Skip to content

Commit ed29db6

Browse files
committed
sentence-cased titles
1 parent 12ee1b1 commit ed29db6

File tree

178 files changed

+1529
-1427
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

178 files changed

+1529
-1427
lines changed

doc_source/API_Reference.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
1-
# API Reference<a name="API_Reference"></a>
1+
# API reference<a name="API_Reference"></a>
22

3-
This section contains the AWS Lambda API Reference documentation\. When making the API calls, you will need to authenticate your request by providing a signature\. AWS Lambda supports signature version 4\. For more information, see [Signature Version 4 Signing Process](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html) in the *Amazon Web Services General Reference*\.
3+
This section contains the AWS Lambda API Reference documentation\. When making the API calls, you will need to authenticate your request by providing a signature\. AWS Lambda supports signature version 4\. For more information, see [Signature Version 4 signing process](https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html) in the *Amazon Web Services General Reference*\.
44

5-
For an overview of the service, see [What Is AWS Lambda?](welcome.md)\.
5+
For an overview of the service, see [What is AWS Lambda?](welcome.md)\.
66

77
You can use the AWS CLI to explore the AWS Lambda API\. This guide provides several tutorials that use the AWS CLI\.
88

99
**Topics**
1010
+ [Actions](API_Operations.md)
1111
+ [Data Types](API_Types.md)
1212

13-
## Certificate Errors When Using an SDK<a name="cert-errors"></a>
13+
## Certificate errors when using an SDK<a name="cert-errors"></a>
1414

1515
Because AWS SDKs use the CA certificates from your computer, changes to the certificates on the AWS servers can cause connection failures when you attempt to use an SDK\. You can prevent these failures by keeping your computer's CA certificates and operating system up\-to\-date\. If you encounter this issue in a corporate environment and do not manage your own computer, you might need to ask an administrator to assist with the update process\. The following list shows minimum operating system and Java versions:
1616
+ Microsoft Windows versions that have updates from January 2005 or later installed contain at least one of the required CAs in their trust list\.
@@ -23,4 +23,4 @@ When accessing the AWS Lambda management console or AWS Lambda API endpoints, wh
2323
+ Starfield Services Root Certificate Authority \- G2
2424
+ Starfield Class 2 Certification Authority
2525

26-
Root certificates from the first two authorities are available from [Amazon Trust Services](https://www.amazontrust.com/repository/), but keeping your computer up\-to\-date is the more straightforward solution\. To learn more about ACM\-provided certificates, see [AWS Certificate Manager FAQs\.](https://aws.amazon.com/certificate-manager/faqs/#certificates)
26+
Root certificates from the first two authorities are available from [Amazon trust services](https://www.amazontrust.com/repository/), but keeping your computer up\-to\-date is the more straightforward solution\. To learn more about ACM\-provided certificates, see [AWS Certificate Manager FAQs\.](https://aws.amazon.com/certificate-manager/faqs/#certificates)

doc_source/access-control-identity-based.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Identity\-based IAM Policies for AWS Lambda<a name="access-control-identity-based"></a>
1+
# Identity\-based IAM policies for AWS Lambda<a name="access-control-identity-based"></a>
22

33
You can use identity\-based policies in AWS Identity and Access Management \(IAM\) to grant users in your account access to Lambda\. Identity\-based policies can apply to users directly, or to groups and roles that are associated with a user\. You can also grant users in another account permission to assume a role in your account and access your Lambda resources\.
44

@@ -10,15 +10,15 @@ Lambda provides managed policies that grant access to Lambda API actions and, in
1010
Managed policies grant permission to API actions without restricting the functions or layers that a user can modify\. For finer\-grained control, you can create your own policies that limit the scope of a user's permissions\.
1111

1212
**Topics**
13-
+ [Function Development](#permissions-user-function)
14-
+ [Layer Development and Use](#permissions-user-layer)
15-
+ [Cross\-Account Roles](#permissions-user-xaccount)
13+
+ [Function development](#permissions-user-function)
14+
+ [Layer development and use](#permissions-user-layer)
15+
+ [Cross\-account roles](#permissions-user-xaccount)
1616

17-
## Function Development<a name="permissions-user-function"></a>
17+
## Function development<a name="permissions-user-function"></a>
1818

1919
The following shows an example of a permissions policy with limited scope\. It allows a user to create and manage Lambda functions named with a designated prefix \(`intern-`\), and configured with a designated execution role\.
2020

21-
**Example Function Development Policy**
21+
**Example Function development policy**
2222

2323
```
2424
{
@@ -164,11 +164,11 @@ This policy allows a user to get started with Lambda, without putting other user
164164

165165
When you configure triggers for your function, you need access to use the AWS service that invokes your function\. For example, to configure an Amazon S3 trigger, you need permission to Amazon S3 actions to manage bucket notifications\. Many of these permissions are included in the **AWSLambdaFullAccess** managed policy\. Example policies are available in this guide's [GitHub repository](https://github.com/awsdocs/aws-lambda-developer-guide/tree/master/iam-policies)\.
166166

167-
## Layer Development and Use<a name="permissions-user-layer"></a>
167+
## Layer development and use<a name="permissions-user-layer"></a>
168168

169169
The following policy grants a user permission to create layers and use them with functions\. The resource patterns allow the user to work in any AWS Region and with any layer version, as long as the name of the layer starts with `test-`\.
170170

171-
**Example Layer Development Policy**
171+
**Example Layer development policy**
172172

173173
```
174174
{
@@ -223,10 +223,10 @@ You can also enforce layer use during function creation and configuration with t
223223

224224
To ensure that the condition applies, verify that no other statements grant the user permission to these actions\.
225225

226-
## Cross\-Account Roles<a name="permissions-user-xaccount"></a>
226+
## Cross\-account roles<a name="permissions-user-xaccount"></a>
227227

228228
You can apply any of the preceding policies and statements to a role, which you can then share with another account to give it access to your Lambda resources\. Unlike an IAM user, a role doesn't have credentials for authentication\. Instead, it has a *trust policy* that specifies who can assume the role and use its permissions\.
229229

230230
You can use cross\-account roles to give accounts that you trust access to Lambda actions and resources\. If you just want to grant permission to invoke a function or use a layer, use [resource\-based policies](access-control-resource-based.md) instead\.
231231

232-
For more information, see [IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html) in the *IAM User Guide*\.
232+
For more information, see [IAM roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html) in the *IAM User Guide*\.

doc_source/access-control-resource-based.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Using Resource\-Based Policies for AWS Lambda<a name="access-control-resource-based"></a>
1+
# Using resource\-based policies for AWS Lambda<a name="access-control-resource-based"></a>
22

33
AWS Lambda supports resource\-based permissions policies for Lambda functions and layers\. Resource\-based policies let you grant usage permission to other accounts on a per\-resource basis\. You also use a resource\-based policy to allow an AWS service to invoke your function\.
44

@@ -23,12 +23,12 @@ You can only update resource\-based policies for Lambda resources within the sco
2323
Resource\-based policies apply to a single function, version, alias, or layer version\. They grant permission to one or more services and accounts\. For trusted accounts that you want to have access to multiple resources, or to use API actions that resource\-based policies don't support, you can use [cross\-account roles](access-control-identity-based.md)\.
2424

2525
**Topics**
26-
+ [Granting Function Access to AWS Services](#permissions-resource-serviceinvoke)
27-
+ [Granting Function Access to Other Accounts](#permissions-resource-xaccountinvoke)
28-
+ [Granting Layer Access to Other Accounts](#permissions-resource-xaccountlayer)
29-
+ [Cleaning Up Resource\-Based Policies](#permissions-resource-cleanup)
26+
+ [Granting function access to AWS services](#permissions-resource-serviceinvoke)
27+
+ [Granting function access to other accounts](#permissions-resource-xaccountinvoke)
28+
+ [Granting layer access to other accounts](#permissions-resource-xaccountlayer)
29+
+ [Cleaning up resource\-based policies](#permissions-resource-cleanup)
3030

31-
## Granting Function Access to AWS Services<a name="permissions-resource-serviceinvoke"></a>
31+
## Granting function access to AWS services<a name="permissions-resource-serviceinvoke"></a>
3232

3333
When you [use an AWS service to invoke your function](lambda-services.md), you grant permission in a statement on a resource\-based policy\. You can apply the statement to the function, or limit it to a single version or alias\.
3434

@@ -57,7 +57,7 @@ $ aws lambda add-permission --function-name my-function --action lambda:InvokeFu
5757
--principal s3.amazonaws.com --source-arn arn:aws:s3:::my-bucket-123456 --source-account 123456789012
5858
```
5959

60-
## Granting Function Access to Other Accounts<a name="permissions-resource-xaccountinvoke"></a>
60+
## Granting function access to other accounts<a name="permissions-resource-xaccountinvoke"></a>
6161

6262
To grant permissions to another AWS account, specify the account ID as the `principal`\. The following example grants account `210987654321` permission to invoke `my-function` with the `prod` alias\.
6363

@@ -85,7 +85,7 @@ You can then update the alias to point to new versions as needed\. When you upda
8585

8686
You can grant cross\-account access for most API actions that [operate on an existing function](lambda-api-permissions-ref.md#permissions-resources-function)\. For example, you could grant access to `lambda:ListAliases` to let an account get a list of aliases, or `lambda:GetFunction` to let them download your function code\. Add each permission separately, or use `lambda:*` to grant access to all actions for the specified function\.
8787

88-
**Cross\-Account APIs**
88+
**Cross\-account APIs**
8989
+ [Invoke](API_Invoke.md)
9090
+ [GetFunction](API_GetFunction.md)
9191
+ [GetFunctionConfiguration](API_GetFunctionConfiguration.md)
@@ -107,7 +107,7 @@ You can grant cross\-account access for most API actions that [operate on an exi
107107

108108
To grant other accounts permission for multiple functions, or for actions that don't operate on a function, use [roles](access-control-identity-based.md)\.
109109

110-
## Granting Layer Access to Other Accounts<a name="permissions-resource-xaccountlayer"></a>
110+
## Granting layer access to other accounts<a name="permissions-resource-xaccountlayer"></a>
111111

112112
To grant layer\-usage permission to another account, add a statement to the layer version's permissions policy with the `add-layer-version-permission` command\. In each statement, you can grant permission to a single account, all accounts, or an organization\.
113113

@@ -130,7 +130,7 @@ b0cd9796-d4eb-4564-939f-de7fe0b42236 {"Sid":"engineering-org","Effect":"Allow
130130

131131
To grant permission to all AWS accounts, use `*` for the principal, and omit the organization ID\. For multiple accounts or organizations, add multiple statements\.
132132

133-
## Cleaning Up Resource\-Based Policies<a name="permissions-resource-cleanup"></a>
133+
## Cleaning up resource\-based policies<a name="permissions-resource-cleanup"></a>
134134

135135
To view a function's resource\-based policy, use the `get-policy` command\.
136136

doc_source/applications-console.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Managing Applications in the AWS Lambda Console<a name="applications-console"></a>
1+
# Managing applications in the AWS Lambda console<a name="applications-console"></a>
22

33
The AWS Lambda console helps you monitor and manage your [Lambda applications](deploying-lambda-apps.md)\. The **Applications** menu lists AWS CloudFormation stacks with Lambda functions\. The menu includes stacks that you launch in AWS CloudFormation by using the AWS CloudFormation console, the AWS Serverless Application Repository, the AWS CLI, or the AWS SAM CLI\.
44

@@ -13,7 +13,7 @@ The overview shows the following information about your application\.
1313
+ **AWS CloudFormation template** or **SAM template** – The template that defines your application\.
1414
+ **Resources** – The AWS resources that are defined in your application's template\. To manage your application's Lambda functions, choose a function name from the list\.
1515

16-
## Monitoring Applications<a name="applications-console-monitoring"></a>
16+
## Monitoring applications<a name="applications-console-monitoring"></a>
1717

1818
The **Monitoring** tab shows an Amazon CloudWatch dashboard with aggregate metrics for the resources in your application\.
1919

@@ -25,11 +25,11 @@ The **Monitoring** tab shows an Amazon CloudWatch dashboard with aggregate metri
2525

2626
By default, the Lambda console shows a basic dashboard\. You can customize this page by defining custom dashboards in your application template\. When your template includes one or more dashboards, the page shows your dashboards instead of the default dashboard\. You can switch between dashboards with the drop\-down menu on the top right of the page\.
2727

28-
## Custom Monitoring Dashboards<a name="applications-console-dashboards"></a>
28+
## Custom monitoring dashboards<a name="applications-console-dashboards"></a>
2929

3030
Customize your application monitoring page by adding one or more Amazon CloudWatch dashboards to your application template with the [AWS::CloudWatch::Dashboard](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cw-dashboard.html) resource type\. The following example creates a dashboard with a single widget that graphs the number of invocations of a function named `my-function`\.
3131

32-
**Example Function Dashboard Template**
32+
**Example Function dashboard template**
3333

3434
```
3535
Resources:
@@ -88,4 +88,4 @@ You can get the definition for any of the widgets in the default monitoring dash
8888

8989
1. Choose **Source**\.
9090

91-
For more information about authoring CloudWatch dashboards and widgets, see [Dashboard Body Structure and Syntax](https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/CloudWatch-Dashboard-Body-Structure.html) in the *Amazon CloudWatch API Reference*\.
91+
For more information about authoring CloudWatch dashboards and widgets, see [Dashboard body structure and syntax](https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/CloudWatch-Dashboard-Body-Structure.html) in the *Amazon CloudWatch API Reference*\.

0 commit comments

Comments
 (0)