Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Tbh I feel this in one of those that would be significantly cleaner without serverless in first place.

Sticking something with 2 second lifespan on disk to shoehorn it into aws serverless paradigm created problems and cost out of thin air here

Good solution moving at least partially to a in memory solution though





Yeah, so now you're basically running a heavy instance in order to get the network throughput and the RAM, but not really using that much CPU when you could probably handle the encode with the available headroom. Although the article lists TLS handshakes as being a significant source of CPU usage, I must be missing something because I don't see how that is anywhere near the top of the constraints of a system like this.

Regardless, I enjoyed the article and I appreciate that people are still finding ways to build systems tailored to their workflows.


TLS being a bottleneck when doing image processing is very-very weird.

Maybe they’re not using keepalives in their clients causing thousands of handshakes per second?

Yes, they mention this as a 'fix' for connection-related memory usage:

> Disable keep-alive: close the connection immediately after each upload completes.

Very odd idea.


Possibly missing session resumption support compounding the problem.

The scalable in-memory solution took quite a bit of testing to get right. Building this on the early side of the business when the requirements are not well known can be a giant budget and time tar pit. Plus without customers it’s hard to confidently test at scale.

Using S3 for an MVP and marking this component as “done” seems like the right solution, regardless of the serverless paradigm.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: