by icar on 11/11/24, 9:51 AM with 69 comments
by rzodkiew on 11/11/24, 12:26 PM
I've noticed a trend where some of the dev tooling nowadays is sold almost as if it were consumer goods with the whole associated marketing behind it. This doesn't work for me, in reality actually has completely opposite effect. Give me boring well-written docs, that shows engineering that went into it, not the marketing show for teenagers.
by solatic on 11/11/24, 11:06 AM
SST is great because they built a model for infra-as-code that gives sensible defaults out-of-the-box while preserving enormous flexibility as the architecture grows, plus great conventions around giving code access to the environment details via bindings.
Super excited to play with this.
by usagisushi on 11/11/24, 2:02 PM
Since SST allows you to use Pulumi code, you can code your infrastructure extensively even if some resources are not directly supported by SST itself. However, for such usage, it also has rough edges inherited from Pulumi. For instance, I encountered issues with cyclic dependencies [1] between resources and incomplete deployments. It would be great if I could run the Pulumi CLI against my SST stack.
by mentalgear on 11/11/24, 10:43 AM
--
For example, SST's AWS costs example:
- AWS Fargate: 0.25 vCPU, 0.5 GB RAM, 20GB SSD: ~$13/month
- AWS Load Balancer: ~$3/month
Total: ~$17/month (rounded up)
--
In comparison, a similar (even more powerful) setup on Hetzner can be significantly more affordable:
- Hetzner VPS: 2 vCPU, 4 GB RAM, 20 GB SSD for ~ $5/month
-- Coolify
--- app containers
--- load balancing
Total: around $5/month.---
Alternatively, you can offload server management to Coolify Cloud for an extra ~ $5/month, so your Hetzner resources are dedicated solely to running your containers.
- Hetzner VPS + Coolify Cloud: ~ $10/month
You can scale vertically via Hetzner (rescale) and horizontally via Coolify (add more servers).
A more budget-friendly option like this could be valuable for users running small to medium, even larger setups !
by tnolet on 11/11/24, 2:21 PM
import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const cluster = new aws.ecs.Cluster("my-cluster", {
name: "my-cluster",
});
export const clusterName = cluster.name;
https://www.pulumi.com/registry/packages/aws/api-docs/ecs/cl...by coronapl on 11/11/24, 3:45 PM
by andrew_ on 11/11/24, 2:16 PM
by datadeft on 11/11/24, 10:49 AM
const cluster = new sst.aws.Cluster("MyCluster", { vpc });
by taylornotswift on 11/11/24, 1:51 PM
But, if I was going to start a new project today, I would probably reach for SLS, because it is simpler and faster to get set up. I think SST sometimes gets in its own way with complex IaaC config; if I wanted to do all this then I would reach for Terraform, and part of the appeal of serverless is the low lift to getting to "deployed."
So I think it's really cool that SST is adding all these things and exploring areas outside trad serverless to expand and grow new user bases. I also think this kinda sucks for people who have been with SST for a while and waiting for improvements to the DX for serverless (the functionality is there, the DX is not). I'm sure lots of thought went into this decision, but I still think it would be profoundly "worth it" for SST to tackle DX again, or for someone to build a wrapper around it.
by rswail on 11/12/24, 8:20 AM
However, the problem I found was that a Pulumi provider has two "sides", one is on the Pulumi side of the provider, which sets up resources to be created, but doesn't update them with the details of what's been created.
Example (may not be entirely accurate): You create a VPC, but then you want to use the default subnet as an input to another resource. You can't find out that subnet's information because when Pulumi runs, the "script" side doesn't get updated by the result of the VPC creation, so the information like the default subnet is "inside" the provider and not available to the user's script.
Terraform updates the resource that has been created with the information from the creation, so you can access the underlying AWS information in further resources.
by abrookewood on 11/11/24, 10:50 PM
by oulipo on 11/11/24, 1:33 PM
Does this allow to create GCP / Gcloud stack?
by benry1 on 11/11/24, 2:50 PM
by douglasisshiny on 11/11/24, 5:53 PM
Is there a timeline/roadmap for supporting the languages noted on the bottom of the post?
by voat on 11/11/24, 5:28 PM
And on the video, I like it
And the docs are very nice
by GiorgioG on 11/11/24, 4:19 PM
by joshmarinacci on 11/11/24, 2:57 PM