aws-microservices-deploy-options VS fn

Compare aws-microservices-deploy-options vs fn and see what are their differences.

aws-microservices-deploy-options

This repo contains a simple application that consists of three microservices. Each application is deployed using different Compute options on AWS. (by aws-samples)

fn

The container native, cloud agnostic serverless platform. (by fnproject)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
aws-microservices-deploy-options fn
1 10
401 5,647
- 0.7%
0.0 2.6
about 1 year ago 8 months ago
Jsonnet Go
MIT No Attribution Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

aws-microservices-deploy-options

Posts with mentions or reviews of aws-microservices-deploy-options. We have used some of these posts to build our list of alternatives and similar projects.

fn

Posts with mentions or reviews of fn. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-31.
  • XFaaS: Hyperscale and Low Cost Serverless Functions at Meta
    4 projects | news.ycombinator.com | 31 Jan 2024
  • GraalOS: Containerless instant-on cloud functions for Java
    1 project | news.ycombinator.com | 22 Sep 2023
    There's not much info out there but I'll describe what I got from reading the blog posts and searching for it.

    "Serverless" stuff like the (proprietary) Lambda or (open source, https://fnproject.io/) OCI Cloud Functions are based on a few ideas:

    1. Use Linux syscalls+x86 as the target ABI/ISA. Thus programs are Docker containers and because the kernel is a bit too much C to trust, maybe also custom virtual machines for sandboxing.

    2. Because downloading a full blown Linux userspace and starting it up inside a new virtual machine can be slow, then add a variety of hacks on top to try and make a start/stop model look like an always on service. For example by having always-on instances (which means serverless now has servers again), by using Docker layers and other stuff.

    GraalOS asks the following question: what if we toss Linux and x86 as the API? Is there a way to do server-side computing better?

    This question just leads to more questions:

    • What do we replace it with?

    • What are the benefits?

    GraalOS starts by saying, let's replace Linux/native code with the Java specifications instead. This gives you a relatively large and consistent yet open source surface area for doing all the server-side basics you need like IO, threading, memory management and so on. You can then layer Truffle (from the same team) on top to get other languages like JavaScript, Python, Ruby, WASM, Rust or C++ (via LLVM bitcode) and so on. All of these running on top of the JVM rather than Linux.

    In this model the JVM isn't an operating system, exactly, but it might as well be because you don't have access to the underlying kernel at all. There's no way to make system calls in this model that aren't mediated by the standard libraries of your language. And this is enforced via two very different sandboxing technologies:

    1. The server controls the compiler.

    2. Intel MPX and whatever the AMD equivalent is.

    Controlling the compiler is how you implement software level sandboxing. Because all code running on the CPU is created by your own compiler which the developer cannot choose (like in a browser), you can implement and impose whatever policies you like. The most obvious is no syscalls, no unsafe memory accesses and so on. But then you may want more than that, for example, how do you stop Spectre attacks extracting secrets from the address space? To which the answer can be the CPU's "Memory Protection Keys". This is a very, very fast and lightweight way to do a kind of in-process context switch. You can associate page ranges with a "key" and then put that key into a special register to control what memory ranges are currently accessible. It's like an additional set of permissions over what the kernel has set up. Because you control the compiler, you can ensure that only system code can alter the current memory protection key, and then this lets you compile and execute untrusted code without worrying about speculation attacks.

    So that's the theory, what's the benefits?

    The first benefit is that you don't need containers anymore. GraalVM has the "native image" tool that produces native Linux standalone executables from JVM apps, like Go does. And those JVM apps can be interpreters or JIT compilers for other Truffle languages as well. So now, you no longer need to drag around half an Ubuntu install for each app you run. It means programs can be moved between servers way faster because there's less to copy, and anyway Oracle Cloud has notoriously excellent networking, from what I've read, so new instances can be spun up much faster than before. And native images start ~instantly because they are fully native code and have a persisted heap snapshot computed as part of the build process, so they effectively start already initialized. And then finally in some cases they can do snapshotting post-startup too, for fast suspend/resume, and the compiler knows how to do MPX keys.

    So with all this done, you can produce a server side infrastructure in which programs are just shared libraries loaded and unloaded into pre-warmed HTTP servers, yet still isolated and protected from each other, and because things are way faster you can actually just start and stop these servers genuinely on demand on a per-request basis. There's no need to charge users for idle minutes as you try to avoid a shutdown/startup cycle. In turn that means a lot of complexity just boils away.

    BTW, I just checked and it turns out that Oracle's "free cloud" deal applies to functions as well. You get like 2 million free activations a month or something, and 400k "gigabyte memory-seconds". So if that pricing is sustained with this then it means a lot of types of JVM servers will just be completely free to host, because native image also reduces memory consumption a lot.

    At least that's my guess as to what's going on. But it's not launched yet, just announced. I guess we'll have to see what it's like for real when it's available.

  • Oracle Cloud is having a major outage
    1 project | news.ycombinator.com | 2 Jun 2023
  • My very first Hackathon and my first Dev.to post
    7 projects | dev.to | 8 Apr 2023
    Functions: Scalable, multi-tenant serverless functions based on Fn
  • Any self-hosted equivalent to AWS Lambdas?
    4 projects | /r/selfhosted | 25 Feb 2023
    OpenFAAS or FN Project are options
  • Self hosted Aws Lamda / FaaS alternative
    2 projects | /r/devops | 27 Sep 2022
  • Java Serverless on Steroids with fn+GraalVM Hands-On
    2 projects | dev.to | 18 Jan 2022
    Install fn (refer to https://fnproject.io/ for latest instructions)
  • Don't start with microservices – monoliths are your friend
    5 projects | news.ycombinator.com | 16 Dec 2021
    I disagree, microservices are an architectural concept related to the software, not to the infrastructure.

    Whether you are using containers or VPS or serverless or bare metal for your infrastructure, that's completely unrelated to the concept of microservices: you can deploy either a monolith or microservices in any of the above.

    As an example you can deploy a monolith on Lambda[1] or you can deploy microservices on bare metal using one of the several self managed serverless engines available[2].

    [1] see e.g. https://claudiajs.com/tutorials/serverless-express.html or https://blog.logrocket.com/zappa-and-aws-lambda-for-serverle...

    [2] see e.g. https://fnproject.io/ and https://knative.dev/

  • Serverless functions with FN project
    3 projects | dev.to | 6 Oct 2021
    Still, for today I would like to talk to you about the FN project, an open-source alternative.
  • Azure function like feature
    3 projects | /r/docker | 29 Jul 2021
    Never really used it but perhaps you can look into Fn. There's also OpenFaaS, but that's for Kubernetes.