Skip to main content
Edge Compute runs your code in real Linux containers on Telnyx’s global edge network. Unlike V8 isolate-based platforms, you get a full POSIX environment with native language runtimes.

Overview

┌─────────────────────────────────────────────────────────────┐
│                     Your Request                            │
└─────────────────────────────────────────────────────────────┘


┌─────────────────────────────────────────────────────────────┐
│                    Edge Location                            │
│              (nearest to your users)                        │
│  ┌──────────────────────────────────────────────────────┐  │
│  │  Ingress (TLS termination, routing)                  │  │
│  └──────────────────────────────────────────────────────┘  │
│                              │                              │
│                              ▼                              │
│  ┌──────────────────────────────────────────────────────┐  │
│  │  KNative Serving                                      │  │
│  │  ┌────────────┐  ┌────────────┐  ┌────────────┐      │  │
│  │  │ Container  │  │ Container  │  │ Container  │      │  │
│  │  │ (your fn)  │  │ (your fn)  │  │ (your fn)  │      │  │
│  │  └────────────┘  └────────────┘  └────────────┘      │  │
│  │        ▲               ▲               ▲              │  │
│  │        └───────────────┴───────────────┘              │  │
│  │               Auto-scaled based on load               │  │
│  └──────────────────────────────────────────────────────┘  │
└─────────────────────────────────────────────────────────────┘

Containers vs Isolates

Edge Compute uses real containers, not V8 isolates. This gives you:
FeatureV8 Isolates (Cloudflare)Containers (Telnyx)
LanguagesJavaScript/WASM onlyPython, Go, Node.js, Java
RuntimeReimplemented web APIsNative runtimes, full stdlib
File systemNoneFull POSIX filesystem
Cold start~5ms~100-500ms
DependenciesLimited, bundledAny native packages
Process modelSingle-threadedMulti-process capable
When to choose containers:
  • Need native packages (ML libraries, image processing, etc.)
  • Porting existing server code
  • Require language-specific features not available in V8
  • Need filesystem access

Request Lifecycle

When a request arrives at your function:

1. Routing

The request hits the nearest edge location. TLS is terminated, and the request is routed to your function based on the URL:
https://my-function-abc123.telnyxcompute.com/api/data
        └──────────┬──────────┘
            Routes to your function

2. Container Selection

The platform selects a container to handle the request:
  • Warm container available → Request handled immediately (~1-5ms routing overhead)
  • No warm container → Cold start: new container initialized (~100-500ms)

3. Execution

Your function code runs with:
  • Full network access (outbound HTTP, TCP, UDP)
  • Environment variables and secrets injected
  • Bindings for Telnyx services

4. Response

The response is returned to the caller. The container stays warm for subsequent requests.

Cold Starts

A cold start occurs when a new container must be initialized:
Cold Start Timeline
├── Container image pull (cached at edge)      ~0ms (cached)
├── Runtime initialization (Python/Go/Node)   ~50-200ms
├── Global code execution (imports, setup)    ~50-300ms
└── First request handled                      varies
Minimizing cold starts:
  1. Keep containers warm — Consistent traffic keeps containers alive
  2. Lazy initialization — Defer expensive setup until needed
  3. Minimize dependencies — Smaller images = faster starts
  4. Use connection pools — Initialize once, reuse across requests
See Execution Model for optimization patterns.

Edge Network

Functions run on Telnyx’s edge infrastructure across multiple locations:
RegionLocationStatus
North AmericaAtlanta✅ Live
North AmericaNew York✅ Live
North AmericaLos Angeles✅ Live
EuropeFrankfurt✅ Live
Asia PacificSydney✅ Live
Requests are automatically routed to the nearest available location for lowest latency.

Scaling

Edge Compute automatically scales based on traffic:
Traffic Pattern          Platform Response
─────────────────────    ─────────────────────
Low traffic         →    Fewer containers (may scale to zero)
Traffic spike       →    New containers start (cold starts)
Sustained load      →    Containers stay warm
Traffic drops       →    Containers gradually recycle
Each container handles one request at a time. The platform scales horizontally by adding containers as needed.

Security

Isolation

Each function runs in its own isolated container:
  • Network isolation — Functions cannot communicate with each other directly
  • Filesystem isolation — No shared filesystem between functions
  • Process isolation — Separate process namespace

Credentials

API credentials are never exposed in your code:
  • Bindings inject credentials securely
  • Secrets are encrypted at rest
  • Credentials don’t appear in logs

Internal Architecture

For those curious about the internals:
ComponentPurpose
ECG (Edge Compute Gateway)API gateway, function management, routing
KNativeServerless runtime, auto-scaling, revision management
KourierIngress controller, TLS termination
Meter ReaderUsage metering for billing
Functions are deployed as KNative services on Kubernetes clusters at each edge location.

Next Steps