It's a funny business. When we expel some core steps from application development, (for example, provisioning cloud assets like storage and process) engineers take this opportunity to an outlandish yet reasonable conclusion.
Now and again, planning and design is being hurled out the window. Why? Taking into account that serverless is self-provisioning, and applications can be designed and built progressively on the fly, and in case we're not doing infrastructure planning, admirably, why not?
To begin with, despite everything we should concentrate on the productivity of the application, regardless of whether it is serverless. Resources are automatically allocated dependent on the profile of the serverless application, or what the serverless system thinks it needs. In case you're everywhere with how and when requests are made, the serverless system is probably going to overprovision resources, bringing about more cost and less productivity.
Systems that respond to the condition of the application need to make assumptions dependent on the design patterns they see or don't see. Much like the universe of fourth-age languages from years back, the intensity of the development platform implies you can without much of a stretch mess yourself up too. Serverless is the same.
Second, the application should be managed, so purposes of the management still should be built in. This implies we have to plan APIs into the application and the data for outer management tools to monitor, just as stop and start processes.
In spite of the fact that applications can be managed without these interfaces, most can't be managed well longer term. For this you need a design and a way to deal with how your serverless systems work with cloudops toolsets and processes.
Third, security should be planned in. Show me an application that wasn't planned or designed, and I'll show you an application that is normally less secure. Missing great foundational design implies that those accused of securing the application missed chances to make the application progressively secure by design.
Breaches frequently start with developer error and design. Along these lines, watch out for the design of serverless applications. Try not to yield to enticement.