Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's a good point. I'd say that generally, there are answers to most of these points that either get you 80% of the way there, or are functionally equivalent.

Re Load balancing for example, Disco is built on top of Docker Swarm, so you can add nodes (ie machines) to scale horizontally - `disco nodes:add root@<ip>`

For monitoring/alerting, we offer some real time cpu/memory metrics (ie `docker stats`) and integrate with external syslog services.

Do you have specific use cases in mind which current PaaS providers satisfy? Would you say that these kinds of concerns are what's holding you back from leaving Heroku or others (and are you considering leaving because of price, support, etc.)? Cheers



Yes, I'm missing the part between "spin up a bare metal server with a fresh OS" and "run the PaaS for prod".

How do I harden the server, back it up, etc? Basically the layer below Disco, to go beyond running it as a "toy"

This is not a dig at Disco, I run into the same issue with virtually any other self-hosted PaaS I could find.


No, all good, this is super useful - if you're thinking about this, then it matters to us!

Our philosophy is built on the "cattle, not pets" [0] and 12-factor [1] app methodologies. To some extent, the Disco server itself should be treated as disposable.

Disco runs your applications, which are just deployments of your code (ie git pulls). There's nothing on the server itself to back up. If a server were to die, you'd spin up a new one, run the install.sh script, and redeploy your apps in about 15 minutes.

For application data, our stance is that we believe you should use a dedicated, managed database provider for prod workloads. While we can run a "good enough" postgres as noted, we treat that as a dev/staging tool. Disco handles the stateless application layer, you should entrust your critical stateful data to a service that specializes in that.

Finally, re: security, we recommend a fresh Ubuntu 24.04 LTS server, which handles its own OS security updates. Disco only exposes the necessary web and SSH ports, so the attack surface is minimal by default.

[0] https://cloudscaling.com/blog/cloud-computing/the-history-of...

[1] https://12factor.net/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: