You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
+`ViewExecutionRolePolicies` – View the AWS managed policies that are attached to the execution role\. This lets you view the function's permissions in the console, but doesn't include permission to view policies that were created by other users in the account\.
154
-
155
-
```
156
-
"Action": [
157
-
"iam:GetPolicy",
158
-
"iam:GetPolicyVersion"
159
-
],
160
-
"Resource": "arn:aws:iam::accountNumber:policy/*"
161
-
```
162
144
+`ViewLogs` – Use CloudWatch Logs to view logs for functions that are prefixed with `intern-`\.
163
145
164
146
```
@@ -243,4 +225,4 @@ For more information, see [IAM roles](https://docs.aws.amazon.com/IAM/latest/Use
243
225
244
226
You can use condition keys for VPC settings to provide additional permission controls for your Lambda functions\. For example, you can enforce that all Lambda functions in your organization are connected to a VPC\. You can also specify the subnets and security groups that the functions are allowed to use, or are denied from using\.
245
227
246
-
For more information, see [Using IAM condition keys for VPC settings](configuration-vpc.md#vpc-conditions)\.
228
+
For more information, see [Using IAM condition keys for VPC settings](configuration-vpc.md#vpc-conditions)\.
Copy file name to clipboardExpand all lines: doc_source/configuration-images.md
+3-2Lines changed: 3 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ When you deploy code as a container image to a Lambda function, the image underg
35
35
36
36
## Update the user permissions<aname="configuration-images-permissions"></a>
37
37
38
-
Make sure that the permissions for the AWS Identity and Access Management \(IAM\) user or role that creates the function contain the AWS managed policies `GetRepositoryPolicy`and `SetRepositoryPolicy`\.
38
+
Make sure that the permissions for the AWS Identity and Access Management \(IAM\) user or role that creates the function contain the AWS managed policies `GetRepositoryPolicy`, `SetRepositoryPolicy`, and `InitiateLayerUpload`\.
39
39
40
40
For example, use the IAM console to create a role with the following policy:
41
41
@@ -48,7 +48,8 @@ For example, use the IAM console to create a role with the following policy:
## Using a \.NET base image<aname="csharp-image-instructions"></a>
27
+
28
+
For instructions on how to use a \.NET base image, choose the **usage** tab on [AWS Lambda base images for \.NET](https://gallery.ecr.aws/lambda/dotnet) in the *Amazon ECR repository*\.
29
+
30
+
The instructions are also available on [AWS Lambda base images for \.NET](https://hub.docker.com/r/amazon/aws-lambda-dotnet) in the *Docker Hub repository*\.
Copy file name to clipboardExpand all lines: doc_source/deploying-lambda-apps.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,9 @@ An AWS Lambda application is a combination of Lambda functions, event sources, a
4
4
5
5
The [AWS Serverless Application Repository](https://docs.aws.amazon.com/serverlessrepo/latest/devguide/) provides a collection of Lambda applications that you can deploy in your account with a few clicks\. The repository includes both ready\-to\-use applications and samples that you can use as a starting point for your own projects\. You can also submit your own projects for inclusion\.
6
6
7
-
[AWS CloudFormation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-whatis-concepts.html) enables you to create a template that defines your application's resources and lets you manage the application as a *stack*\. You can more safely add or modify resources in your application stack\. If any part of an update fails, AWS CloudFormation automatically rolls back to the previous configuration\. With AWS CloudFormation parameters, you can create multiple environments for your application from the same template\.[AWS SAM](gettingstarted-tools.md#gettingstarted-tools-awssam) extends AWS CloudFormation with a simplified syntax focused on Lambda application development\.
7
+
[AWS CloudFormation](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/cfn-whatis-concepts.html) enables you to create a template that defines your application's resources and lets you manage the application as a *stack*\. You can more safely add or modify resources in your application stack\. If any part of an update fails, AWS CloudFormation automatically rolls back to the previous configuration\. With AWS CloudFormation parameters, you can create multiple environments for your application from the same template\.[AWS SAM](lambda-settingup.md#lambda-settingup-awssam) extends AWS CloudFormation with a simplified syntax focused on Lambda application development\.
8
8
9
-
The [AWS CLI](gettingstarted-tools.md#gettingstarted-tools-awscli) and [SAM CLI](gettingstarted-tools.md#gettingstarted-tools-samcli) are command line tools for managing Lambda application stacks\. In addition to commands for managing application stacks with the AWS CloudFormation API, the AWS CLI supports higher\-level commands that simplify tasks like uploading deployment packages and updating templates\. The AWS SAM CLI provides additional functionality, including validating templates and testing locally\.
9
+
The [AWS CLI](lambda-settingup.md#lambda-settingup-awscli) and [SAM CLI](lambda-settingup.md#lambda-settingup-samcli) are command line tools for managing Lambda application stacks\. In addition to commands for managing application stacks with the AWS CloudFormation API, the AWS CLI supports higher\-level commands that simplify tasks like uploading deployment packages and updating templates\. The AWS SAM CLI provides additional functionality, including validating templates and testing locally\.
10
10
11
11
When creating an application, you can create its Git repository using either CodeCommit or an AWS CodeStar connection to GitHub\. CodeCommit enables you to use the IAM console to manage SSH keys and HTTP credentials for your users\. AWS CodeStar connections enables you to connect to your GitHub account\. For more information about connections, see [What are connections?](https://docs.aws.amazon.com/dtconsole/latest/userguide/welcome-connections.html) in the *Developer Tools console User Guide*\.
Copy file name to clipboardExpand all lines: doc_source/getting-started-create-function.md
+16-17Lines changed: 16 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -24,29 +24,27 @@ In this getting started exercise, you create a Node\.js Lambda function using th
24
24
25
25
1. For **Function name**, enter **my\-function**\.
26
26
27
-
1. For **Runtime**, confirm that **Node\.js 14\.x** is selected\.(Note that AWS Lambda natively supports Java, Go, PowerShell, Node.js, C#, Python, and Ruby code, and provides a Runtime API which allows you to use any additional programming languages to author your functions.)
27
+
1. For **Runtime**, confirm that **Node\.js 14\.x** is selected\. Note that Lambda provides runtimes for \.NET \(PowerShell,C\#\) Go, Java, Node\.js, Python, and Ruby\.
28
28
29
29
1. Choose **Create function**\.
30
30
31
31
Lambda creates a Node\.js function and an [execution role](lambda-intro-execution-role.md) that grants the function permission to upload logs\. The Lambda function assumes the execution role when you invoke your function, and uses the execution role to create credentials for the AWS SDK and to read data from event sources\.
32
32
33
33
### Use the function overview<aname="get-started-designer"></a>
34
34
35
-
The **Function overview** shows a visualization of your function and its upstream and downstream resources\. You can use it to jump to trigger, destination, and layer configuration\.
35
+
The **Function overview** shows a visualization of your function, including any triggers, destinations, and layer that you have configured for the function\.
36
36
37
-
![\[A Lambda function with an Amazon S3 trigger and an Amazon EventBridge destination.\]](http://docs.aws.amazon.com/lambda/latest/dg/images/console-designer.png)
37
+
![\[A Lambda function with no triggers, destinations or layers.\]](http://docs.aws.amazon.com/lambda/latest/dg/images/console-designer.png)
38
38
39
39
### Invoke the Lambda function<aname="get-started-invoke-manually"></a>
40
40
41
41
Invoke your Lambda function using the sample event data provided in the console\.
42
42
43
43
**To invoke a function**
44
44
45
-
1. In the console, open the file with the lambda function. For this Node\.js app, it's called index\.js.
46
-
47
-
1. Click on the orange **Test** button to create a new test event. Each user can create up to 10 test events per function\. Those test events are not available to other users\.
45
+
1. After selecting your function, choose the **Test** tab\.
48
46
49
-
1.Enter an**Event name** and note the following sample event template:
47
+
1.In the**Test event** section, choose **New event**\. In **Template**, leave the default **hello\-world** option\. Enter a **Name** for this test and note the following sample event template:
50
48
51
49
```
52
50
{
@@ -56,15 +54,16 @@ Invoke your Lambda function using the sample event data provided in the console\
56
54
}
57
55
```
58
56
59
-
1. Choose **Create**, and then choose **Test** again to run the function\.
57
+
1. Choose **Save changes**, and then choose **Test**\. Each user can create up to 10 test events per function\.Those test events are not available to other users\.
60
58
61
59
Lambda runs your function on your behalf\. The function handler receives and then processes the sample event\.
62
60
63
61
1. Upon successful completion, view the results in the console\.
64
-
+ The **Execution results** tab shows the execution status as **succeeded**\. Here you will also see **Function Logs**\.
62
+
+ The **Execution result** shows the execution status as **succeeded**\. To view the function execution results, expand **Details**\. Note that the **logs** link opens the **Log groups** page in the CloudWatch console\.
63
+
+ The **Summary** section shows the key information reported in the **Log output** section \(the *REPORT* line in the execution log\)\.
64
+
+ The **Log output** section shows the log that Lambda generates for each invocation\. The function writes these logs to CloudWatch\. The Lambda console shows these logs for your convenience\. Choose **Click here** to add logs to the CloudWatch log group and open the **Log groups** page in the CloudWatch console\.
65
65
66
-
1. To make changes to your lambda function, edit the `index.js` file, and choose **Deploy**\. This will store those changes in S3. Then, choose **Test** again to run the function.
67
-
66
+
1. Run the function \(choose **Test**\) a few more times to gather some metrics that you can view in the next step\.
68
67
69
68
1. Choose the **Monitor** tab\. This page shows graphs for the metrics that Lambda sends to CloudWatch\.
70
69
![\[Image NOT FOUND\]](http://docs.aws.amazon.com/lambda/latest/dg/images/metrics-functions-list.png)
@@ -232,7 +231,7 @@ In the following commands, replace `123456789012` with your AWS account ID\.
232
231
233
232
### Update the user permissions<a name="gettingstarted-images-permissions"></a>
234
233
235
-
Make sure that the permissions for the IAM user or role that creates the function contain the AWS managed policies `GetRepositoryPolicy`and `SetRepositoryPolicy`\. For information about access policies, see [ Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/access.html) in the *IAM User Guide*
234
+
Make sure that the permissions for the IAM user or role that creates the function contain the AWS managed policies `GetRepositoryPolicy`, `SetRepositoryPolicy`, and `InitiateLayerUpload`\. For information about access policies, see [ Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/access.html) in the *IAM User Guide*
236
235
237
236
For example, use the IAM console to create a role with the following policy:
238
237
@@ -243,7 +242,7 @@ For example, use the IAM console to create a role with the following policy:
@@ -280,7 +279,7 @@ Invoke your Lambda function using the sample event data provided in the console\
280
279
281
280
1. After selecting your function, choose the **Test** tab\.
282
281
283
-
1. In the **Test event** section, choose **New event**\. In **Template**, leave the default **hello\-world** option\. Enter an **Name** and note the following sample event template:
282
+
1. In the **Test event** section, choose **New event**\. In **Template**, leave the default **hello\-world** option\. Enter a **Name** for this test and note the following sample event template:
284
283
285
284
```
286
285
{
@@ -290,7 +289,7 @@ Invoke your Lambda function using the sample event data provided in the console\
290
289
}
291
290
```
292
291
293
-
1. Choose **Create event**, and then choose **Invoke**\. Each user can create up to 10 test events per function\. Those test events are not available to other users\.
292
+
1. Choose **Save changes**, and then choose **Test**\. Each user can create up to 10 test events per function\. Those test events are not available to other users\.
294
293
295
294
Lambda runs your function on your behalf\. The function handler receives and then processes the sample event\.
296
295
@@ -299,9 +298,9 @@ Invoke your Lambda function using the sample event data provided in the console\
299
298
+ The **Summary** section shows the key information reported in the **Log output** section \(the *REPORT* line in the execution log\)\.
300
299
+ The **Log output** section shows the log that Lambda generates for each invocation\. The function writes these logs to CloudWatch\. The Lambda console shows these logs for your convenience\. Choose **Click here** to add logs to the CloudWatch log group and open the **Log groups** page in the CloudWatch console\.
301
300
302
-
1. Run the function \(choose **Invoke**\) a few more times to gather some metrics that you can view in the next step\.
301
+
1. Run the function \(choose **Test**\) a few more times to gather some metrics that you can view in the next step\.
303
302
304
-
1. Near the top of the page, choose the **Monitoring** tab\. This page shows graphs for the metrics that Lambda sends to CloudWatch\.
303
+
1. Choose the **Monitor** tab\. This page shows graphs for the metrics that Lambda sends to CloudWatch\.
305
304
![\[Image NOT FOUND\]](http://docs.aws.amazon.com/lambda/latest/dg/images/metrics-functions-list.png)
306
305
307
306
For more information on these graphs, see [Monitoring functions in the AWS Lambda console](monitoring-functions-access-metrics.md)\.
0 commit comments