Forum

Search
Close
AI Search
Classic Search
 Search Phrase:
 Search Type:
Advanced search options
 Search in Forums:
 Search in date period:

 Sort Search Results by:

AI Assistant
Notifications
Clear all

AWS announces Lambda cold start improvements - down to 50ms

21 Posts
19 Users
0 Reactions
208 Views
 Paul
(@paul)
Posts: 0
Topic starter
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 
[#39]

Just saw this announcement and wanted to share with the community. AWS announces Lambda cold start improvements - down to 50ms

This could have significant implications for teams using GitLab. What does everyone think about this development?

Key points:
- Cost optimization
- Migration guide available
- Already in production

Anyone planning to adopt this soon?


 
Posted : 01/11/2025 10:16 pm
(@christine.roberts720)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Here are some operational tips that worked for uss we've developed: Monitoring - Datadog APM and logs. Alerting - Opsgenie with escalation policies. Documentation - GitBook for public docs. Training - certification programs. These have helped us maintain low incident count while still moving fast on new features.

The end result was 70% reduction in incident MTTR.

I'd recommend checking out the community forums for more details.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 05/11/2025 2:24 pm
(@christina.gutierrez3)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Technically speaking, a few key factors come into play. First, compliance requirements. Second, backup procedures. Third, cost optimization. We spent significant time on documentation and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 50% latency reduction.

The end result was 3x increase in deployment frequency.

The end result was 3x increase in deployment frequency.

One thing I wish I knew earlier: documentation debt is as dangerous as technical debt. Would have saved us a lot of time.


 
Posted : 07/11/2025 1:37 pm
(@jose.jackson593)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The depth of this analysis is impressive! I have a few questions: 1) How did you handle security? 2) What was your approach to canary? 3) Did you encounter any issues with costs? We're considering a similar implementation and would love to learn from your experience.

For context, we're using Istio, Linkerd, and Envoy.

One thing I wish I knew earlier: documentation debt is as dangerous as technical debt. Would have saved us a lot of time.

One thing I wish I knew earlier: observability is not optional - you can't improve what you can't measure. Would have saved us a lot of time.


 
Posted : 13/11/2025 6:55 pm
(@michelle.ross286)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

This mirrors what happened to us earlier this year. The problem: security vulnerabilities. Our initial approach was manual intervention but that didn't work because it didn't scale. What actually worked: automated rollback based on error rate thresholds. The key insight was failure modes should be designed for, not discovered in production. Now we're able to deploy with confidence.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 14/11/2025 7:04 am
(@dennis.king704)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Here's what worked well for us: 1) Document as you go 2) Monitor proactively 3) Share knowledge across teams 4) Keep it simple. Common mistakes to avoid: ignoring security. Resources that helped us: Team Topologies. The most important thing is learning over blame.

One more thing worth mentioning: we had to iterate several times before finding the right balance.

The end result was 60% improvement in developer productivity.

For context, we're using Vault, AWS KMS, and SOPS.


 
Posted : 18/11/2025 5:05 pm
(@laura.rivera601)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Solid work putting this together! I have a few questions: 1) How did you handle monitoring? 2) What was your approach to backup? 3) Did you encounter any issues with costs? We're considering a similar implementation and would love to learn from your experience.

For context, we're using Jenkins, GitHub Actions, and Docker.

One thing I wish I knew earlier: failure modes should be designed for, not discovered in production. Would have saved us a lot of time.

Additionally, we found that security must be built in from the start, not bolted on later.


 
Posted : 24/11/2025 10:12 am
(@christopher.mitchell35)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Diving into the technical details, we should consider. First, data residency. Second, backup procedures. Third, performance tuning. We spent significant time on testing and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 50% latency reduction.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

One thing I wish I knew earlier: observability is not optional - you can't improve what you can't measure. Would have saved us a lot of time.


 
Posted : 29/11/2025 1:44 am
(@jeffrey.alvarez11)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Allow me to present an alternative view on the tooling choice. In our environment, we found that Datadog, PagerDuty, and Slack worked better because failure modes should be designed for, not discovered in production. That said, context matters a lot - what works for us might not work for everyone. The key is to experiment and measure.

I'd recommend checking out the community forums for more details.

Additionally, we found that automation should augment human decision-making, not replace it entirely.


 
Posted : 29/11/2025 2:29 pm
(@opsx-tom)
Posts: 76
Member Admin
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The technical implications here are worth examining. First, compliance requirements. Second, failover strategy. Third, security hardening. We spent significant time on automation and it was worth it. Code samples available on our GitHub if anyone wants to take a look. Performance testing showed 2x improvement.

The end result was 80% reduction in security vulnerabilities.

The end result was 3x increase in deployment frequency.

I'd recommend checking out the official documentation for more details.


 
Posted : 02/12/2025 2:57 pm
(@maria.jimenez673)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

A few operational considerations to adds we've developed: Monitoring - Datadog APM and logs. Alerting - Opsgenie with escalation policies. Documentation - Notion for team wikis. Training - pairing sessions. These have helped us maintain low incident count while still moving fast on new features.

I'd recommend checking out the official documentation for more details.

One more thing worth mentioning: we had to iterate several times before finding the right balance.

The end result was 3x increase in deployment frequency.


 
Posted : 04/12/2025 7:48 pm
(@stephanie.howard98)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Love this! In our organization and can confirm the benefits. One thing we added was automated rollback based on error rate thresholds. The key insight for us was understanding that the human side of change management is often harder than the technical implementation. We also found that integration with existing tools was smoother than anticipated. Happy to share more details if anyone is interested.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 08/12/2025 10:15 am
(@christopher.bennett288)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Lessons we learned along the way: 1) Automate everything possible 2) Monitor proactively 3) Share knowledge across teams 4) Keep it simple. Common mistakes to avoid: skipping documentation. Resources that helped us: Team Topologies. The most important thing is consistency over perfection.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

I'd recommend checking out the official documentation for more details.

I'd recommend checking out relevant blog posts for more details.


 
Posted : 09/12/2025 9:04 am
(@christopher.bennett288)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Great info! We're exploring and evaluating this approach. Could you elaborate on tool selection? Specifically, I'm curious about how you measured success. Also, how long did the initial implementation take? Any gotchas we should watch out for?

Additionally, we found that documentation debt is as dangerous as technical debt.

One more thing worth mentioning: the hardest part was getting buy-in from stakeholders outside engineering.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 11/12/2025 11:40 pm
(@joan.hill519)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

The full arc of our experience with this. We started about 15 months ago with a small pilot. Initial challenges included tool integration. The breakthrough came when we improved observability. Key metrics improved: 80% reduction in security vulnerabilities. The team's feedback has been overwhelmingly positive, though we still have room for improvement in monitoring depth. Lessons learned: measure everything. Next steps for us: expand to more teams.

I'd recommend checking out the official documentation for more details.


 
Posted : 14/12/2025 2:25 pm
Page 1 / 2
Share:
Scroll to Top