Serverless computing: Difference between revisions

Content deleted Content added
"Standards" should not be categorized as a disadvantage. Additionally, I fact-checked and found that the mentioned Framework AE360 is not specifically about serverless computing and is a relatively obscure entity. I have also removed the text citing unreliable sources.
Citation bot (talk | contribs)
Add: doi, pages, issue, volume, date, article-number, publisher, authors 1-2. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox | #UCB_webform_linked 411/967
 
(13 intermediate revisions by 8 users not shown)
Line 1:
{{Short description|Cloud computing model}}
 
'''Serverless computing''' is "a cloud service category in which the customer can use different cloud capabilitiescapability types without the customer having to provision, deploy and manage either hardware or software resources, other than providing customer application code or providing customer data. Serverless computing represents a form of virtualized computing." according to [[International Organization for Standardization|ISO]]/IEC 22123-2. <ref name=":1">{{Cite journal |title=ISO/IEC 22123-2:2023 (E) - Information technology — Cloud computing — Part 2: Concepts |journal=International Standard |pages=25}}</ref> Serverless computing is a broad ecosystem that includes the cloud provider, [[Function as a service|Function as a Service]] (FaaS) and serverless databases are examples of serverless computing. However, serverless computing is considered to be broader than these components. <ref name=":2" /> Sheen Brisals suggests that serverless technology should be viewed as an ecosystem that includes the cloud provider, FaaS, managed services, as well as tools, frameworks, engineers, stakeholders, and other interconnected elements., according to Sheen Brisals.<ref name=":2">{{Cite book |last=Brisals |first=Sheen |title=Serverless Development on AWS: Building Enterprise-Scale Serverless Solutions |publisher=O'Reilly Media |isbn=978-1098141936}}</ref>
 
== Overview ==
 
''Serverless'' is a [[misnomer]] in the sense that servers are still used by cloud service providers to execute code for [[Developer (software)|developers]]. The definition of serverless computing has evolved over time, leading to varied interpretations. According to Ben Kehoe, serverless represents a spectrum rather than a rigid definition. Emphasis should shift from strict definitions and specific technologies to adopting a serverless mindset, focusing on leveraging serverless solutions to address business challenges. <ref>{{Cite book |last1=Emison |first1=Joseph |title=Serverless as a Game Changer How to Get the Most Out of the Cloud |year=2023 |publisher=Addison-Wesley Professional |isbn=9780137392551}}</ref>
 
Serverless computing does not eliminate complexity but shifts much of it from the operations team to the development team. However, this shift is not absolute, as operations teams continue to manage aspects such as identity and access management (IAM), networking, security policies, and cost optimization. Additionally, while breaking down applications into finer-grained components can increase management complexity, the relationship between granularity and management difficulty is not strictly linear. There is often an optimal level of modularization where the benefits outweigh the added management overhead. <ref>{{Cite book |title=The Software Architect Elevator: Redefining the Architect's Role in the Digital Enterprise |publisher=O'Reilly Media |year=2020 |isbn=978-1492077541}}</ref><ref name=":2" />
 
Serverless code can be used in conjunction with code deployed in traditional styles, such as [[microservices]] or [[Monolithic application|monoliths]]. Alternatively, applications can be written to be purely serverless and use no provisioned servers at all.<ref name="lambda-api-gateway" /> This should not be confused with computing or networking models that do not require an actual server to function, such as [[peer-to-peer]] (P2P).
 
According to Yan Cui, serverless should be adopted only when it helps to deliver customer value faster. And while adopting, organizations should take small steps and de-risk along the way.<ref name=":0">{{Cite book |last=Cui |first=Yan |title=Serverless Architectures on AWS |publisher=Manning |year=2020 |isbn=978-1617295423 |edition=2nd}}</ref>
 
== DisadvantagesChallenges ==
Serverless applications are prone to [[fallacies of distributed computing]]. In addition, they are prone to the following fallacies:<ref>{{Cite book |last=Richards |first=Mark |title=Fundamentals of Software Architecture: An Engineering Approach |publisher=O'Reilly Media |date=March 3, 2020 |isbn=978-1492043454 |edition=1st}}</ref><ref>{{Cite book |last=Richards |first=Mark |title=Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures |publisher=O'Reilly Media |year=2021 |isbn=978-1492086895 |edition=1st}}</ref>
 
* [[Version control|Versioning]] is simple
Line 21 ⟶ 19:
 
=== Monitoring and debugging ===
Monitoring and debugging serverless applications can present unique challenges due to their distributed, event-driven nature and proprietary environments. Traditional tools may fall short, making it difficult to track execution flows across services. However, modern solutions such as distributed tracing tools (e.g., AWS X-Ray, Datadog), centralized logging, and cloud-agnostic observability platforms are mitigating these challenges. Emerging technologies like OpenTelemetry, AI-powered anomaly detection, and serverless-specific frameworks are further improving visibility and root cause analysis. While challenges persist, advancements in monitoring and debugging tools are steadily addressing these limitations.<ref>{{Cite book |title=Distributed Tracing in Practice: Instrumenting, Analyzing, and Debugging Microservice |publisher=O'Reilly Media |isbn=978-1492056638}}</ref><ref>{{Cite book |title=Cloud-Native Observability with OpenTelemetry: Learn to gain visibility into systems by combining tracing, metrics, and logging with OpenTelemetry |isbn=978-1801077705}}</ref>
Diagnosing performance or excessive resource usage problems with serverless code may be more difficult than with traditional server code, because although entire functions can be timed,<ref name='lambda-api-gateway'>{{cite web|url=https://www.forbes.com/sites/janakirammsv/2015/07/16/paas-vendors-watch-out-amazon-is-all-set-to-disrupt-the-market/|title=PaaS Vendors, Watch Out! Amazon Is All Set To Disrupt the Market|last=MSV|first=Janakiram|website=[[Forbes]]|date=16 July 2015|access-date=10 July 2016}}</ref> there is typically no ability to dig into more detail by attaching [[profiling (computer programming)|profilers]], [[debugger]]s, or [[Application Performance Management|APM]] tools.<ref name="LeitnerWittern2019">{{cite journal|last1=Leitner|first1=Philipp|last2=Wittern|first2=Erik|last3=Spillner|first3=Josef|last4=Hummer|first4=Waldemar|title=A mixed-method empirical study of Function-as-a-Service software development in industrial practice|journal=Journal of Systems and Software|volume=149|year=2019|pages=340–359|issn=0164-1212|doi=10.1016/j.jss.2018.12.013|hdl=11475/14313|s2cid=67775784|hdl-access=free}}</ref> Furthermore, the environment in which the code runs is typically not open source, so its performance characteristics cannot be precisely replicated in a [[Deployment environment#Development|local environment]].
 
=== Security ===
According to [[OWASP]], serverless applications are vulnerable to variations of traditional attacks, insecure code, and some serverless-specific attacks (like Denial of Wallet<ref>{{Cite journal |last1=Kelly |first1=Daniel |last2=Glavin |first2=Frank G. |last3=Barrett |first3=Enda |date=2021-08-01 |title=Denial of wallet—Defining a looming threat to serverless computing |url=https://linkinghub.elsevier.com/retrieve/pii/S221421262100079X |journal=Journal of Information Security and Applications |volume=60 |pagesarticle-number=102843 |doi=10.1016/j.jisa.2021.102843 |issn=2214-2126|arxiv=2104.08031 }}</ref>). So, the risks have changed and attack prevention requires a shift in mindset.<ref>{{Cite web |title=OWASP Serverless Top 10 {{!}} OWASP Foundation |url=https://owasp.org/www-project-serverless-top-10/ |access-date=2024-05-20 |website=owasp.org |language=en}}</ref><ref>{{Citation |title=OWASP/Serverless-Top-10-Project |date=2024-05-02 |url=https://github.com/OWASP/Serverless-Top-10-Project |access-date=2024-05-20 |publisher=OWASP}}</ref>
 
=== Vendor lock-in ===
Line 30 ⟶ 28:
 
== High Performance Computing ==
Serverless computing may not be ideal for certain [[high-performance computing]] (HPC) workloads due to resource limits often imposed by cloud providers, including maximum memory, CPU, and runtime restrictions. For workloads requiring sustained or predictable resource usage, bulk-provisioned servers can sometimes be more cost-effective than the pay-per-use model typical of serverless platforms. However, serverless computing is increasingly capable of supporting specific HPC workloads, particularly those that are highly parallelizable and event-driven, by leveraging its scalability and elasticity. The suitability of serverless computing for HPC continues to evolve with advancements in cloud technologies. <ref>{{Cite book |title=Serverless Computing: Principles and Paradigms |date=12 May 2023 |publisher=Springer |isbn=978-3031266324}}</ref><ref>{{Cite book |last1=Foster |first1=Ian |last2=Gannon |first2=Dennis B. |title=Cloud Computing for Science and Engineering (Scientific and Engineering Computation) |date=29 September 2017 |publisher=MIT Press |isbn=978-0262037242}}</ref><ref name="hellersteinFaleiro2019">{{cite journal Citation|last1=Hellerstein |first1=Joseph |last2=Faleiro |first2=Jose |last3=Gonzalez |first3=Joseph |last4=Schleier-Smith |first4=Johann |last5=Screekanti |first5=Vikram |last6=Tumanov |first6=Alexey |last7=Wu |first7=Chenggang |year=2019 |title=Serverless Computing: One Step Forward, Two Steps Back |arxiv=1812.03651}}</ref>
 
== Anti-patterns ==
The "Grain of Sand Anti-pattern" refers to the creation of excessively small components (e.g., functions) within a system, often resulting in increased complexity, operational overhead, and performance inefficiencies. <ref name=":5">{{Cite book |last=Richards |first=Mark |title=Microservices AntiPatterns and Pitfalls |date=2015 |publisher=O'REILLY |publication-date=2015}}</ref> "Lambda Pinball" is a related anti-pattern that can occur in serverless architectures when functions (e.g., AWS Lambda, Azure Functions) excessively invoke each other in fragmented chains, leading to latency, debugging and testing challenges, and reduced observability. <ref name=":3">{{Cite journal |title=TECHNOLOGY RADAR VOL. 21 An opinionated guide to technology |url=https://www.thoughtworks.com/content/dam/thoughtworks/documents/radar/2019/11/tr_technology_radar_vol_21_en.pdf |journal=Technology Radar |publisher=ThoughtWorks |volume=21}}</ref> These anti-patterns are associated with the formation of a distributed monolith.
 
These anti-patterns are often addressed through the application of clear ___domain boundaries, which distinguish between public and published interfaces. <ref name=":3" /> <ref name=":4">{{Cite journal |last=Fowler |first=Martin |date=March–April 2002 |year=2002 |title=Public versus Published Interfaces |url=https://martinfowler.com/ieeeSoftware/published.pdf |journal=IEEE Software |volume=19 |issue=2 |pages=18–19 |doi=10.1109/52.991326 }}</ref> Public interfaces are technically accessible interfaces, such as methods, classes, API endpoints, or triggers, but they do not come with formal stability guarantees. In contrast, published interfaces involve an explicit stability contract, including formal versioning, thorough documentation, a defined deprecation policy, and often support for backward compatibility. Published interfaces may also require maintaining multiple versions simultaneously and adhering to formal deprecation processes when breaking changes are introduced. <ref name=":4" />
 
Fragmented chains of function calls are often observed in systems where serverless components (functions) interact with other resources in complex patterns, sometimes described as spaghetti architecture or a distributed monolith. In contrast, systems exhibiting clearer boundaries typically organize serverless components into cohesive groups, where internal public interfaces manage inter-component communication, and published interfaces define communication across group boundaries. This distinction highlights differences in stability guarantees and maintenance commitments, contributing to reduced dependency complexity. <ref name=":3" /> <ref name=":4" />
These anti-patterns are often addressed through the application of clear ___domain boundaries, which distinguish between public and published interfaces. <ref name=":3" /> <ref name=":4">{{Cite journal |last=Fowler |first=Martin |date=March–April 2002 |year=2002 |title=Public versus Published Interfaces |url=https://martinfowler.com/ieeeSoftware/published.pdf |journal=IEEE Software}}</ref> Public interfaces are technically accessible interfaces, such as methods, classes, API endpoints, or triggers, but they do not come with formal stability guarantees. In contrast, published interfaces involve an explicit stability contract, including formal versioning, thorough documentation, a defined deprecation policy, and often support for backward compatibility. Published interfaces may also require maintaining multiple versions simultaneously and adhering to formal deprecation processes when breaking changes are introduced. <ref name=":4" />
 
Additionally, patterns associated with excessive serverless function chaining are sometimes addressed through architectural strategies that emphasize native service integrations instead of individual functions, a concept referred to as the functionless mindset. However, this approach is noted to involve a steeper learning curve, and integration limitations may vary even within the same cloud vendor ecosystem. <ref name=":2" />
Fragmented chains of function calls are often observed in systems where serverless components (functions) interact with other resources in complex patterns, sometimes described as spaghetti architecture or a distributed monolith. In contrast, systems exhibiting clearer boundaries typically organize serverless components into cohesive groups, where internal public interfaces manage inter-component communication, and published interfaces define communication across group boundaries. This distinction highlights differences in stability guarantees and maintenance commitments, contributing to reduced dependency complexity. <ref name=":3" /> <ref name=":4" />
 
Reporting on serverless databases presents challenges, as retrieving data for a reporting service can either break the [[Domain-driven design|bounded contexts]], reduce the timeliness of the data, or do both. This applies regardless of whether data is pulled directly from databases, retrieved via HTTP, or collected in batches. Mark Richards refers to this as the "''Reach-in Reporting Antipattern"''.<ref name=":5" /> A possible alternative to this approach is for databases to asynchronously push the necessary data to the reporting service instead of the reporting service pulling it. While this method requires a separate contract between services and the reporting service and can be complex to implement, it helps preserve bounded contexts while maintaining a high level of data timeliness.<ref name=":5" />
Additionally, patterns associated with excessive serverless function chaining are sometimes addressed through architectural strategies that emphasize native service integrations instead of individual functions, a concept referred to as the functionless mindset. However, this approach is noted to involve a steeper learning curve, and integration limitations may vary even within the same cloud vendor ecosystem. <ref name=":2" />
 
== Principles ==
Adopting [[DevSecOps]] practices can help improve the use and security of serverless technologies. <ref>{{Cite book |last=Katzer |first=Jason |title=Learning Serverless: Design, Develop, and Deploy with Confidence |publisher=O'Reilly Media |year=2020 |isbn=978-1492057017}}</ref>
 
In serverless applications, the distinction between infrastructure and business logic is often blurred, with applications typically distributed across multiple services. To maximize the effectiveness of testing, integration testing is emphasized for serverless applications. <ref name=":0" /> Additionally, to facilitate debugging and implementation, [[Orchestration (computing)|orchestration]] is used within the [[Domain-driven design|bounded context]], while [[Service choreography|choreography]] is employed between different bounded contexts. <ref name=":0" />
 
Ephemeral resources are typically kept together to maintain high [[Cohesion (computer science)|cohesion]]. However, shared resources with long spin-up times, such as [[AWS RDS]] clusters and landing zones, are often managed in separate repositories, [[deployment pipeline]], and stacks. <ref name=":0" />
 
== See also ==