Book Image

Building Serverless Architectures

By : Cagatay Gurturk
Book Image

Building Serverless Architectures

By: Cagatay Gurturk

Overview of this book

Over the past years, all kind of companies from start-ups to giant enterprises started their move to public cloud providers in order to save their costs and reduce the operation effort needed to keep their shops open. Now it is even possible to craft a complex software system consisting of many independent micro-functions that will run only when they are needed without needing to maintain individual servers. The focus of this book is to design serverless architectures, and weigh the advantages and disadvantages of this approach, along with decision factors to consider. You will learn how to design a serverless application, get to know that key points of services that serverless applications are based on, and known issues and solutions. The book addresses key challenges such as how to slice out the core functionality of the software to be distributed in different cloud services and cloud functions. It covers basic and advanced usage of these services, testing and securing the serverless software, automating deployment, and more. By the end of the book, you will be equipped with knowledge of new tools and techniques to keep up with this evolution in the IT industry.
Table of Contents (10 chapters)

Running Lambda functions in VPC

VPC (Virtual Private Cloud) is an important part of AWS: it is a private network that you can create for your account and it gives you very granular control of your networking needs. You can create subnets, assign IP addresses to your EC2 instances from these subnets, and adjust security settings to allow or block access from specific subnets.

Actually, every AWS account has a default VPC when you open the account. When you create an EC2 instance, you select a subnet from your default subnets and your instance is given a private IP address. While you create an instance, you can also give a public IP to your instance, so that your instance can be accessed from the public internet. But in a secured environment, you should assign only a private IP to your instance and block access to your instance from the public internet. In this case, you have a...