Book Image

Mastering AWS Lambda

By : Yohan Wadia, Udita Gupta
Book Image

Mastering AWS Lambda

By: Yohan Wadia, Udita Gupta

Overview of this book

AWS is recognized as one of the biggest market leaders for cloud computing and why not? It has evolved a lot since the time it started out by providing just basic services such as EC2 and S3 and today; they go all the way from IoT to Machine Learning, Image recognition, Chatbot Frameworks, and much more! One of those recent services that is also gaining a lot of traction is AWS Lambda! Although seemingly simple and easy to use, Lambda is a highly effective and scalable compute service that provides developers with a powerful platform to design and develop Serverless event-driven systems and applications. The book begins with a high-level introduction into the world of Serverless computing and its advantages and use cases, followed by a deep dive into AWS Lambda! You’ll learn what services AWS Lambda provides to developers; how to design, write, and test Lambda functions; as well as monitor and troubleshoot them. The book is designed and accompanied with a vast variety of real-world examples, use cases, and code samples that will enable you to get started on your Serverless applications quickly. By the end of the book, you will have gained all the skills required to work with AWS Lambda services!
Table of Contents (11 chapters)

Recommendations and best practices

Here are a few key recommendations and best practices that you ought to keep in mind when working with monitoring and logging services:

  • Leverage AWS services for monitoring: Although still a long way from a fully potent monitoring solution, CloudWatch and X-Ray still are a good choice for starting out with monitoring your serverless applications. The ideal case would always be to leverage both these services together for a complete monitoring experience.
  • Provide the correct IAM permissions: Most of the time the issues are not with your function's code, but rather caused due to incorrect or missing IAM policies and permissions. Always make sure you provide the IAM policies that follow the least privileged requirement in order to run your function and periodically ensure that unwanted or unused IAM roles and policies are removed from the...