aws-s3-lambda
| Reference Documentation: | https://docs.aws.amazon.com/solutions/latest/constructs/ |
| Language | Package |
|---|---|
|
|
|
|
|
|
|
|
|
Overview
This AWS Solutions Construct implements an Amazon S3 bucket connected to an AWS Lambda function.
Here is a minimal deployable pattern definition:
Pattern Construct Props
| Name | Type | Description |
|---|---|---|
|
existingLambdaObj? |
Existing instance of Lambda Function object, providing both this and
|
|
|
lambdaFunctionProps? |
Optional user provided props to override the default props for the Lambda function. |
|
|
existingBucketObj? |
Existing instance of S3 Bucket object. If this is provided, then also providing bucketProps is an error. |
|
|
bucketProps? |
Optional user provided props to override the default props for the S3 Bucket. |
|
|
s3EventSourceProps? |
Optional user provided props to override the default props for S3EventSourceProps |
|
|
loggingBucketProps? |
Optional user provided props to override the default props for the S3 Logging Bucket. |
|
|
logS3AccessLogs? |
boolean |
Whether to turn on Access Logging for the S3 bucket. Creates an S3 bucket with associated storage costs for the logs. Enabling Access Logging is a best practice. default - true |
Pattern Properties
| Name | Type | Description |
|---|---|---|
|
lambdaFunction |
Returns an instance of the lambda.Function created by the construct |
|
|
s3Bucket? |
Returns an instance of the s3.Bucket created by the construct |
|
|
s3LoggingBucket? |
Returns an instance of s3.Bucket created by the construct as the logging bucket for the primary bucket. |
|
|
s3BucketInterface |
Returns an instance of s3.IBucket created by the construct |
Default settings
Out of the box implementation of the Construct without any override will set the following defaults:
Amazon S3 Bucket
-
Configure Access logging for S3 Bucket
-
Enable server-side encryption for S3 Bucket using AWS managed KMS Key
-
Enforce encryption of data in transit
-
Turn on the versioning for S3 Bucket
-
Don’t allow public access for S3 Bucket
-
Retain the S3 Bucket when deleting the CloudFormation stack
-
Applies Lifecycle rule to move noncurrent object versions to Glacier storage after 90 days
AWS Lambda Function
-
Configure limited privilege access IAM role for Lambda function
-
Enable reusing connections with Keep-Alive for NodeJs Lambda function
-
Enable X-Ray Tracing
-
Set Environment Variables
-
AWS_NODEJS_CONNECTION_REUSE_ENABLED (for Node 10.x and higher functions)
-
Architecture
Github
Go to the Github repo