You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This section contains the AWS Lambda API Reference documentation\. When making the API calls, you will need to authenticate your request by providing a signature\. AWS Lambda supports signature version 4\. For more information, see [Signature Version 4 Signing Process](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html) in the *Amazon Web Services General Reference*\.
3
+
This section contains the AWS Lambda API Reference documentation\. When making the API calls, you will need to authenticate your request by providing a signature\. AWS Lambda supports signature version 4\. For more information, see [Signature Version 4 signing process](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html) in the *Amazon Web Services General Reference*\.
4
4
5
-
For an overview of the service, see [What Is AWS Lambda?](welcome.md)\.
5
+
For an overview of the service, see [What is AWS Lambda?](welcome.md)\.
6
6
7
7
You can use the AWS CLI to explore the AWS Lambda API\. This guide provides several tutorials that use the AWS CLI\.
8
8
9
9
**Topics**
10
10
+[Actions](API_Operations.md)
11
11
+[Data Types](API_Types.md)
12
12
13
-
## Certificate Errors When Using an SDK<aname="cert-errors"></a>
13
+
## Certificate errors when using an SDK<aname="cert-errors"></a>
14
14
15
15
Because AWS SDKs use the CA certificates from your computer, changes to the certificates on the AWS servers can cause connection failures when you attempt to use an SDK\. You can prevent these failures by keeping your computer's CA certificates and operating system up\-to\-date\. If you encounter this issue in a corporate environment and do not manage your own computer, you might need to ask an administrator to assist with the update process\. The following list shows minimum operating system and Java versions:
16
16
+ Microsoft Windows versions that have updates from January 2005 or later installed contain at least one of the required CAs in their trust list\.
@@ -23,4 +23,4 @@ When accessing the AWS Lambda management console or AWS Lambda API endpoints, wh
Root certificates from the first two authorities are available from [Amazon Trust Services](https://www.amazontrust.com/repository/), but keeping your computer up\-to\-date is the more straightforward solution\. To learn more about ACM\-provided certificates, see [AWS Certificate Manager FAQs\.](https://aws.amazon.com/certificate-manager/faqs/#certificates)
26
+
Root certificates from the first two authorities are available from [Amazon trust services](https://www.amazontrust.com/repository/), but keeping your computer up\-to\-date is the more straightforward solution\. To learn more about ACM\-provided certificates, see [AWS Certificate Manager FAQs\.](https://aws.amazon.com/certificate-manager/faqs/#certificates)
Copy file name to clipboardExpand all lines: doc_source/access-control-identity-based.md
+10-10
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Identity\-based IAM Policies for AWS Lambda<aname="access-control-identity-based"></a>
1
+
# Identity\-based IAM policies for AWS Lambda<aname="access-control-identity-based"></a>
2
2
3
3
You can use identity\-based policies in AWS Identity and Access Management \(IAM\) to grant users in your account access to Lambda\. Identity\-based policies can apply to users directly, or to groups and roles that are associated with a user\. You can also grant users in another account permission to assume a role in your account and access your Lambda resources\.
4
4
@@ -10,15 +10,15 @@ Lambda provides managed policies that grant access to Lambda API actions and, in
10
10
Managed policies grant permission to API actions without restricting the functions or layers that a user can modify\. For finer\-grained control, you can create your own policies that limit the scope of a user's permissions\.
## Function Development<aname="permissions-user-function"></a>
17
+
## Function development<aname="permissions-user-function"></a>
18
18
19
19
The following shows an example of a permissions policy with limited scope\. It allows a user to create and manage Lambda functions named with a designated prefix \(`intern-`\), and configured with a designated execution role\.
20
20
21
-
**Example Function Development Policy**
21
+
**Example Function development policy**
22
22
23
23
```
24
24
{
@@ -164,11 +164,11 @@ This policy allows a user to get started with Lambda, without putting other user
164
164
165
165
When you configure triggers for your function, you need access to use the AWS service that invokes your function\. For example, to configure an Amazon S3 trigger, you need permission to Amazon S3 actions to manage bucket notifications\. Many of these permissions are included in the **AWSLambdaFullAccess** managed policy\. Example policies are available in this guide's [GitHub repository](https://github.com/awsdocs/aws-lambda-developer-guide/tree/master/iam-policies)\.
166
166
167
-
## Layer Development and Use<aname="permissions-user-layer"></a>
167
+
## Layer development and use<aname="permissions-user-layer"></a>
168
168
169
169
The following policy grants a user permission to create layers and use them with functions\. The resource patterns allow the user to work in any AWS Region and with any layer version, as long as the name of the layer starts with `test-`\.
170
170
171
-
**Example Layer Development Policy**
171
+
**Example Layer development policy**
172
172
173
173
```
174
174
{
@@ -223,10 +223,10 @@ You can also enforce layer use during function creation and configuration with t
223
223
224
224
To ensure that the condition applies, verify that no other statements grant the user permission to these actions\.
You can apply any of the preceding policies and statements to a role, which you can then share with another account to give it access to your Lambda resources\. Unlike an IAM user, a role doesn't have credentials for authentication\. Instead, it has a *trust policy* that specifies who can assume the role and use its permissions\.
229
229
230
230
You can use cross\-account roles to give accounts that you trust access to Lambda actions and resources\. If you just want to grant permission to invoke a function or use a layer, use [resource\-based policies](access-control-resource-based.md) instead\.
231
231
232
-
For more information, see [IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html) in the *IAM User Guide*\.
232
+
For more information, see [IAM roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html) in the *IAM User Guide*\.
Copy file name to clipboardExpand all lines: doc_source/access-control-resource-based.md
+10-10
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Using Resource\-Based Policies for AWS Lambda<aname="access-control-resource-based"></a>
1
+
# Using resource\-based policies for AWS Lambda<aname="access-control-resource-based"></a>
2
2
3
3
AWS Lambda supports resource\-based permissions policies for Lambda functions and layers\. Resource\-based policies let you grant usage permission to other accounts on a per\-resource basis\. You also use a resource\-based policy to allow an AWS service to invoke your function\.
4
4
@@ -23,12 +23,12 @@ You can only update resource\-based policies for Lambda resources within the sco
23
23
Resource\-based policies apply to a single function, version, alias, or layer version\. They grant permission to one or more services and accounts\. For trusted accounts that you want to have access to multiple resources, or to use API actions that resource\-based policies don't support, you can use [cross\-account roles](access-control-identity-based.md)\.
24
24
25
25
**Topics**
26
-
+[Granting Function Access to AWS Services](#permissions-resource-serviceinvoke)
27
-
+[Granting Function Access to Other Accounts](#permissions-resource-xaccountinvoke)
28
-
+[Granting Layer Access to Other Accounts](#permissions-resource-xaccountlayer)
29
-
+[Cleaning Up Resource\-Based Policies](#permissions-resource-cleanup)
26
+
+[Granting function access to AWS services](#permissions-resource-serviceinvoke)
27
+
+[Granting function access to other accounts](#permissions-resource-xaccountinvoke)
28
+
+[Granting layer access to other accounts](#permissions-resource-xaccountlayer)
29
+
+[Cleaning up resource\-based policies](#permissions-resource-cleanup)
30
30
31
-
## Granting Function Access to AWS Services<aname="permissions-resource-serviceinvoke"></a>
31
+
## Granting function access to AWS services<aname="permissions-resource-serviceinvoke"></a>
32
32
33
33
When you [use an AWS service to invoke your function](lambda-services.md), you grant permission in a statement on a resource\-based policy\. You can apply the statement to the function, or limit it to a single version or alias\.
## Granting Function Access to Other Accounts<aname="permissions-resource-xaccountinvoke"></a>
60
+
## Granting function access to other accounts<aname="permissions-resource-xaccountinvoke"></a>
61
61
62
62
To grant permissions to another AWS account, specify the account ID as the `principal`\. The following example grants account `210987654321` permission to invoke `my-function` with the `prod` alias\.
63
63
@@ -85,7 +85,7 @@ You can then update the alias to point to new versions as needed\. When you upda
85
85
86
86
You can grant cross\-account access for most API actions that [operate on an existing function](lambda-api-permissions-ref.md#permissions-resources-function)\. For example, you could grant access to `lambda:ListAliases` to let an account get a list of aliases, or `lambda:GetFunction` to let them download your function code\. Add each permission separately, or use `lambda:*` to grant access to all actions for the specified function\.
@@ -107,7 +107,7 @@ You can grant cross\-account access for most API actions that [operate on an exi
107
107
108
108
To grant other accounts permission for multiple functions, or for actions that don't operate on a function, use [roles](access-control-identity-based.md)\.
109
109
110
-
## Granting Layer Access to Other Accounts<aname="permissions-resource-xaccountlayer"></a>
110
+
## Granting layer access to other accounts<aname="permissions-resource-xaccountlayer"></a>
111
111
112
112
To grant layer\-usage permission to another account, add a statement to the layer version's permissions policy with the `add-layer-version-permission` command\. In each statement, you can grant permission to a single account, all accounts, or an organization\.
To grant permission to all AWS accounts, use `*` for the principal, and omit the organization ID\. For multiple accounts or organizations, add multiple statements\.
132
132
133
-
## Cleaning Up Resource\-Based Policies<aname="permissions-resource-cleanup"></a>
133
+
## Cleaning up resource\-based policies<aname="permissions-resource-cleanup"></a>
134
134
135
135
To view a function's resource\-based policy, use the `get-policy` command\.
Copy file name to clipboardExpand all lines: doc_source/applications-console.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Managing Applications in the AWS Lambda Console<aname="applications-console"></a>
1
+
# Managing applications in the AWS Lambda console<aname="applications-console"></a>
2
2
3
3
The AWS Lambda console helps you monitor and manage your [Lambda applications](deploying-lambda-apps.md)\. The **Applications** menu lists AWS CloudFormation stacks with Lambda functions\. The menu includes stacks that you launch in AWS CloudFormation by using the AWS CloudFormation console, the AWS Serverless Application Repository, the AWS CLI, or the AWS SAM CLI\.
4
4
@@ -13,7 +13,7 @@ The overview shows the following information about your application\.
13
13
+**AWS CloudFormation template** or **SAM template** – The template that defines your application\.
14
14
+**Resources** – The AWS resources that are defined in your application's template\. To manage your application's Lambda functions, choose a function name from the list\.
The **Monitoring** tab shows an Amazon CloudWatch dashboard with aggregate metrics for the resources in your application\.
19
19
@@ -25,11 +25,11 @@ The **Monitoring** tab shows an Amazon CloudWatch dashboard with aggregate metri
25
25
26
26
By default, the Lambda console shows a basic dashboard\. You can customize this page by defining custom dashboards in your application template\. When your template includes one or more dashboards, the page shows your dashboards instead of the default dashboard\. You can switch between dashboards with the drop\-down menu on the top right of the page\.
Customize your application monitoring page by adding one or more Amazon CloudWatch dashboards to your application template with the [AWS::CloudWatch::Dashboard](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cw-dashboard.html) resource type\. The following example creates a dashboard with a single widget that graphs the number of invocations of a function named `my-function`\.
31
31
32
-
**Example Function Dashboard Template**
32
+
**Example Function dashboard template**
33
33
34
34
```
35
35
Resources:
@@ -88,4 +88,4 @@ You can get the definition for any of the widgets in the default monitoring dash
88
88
89
89
1. Choose **Source**\.
90
90
91
-
For more information about authoring CloudWatch dashboards and widgets, see [Dashboard Body Structure and Syntax](https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/CloudWatch-Dashboard-Body-Structure.html) in the *Amazon CloudWatch API Reference*\.
91
+
For more information about authoring CloudWatch dashboards and widgets, see [Dashboard body structure and syntax](https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/CloudWatch-Dashboard-Body-Structure.html) in the *Amazon CloudWatch API Reference*\.
0 commit comments