there is an ecosystem of "tus" uploaders and endpoints, that chunk uploads, and feature resumeable uploads, that would be ideal for this kind of restriction:

https://tus.io/

tacker2000
about 1 month ago
1 reply
Incredible that these kinds of services were hosted like this.

I guess they never came out of MVP, which could warrant using serverless, but in the end it makes 0 sense to use some slow solution like this for the service they are offering.

Why didnt they go with a self hosted backend right away?

Its funny how nowadays most devs are too scared to roll their own and just go with the cloud offerings that cost them tech debt and actual money down the road.

chronark_
about 1 month ago
We did initially but thought cloud flare was a better solution for scalability and latency.

We believed their docs/marketing without doing extensive benchmarks, which is on us.

The appeal was also to use the same typescript stack across everything, which was nice to work with

hshdhdhehd
about 1 month ago
30ms P99 does not a cache make.

Source work somewhere where you easily get 1ms cached relational DB reads from outside the service.

30ms makes me suspect it went cross region.

kunley
about 1 month ago
For a best price-to-performance ratio create your instances and do whatever is needed on them. Software stacks are not that complicated to delegate everything to the Wizards of Cloud Overcharging.
torginus
about 1 month ago
I think someone should make a timeline of software technology eras, each beginning with 'why XYZ is the future' and ending with articles like this.
1-6
about 1 month ago
I think this is what is being said:

"Down with serverless! Long live serverless!"

100 more comments available on Hacker News

View full discussion on Hacker News
ID: 45590756Type: storyLast synced: 11/20/2025, 8:23:06 PM

Want the full context?

Jump to the original sources

Read the primary article or dive into the live Hacker News thread when you're ready.

Read ArticleView on HN
Not Hacker News Logo

Not

Hacker

News!

AI-observed conversations & context

Daily AI-observed summaries, trends, and audience signals pulled from Hacker News so you can see the conversation before it hits your feed.

LiveBeta

Explore

  • Home
  • Hiring
  • Products
  • Companies
  • Discussion
  • Q&A

Resources

  • Visit Hacker News
  • HN API
  • Modal cronjobs
  • Meta Llama

Briefings

Inbox recaps on the loudest debates & under-the-radar launches.

Connect

© 2025 Not Hacker News! — independent Hacker News companion.

Not affiliated with Hacker News or Y Combinator. We simply enrich the public API with analytics.