Skip to main content

标 题: AWS还算好用, 但是不用迷信

 发信人: dumbCoder (HumbleCoder 不懂就问-_-), 信区: Programming
标  题: AWS还算好用, 但是不用迷信
发信站: BBS 未名空间站 (Thu Feb  4 15:46:34 2021, 美东)

我干过不少startup, DAU到1M以上后, AWS账单挺贵的...

AWS确实有很多方便的地方, 特别是搞原型开发测试,
或者高弹性的需求: 比如每个月只有几天很多流量,
  可以流量大的时候开一堆AWS资源,然后再自动停用就是

但是AWS是真的贵... 而且很重很容易被lock in
AWS用久了后,一堆复杂配置DSL,也是要"DevOps"全职管的
神马 权限/网络/autoscale... 一大堆ops script/DSL

大厂打工, 有专职的DevOps来管这些一坨坨的AWS配置/script
startup嘛, 就开发来客串了, 不是啥好差事


我如果搞自己的startup的话, 我会只用最基本的AWS功能.
比开些EC2虚拟机之类, 那种要一坨坨配置的我一概不用.
保证哪天我想迁移到一个裸的data center上, 也没问题.

实际上, 我觉得最近这些年吹的这些 DevOps + Cloud infra,
我觉得越来越复杂,越来越扯了. 下面这些我都用过或者接触过:
Chef/Puppet
Ansible/Salt
Terraform
Docker K8S
AWS ECS/EKS
Service Mesh now??
上面这堆来了又走的所谓 Cloud infra 工具, 最后留下啥?
留下些学也学不完的, 丑陋的面向 配置/DSL 编程?
费那折腾的精力,真的可以写个够自己用的infra

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...