<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: David Lyon</title>
    <description>The latest articles on DEV Community by David Lyon (@azzlain).</description>
    <link>https://dev.to/azzlain</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3247193%2F305192a0-d431-45ca-bfe1-b7937a10b2d2.png</url>
      <title>DEV Community: David Lyon</title>
      <link>https://dev.to/azzlain</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/azzlain"/>
    <language>en</language>
    <item>
      <title>AWS Confirmed the Crash. Then Denied It. Then Billed Us.</title>
      <dc:creator>David Lyon</dc:creator>
      <pubDate>Mon, 07 Jul 2025 16:17:37 +0000</pubDate>
      <link>https://dev.to/azzlain/aws-confirmed-the-crash-then-denied-it-then-billed-us-mp7</link>
      <guid>https://dev.to/azzlain/aws-confirmed-the-crash-then-denied-it-then-billed-us-mp7</guid>
      <description>&lt;h2&gt;
  
  
  In May, I published a detailed technical breakdown of a fatal, platform-level crash in AWS Lambda — a Node.js function inside a VPC making outbound HTTPS calls that would silently crash after returning a 201.
&lt;/h2&gt;

&lt;p&gt;No logs. No errors. No stack trace. AWS eventually reproduced it themselves.&lt;/p&gt;

&lt;p&gt;This post isn't about the bug.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;It's about what AWS did next.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What Happened After the Reproduction
&lt;/h3&gt;

&lt;p&gt;Even after AWS reproduced the crash using their own test code, their response wasn’t engineering.&lt;br&gt;&lt;br&gt;
It was &lt;strong&gt;damage control&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;They blamed our code
&lt;/li&gt;
&lt;li&gt;They revoked a previously granted $4,000 credit
&lt;/li&gt;
&lt;li&gt;They silently billed our founder’s personal card
&lt;/li&gt;
&lt;li&gt;They filtered technical escalations through sales
&lt;/li&gt;
&lt;li&gt;They offered the credit back — this time as a &lt;em&gt;settlement tied to silence&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;And they asked our CEO, off-record, &lt;em&gt;not to publish&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We published anyway.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Real Postmortem: &lt;em&gt;Culture, Not Code&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;This isn’t a teardown of runtime behaviour. That’s already done.&lt;br&gt;&lt;br&gt;
This is about &lt;strong&gt;support failure&lt;/strong&gt;, &lt;strong&gt;accountability avoidance&lt;/strong&gt;, and AWS’s cultural instinct to &lt;strong&gt;deflect rather than own fault&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you’re building serious workloads on Lambda: &lt;strong&gt;read this&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;
Because when support fails, logs go dark, and engineering won’t speak — &lt;strong&gt;you are on your own&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://lyons-den.com/blog/aws-denial-accountability.html" rel="noopener noreferrer"&gt;Read the full follow-up post here&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>serverless</category>
      <category>startup</category>
      <category>cloud</category>
    </item>
    <item>
      <title>AWS Lambda Silent Crash – A Platform Failure, Not an Application Bug</title>
      <dc:creator>David Lyon</dc:creator>
      <pubDate>Thu, 05 Jun 2025 12:34:40 +0000</pubDate>
      <link>https://dev.to/azzlain/aws-lambda-silent-crash-a-platform-failure-not-an-application-bug-1lo4</link>
      <guid>https://dev.to/azzlain/aws-lambda-silent-crash-a-platform-failure-not-an-application-bug-1lo4</guid>
      <description>&lt;h2&gt;
  
  
  What happens when a production-ready startup proves a runtime failure beyond doubt – and is still told it’s their fault?
&lt;/h2&gt;

&lt;p&gt;Over a seven-week investigation, I uncovered and proved a &lt;strong&gt;silent, platform-level crash in AWS Lambda&lt;/strong&gt; — affecting &lt;strong&gt;Node.js functions in a VPC&lt;/strong&gt; making outbound HTTPS calls. The failure occurred mid-execution, after the function had returned a success response. &lt;strong&gt;No logs. No errors. No telemetry. No way to catch it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;From day one, I did what AWS claims to value in a partner.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I stripped the function down to minimal reproducible code.&lt;/li&gt;
&lt;li&gt;I tested across runtimes, regions, and infrastructure baselines.&lt;/li&gt;
&lt;li&gt;I rebuilt on EC2 and proved that the issue vanished entirely.&lt;/li&gt;
&lt;li&gt;I shared logs, traces, metrics, and internal observations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I escalated through every official channel:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Support dismissed it.&lt;/li&gt;
&lt;li&gt;My Account Executive ignored it.&lt;/li&gt;
&lt;li&gt;Formal complaints were met with silence.&lt;/li&gt;
&lt;li&gt;Internal re-escalations led nowhere.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Activate&lt;/strong&gt; — the startup programme — refused to engage.&lt;/li&gt;
&lt;li&gt;And executive outreach yielded nothing but a two-line response weeks later.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At every stage, I remained professional. I kept the tone restrained. I offered AWS every opportunity to engage constructively.&lt;/p&gt;

&lt;p&gt;Instead, they claimed the bug was in my code — despite the function crashing after returning a &lt;strong&gt;201&lt;/strong&gt;.&lt;br&gt;
They claimed I had forgotten a &lt;code&gt;reject()&lt;/code&gt; — despite the error occurring deep inside &lt;code&gt;https.request()&lt;/code&gt;, and their own reproduction missing the handler.&lt;br&gt;
They suggested I move to EC2 — by then, I already had.&lt;br&gt;
I asked for Lambda engineering — they gave me sales. Then silence.&lt;/p&gt;

&lt;p&gt;Even AWS Activate, whose sole purpose is to support startups like ours, refused to take part. Their response wasn’t technical — it was procedural. A polite copy-paste directing us back to the same failing support system we were already trapped in.&lt;/p&gt;

&lt;p&gt;This wasn’t just a Lambda bug. It was a &lt;strong&gt;platform-level failure, misdiagnosed through a broken support process, and left to rot in plain sight.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AWS’s internal systems failed. Their support model failed. Their startup engagement model failed. And above all, their cultural commitment to ownership — the thing they claim defines them — was nowhere to be found.&lt;/p&gt;

&lt;p&gt;So, we left.&lt;br&gt;
We migrated everything.&lt;br&gt;
Lambda was decommissioned.&lt;br&gt;
Critical services were refactored for Azure.&lt;br&gt;
And our engineering culture now lives on a platform that still understands trust has to be earned — not assumed.&lt;/p&gt;

&lt;p&gt;If you're building on Lambda: know this.&lt;br&gt;
It may fail silently.&lt;br&gt;
And if it does — AWS may blame you, even after they reproduce the failure themselves.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;This is just the beginning of the story.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For the full deep dive into the silent AWS Lambda crash, our complete diagnostic process, AWS's contradictory responses, and why we ultimately decided to migrate our entire infrastructure, please read the full article on our website:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://lyons-den.com/whitepapers/aws-lambda-silent-crash.pdf" rel="noopener noreferrer"&gt;Read the Full Post: AWS Lambda Silent Crash – A Platform Failure, Not an Application Bug&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;




</description>
      <category>aws</category>
      <category>serverless</category>
      <category>node</category>
      <category>cloud</category>
    </item>
  </channel>
</rss>
