If the last ServerlessConf was the conference of serverless projects, this one was the conference of serverless tooling.
Every presentation has been plugging what they use right now for debugging, monitoring and development (AWS X-ray, IOpipe, Auth0 extend...)—while in the same breath highlighting areas where we still need more tools and more features in them.
In our opinion, it's a hugely positive shift. We've reached the point where everyone knows they can make cool stuff with serverless, and now they want an ecosystem to support serverless development. We can already tell: ServerlessConf next year will already be a drastically different landscape.
There was also a strong theme of rejecting 'NoOps' in favor of #DiffOps (kudos to Ben Kehoe for that sweet hashtag). Point being, the specific role titles might change, but nobody gets to eliminate ops. If anything, you need developers who are capable of learning how to do smart ops for distributed systems.
We're giving you the full notes from some of our favorite talks! If you were there, we hope they're a nice refresher. If you were home, we hope it's like you were there.
Click to jump straight to your fave talk, or scroll down to read them all:
How does security in the serverless world really shape up?
Let's first go back to basics—the 6 part Shared Responsibility Model:
When cloud entered the scene, this list got cut in half:
And then containers whittled it away a bit more:
Until under a serverless paradigm, we are left only with:
So what, then, should be our new model? Mark proposes three components to serverless security:
Code quality is a problem. Okay...it's the problem. If you look at the OWASP top 10 most common vulnerabilities, they've barely changed since 2010.
Dependencies are another factor. Their weakness is your weakness; dozens of dependencies mean dozens of possible threat points. And don't think that low-level threats are nothing to worry about—people can get root access by exploiting the right combination of grade 3 threats.
Still, we're doing pretty good overall here. Mark gives Serverless Fucntions security a B+.
How does the provider secure their service? Make sure to check their certifications. If they don't have certs (reasonably common in newer companies and smaller start-ups), then grill them. Make sure they are fully transparent with you.
Also keep in mind what kind of security controls do they have. Can you encrypt at rest, use your own keys?
Vendors have a lot to lose if there's a breach, and they tend to be pretty good about this stuff. Services get a solid A.
3. Data flows
Spoiler alert: this is where we're losing.
We don't yet have enough tooling for assurance of protections, data flow visibility or code quality. Though these things seem to be in the works from several people in the space, so we'll see what the state of affairs is by next ServerlessConf.
For now though, we're at a C-.
Then what's the state of serverless security overall?
Mark gives it a B. (Better, he notes, than containers)
Sam started coding a learning platform 4 years ago. You might know it now as this little company called A Cloud Guru. He knew he'd need to include video lessons, a quiz engine, an online store and sign up / log in, while having something that scaled effortlessly and had low operational overhead.
Tl;dr: he cared about the fastest, cheapest way to build a company and get his MVP out there. So he went serverless (check out his non-existent EC2 for proof):
His learning platform started as a serverless monolith, and Sam advocates that choice. It's a great way to launch fast, and as long as you're starting serverless, the transition to microservices later is pretty straightforward.
For all those serverless entrepreneurs out there, Sam has some guiding principles and advice:
Remember how, with every technological invention, the word on the street was that the 'old' would completely go away? Computers would kill paper, Microsoft would kill IBM, etc. In reality, this process takes way, way longer than we think.
So what does the future of serverless look like? Here's what Amiram thinks:
As you can see, containers and VMs are still in that chart. He also makes a case for shipping containers as serverless functions. You could, say, use a Docker image as a function. You wouldn't have to zip anything or add dependencies; just put it in a Docker file, package and ship.
It's still pretty common that when we talk about serverless, we start off talking about a greenfield project. But that's not most people's reality. How do you plug serverless functions into an existing application, bit by bit?
The hardest part is changing the model of your app to integrate these new event streams, and breaking up coupling of all the jobs that are currently running. Ryan recommends a slow integration flow, from 'incidental glue' to backend tasks (which will be less likely to make users mad if something goes wrong) before finally moving on to end user features.
Protip: beware of scaling, and not in the way you think. Lambda will scale just fine. Too fine. Fine enough to completely ruin every downstream service. Get good at prioritizing end-user events to customer impact is minimal. Use Kinesis to denormalize data into messages. Keep a monorepo. Watch everything: Cloudwatch, IOpipes, Honeycomb, ELK Stack...
Read his full notes over at serverlesscode.
How can you go serverless without vendor lock-in?
Linda proposes two possibilities: 1. containers 2. multi-provider frameworks
Both totally work, and it all depends on your preference. Linda personally prefers multi-provider frameworks and spent most of her talk focused on the Serverless Framework specifically.
Her argument was pretty straightforward: look, even if you know AWS really well, that knowledge doesn't transfer. GUIs highly vary and can be hard to navigate. If you don't use a multi-provider framework, you're essentially locking yourself in; there's too much friction to use that cool new Azure feature when you don't know Azure well.
The ideal multi-provider framework should abstract just enough to be useful, without completely abstracting away the native deployment frameworks for each cloud vendor. Otherwise, it's too much to keep up with and the ball will eventually drop.
As fabulous as her talk was, the twitter conversations around it have been even more fun to follow. Check them out.
by Tim Wagner, Yochay Kiriaty & Peter Sbarski
Tim spoke about the need for design patterns for serverless and did a walkthrough of how to implement a map-reduce pattern with serverless. Then, he announced some exciting news—they're releasing a book!
It's called Serverless Design Patterns, and it's slated for release in 2018. Yes to more vendor-agnostic learning resources, best practices and standards.
by Ben Kehoe
This talk was so good, we really just want you to hang tight for the video and watch it all. Ben had a sobering but uplifting message:
There are some really savvy companies, like Nordstrom, who are doing intricate event-driven design. But it's hard, and it's complicated. Serverless isn't quite there yet. Event-driven isn't quite there yet. So event-driven Serverless? Yeah...not there yet.
Serverless has many problems common to technologies that are still in their infancy. There isn't yet a good solution for service discovery or incremental deployments. Ben notes that he'd love to use VPCs for everything, but many services still don’t have VPC endpoints. The tooling and ecosystem support just isn't quite there.
But! Ben reminds us, "We're all here because we think it's worth it."
Improvements are happening incredibly fast. He's already anticipating that, with the current rate of change, his Venn diagram will be out of date by next ServerlessConf.
As a community, let's band together and make sure that happens.
Simon regaled the crowd with a thoughtful appraisal of how we think about systems—and what this all means for serverless. Here are some of his key points:
Maps don’t equal Diagrams
Maps help us better conceptualize problem spaces; we should all be making them. But what most developers call 'maps' (systems maps, anyone?), aren't actually maps.
Maps are more than just a visual; they also need to take into account anchor, position and movement. Imagine if you were to take Australia and plop it down beside Peru. Instantly different globe.
So back to our systems 'map'. It doesn’t have any of those characteristics. Move CRM over to the right? Nothing about the relationship between components change (as there’s no anchor).
We've been doing it wrong. These diagrams aren't painting a picture of the market landscape.
Simon's prefers to start with a User as his anchor, and flow down from that user on to what they want and need, then what those needs would require, and so on, until he ends up at the technology that supports those needs.
We're still following the same patterns
With every new technology we say: "It'll reduce the budget! It'll eliminate such-and-such role!"
But look. Serverless won’t reduce your IT budget; you’ll just make more stuff. Just like Cloud didn't reduce your IT budget. You made more stuff.
As technology grows towards the commodity end of the spectrum, more market players build it into their status quo. This is a cyclical process. Each new process begets another, which in turn is supplanted by yet another. Commoditized approaches gather inertia, leaving new technology adoption spotty and often from the bottom-up.
But, when the technology merits, it’s just a case of “when, not if”. The same is certainly true for Serverless.
Adoption is what it is
Hold tight. Serverless is a great wave, and it's coming. But adoption of new technology usually takes 10-15 years.
So here's the adoption curve we can we expect going in to 2025:
Serverless can get pretty conceptually complex once you have several functions in production. So why are we doing it?
Productivity, plain and simple. But what we need to remember about productivity is that it isn't only about code, it's about pushing things for the end user. Bad code doesn't help anyone, and firefighting isn't productive work.
When your infrastructure is an extension of your code code (as it is with Serverless), that means you have to treat your infrastructure as well as your code. This responsibility falls to developers.We need to cultivate a culture of focus on Insight, Resource Management and Operations. If you can't answer questions about your deployed resources in less than 3 seconds, it's a problem. If you don't have resource management automated, it might as well not exist because it's not repeatable.
The Cloud has made our infrastructure standardized, but needs aren't uniform; in that case, customize your tools. It's easier now than it's ever been.
by Jared Short
Jared came at us with some very practical advice. So you're serverless? Be resilient about it. You need failover, and here are some ways he's explored doing it.
He breaks down resiliency into active + passive and active + active.
Active + passive resiliency
The easiest possible scenario, if your business case allows it, is read-only failover. Using AWS CloudFront, you can swap one APIG to another APIG; takes about 3 minutes to fully roll out and is completely invisible to clients.
Active + active resiliency
Active + active is way more interesting, but also way more difficult, and a lot of the solutions (gasp) use servers.
As for data, how do you manage conflicting edits? There are two bad options: (1) last write wins, (2) write your own painful-to-maintain resolver before giving up and crying.
Or! (drumroll...) You could try Conflict-free Replicated Data Types (CRDTs).
These are pretty mathematically complex, but make it so that it's always possible to resolve changes. If you need advice, Jared is already pumped for a twitter conversation.
If you want to go multi-provider, then you will give up some ecosystem benefits of staying within a single provider. But if you are going to do it, then abstract events and context early on in the call. He recommends checking out the Event Gateway for a peek at a tool that makes multi-provider much easier.
by Daniel Krook
The CNCF established a serverless working group 4 months ago. Their very first initiatives are to finalize a serverless whitepaper and advocate a common model for event data.
They're also collecting and publishing community resources—e.g. a matrix of existing serverless providers and tools—and are moving their next focus into examples, patterns and possibly collaborating on packaging specifications.
Even if you're not a CNCF member, you can still attend meetings. So get involved and stay updated! Their GitHub repo is here.
by Alex Debrie
Our very own Alex DeBrie gave a great overview of the data layer of serverless architectures. He broke them down into two segments: serverful and serverless.
These are the more traditional databases including Postgres, MySQL, and MongoDB, where you have a defined number of instances running and scaling them up and down is more of a challenge.
Some of the benefits of serverfull databases:
Some of the downsides of serverfull databases include:
With serverless databases, you don't know how many instances are running; that is abstracted away from the developers. Some examples would include DynamoDB, Fauna, Google firebase or firestore.
They typically will auto scale for you and maintenance is less of a burden.
Serverless Database Benefits:
It's not NoOps but #DiffOps. We need more tools. Serverless truly is here to stay, and we're all excited about the increases in productivity. It's no longer 'what can we build in a serverless way?' but 'why can't we make this serverless yet, hurry up already'.
Andrea leads growth marketing at Serverless.
operations-and-observability - 15.01.18
Level up your AWS automation by reacting to events from AWS services.
written by Alex DeBrie
A roundup of links and videos from the serverless ecosystem that caught our attention this week.
written by Rupak Ganguly