You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Users shouldn't access directly AWS Lambda directly. If you'd to like to expose your Lambda function to users a better approach would be to set up API Gateway endpoint between the users and the Lambda function.
1240
+
1241
+
This not only provides enhanced security but also easier access for the user where he can use HTTP or HTTPS for accessing the function.
1242
+
</b></details>
1243
+
1244
+
<details>
1245
+
<summary>Specify one or more use cases for using AWS Lambda</summary><br><b>
1246
+
1247
+
- Uploading images to S3 and tagging them or inserting information on the images to a database
1248
+
- Uploading videos to S3 and edit them or add subtitles/captions to them and store the result in S3
1249
+
- Use SNS and/or SQS to trigger functions based on notifications or messages receieved from these services.
1250
+
- Cron Jobs: Use Lambda together with CloudWatch events to schedule tasks/functions periodically.
1251
+
</b></details>
1252
+
1253
+
<details>
1254
+
<summary>You run an architecture where you have a Lambda function that uploads images to S3 bucket and stores information on the images in DynamoDB. You would like to expose the function to users so they can invoke it. Your friend Carlos suggests you expose the credentials to the Lambda function. What's your take on that?</summary><br><b>
1255
+
1256
+
That's a big no. You shouldn't let users direct access to your Lambda function.
1257
+
1258
+
The way to go here and expose the Lambda function to users is to to an API Gateway endpoint.
0 commit comments