Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering AWS Lambda

You're reading from   Mastering AWS Lambda Learn how to build and deploy serverless applications

Arrow left icon
Product type Paperback
Published in Aug 2017
Publisher Packt
ISBN-13 9781786467690
Length 300 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Authors (2):
Arrow left icon
Udita Gupta Udita Gupta
Author Profile Icon Udita Gupta
Udita Gupta
Yohan Wadia Yohan Wadia
Author Profile Icon Yohan Wadia
Yohan Wadia
Arrow right icon
View More author details
Toc

Table of Contents (11) Chapters Close

Preface 1. Introducing AWS Lambda FREE CHAPTER 2. Writing Lambda Functions 3. Testing Lambda Functions 4. Event-Driven Model 5. Extending AWS Lambda with External Services 6. Build and Deploy Serverless Applications with AWS Lambda 7. Monitoring and Troubleshooting AWS Lambda 8. Introducing the Serverless Application Framework 9. AWS Lambda - Use Cases 10. Next Steps with AWS Lambda

Recommendations and best practices

Here are a few key recommendations and best practices that you ought to keep in mind when working with monitoring and logging services:

  • Leverage AWS services for monitoring: Although still a long way from a fully potent monitoring solution, CloudWatch and X-Ray still are a good choice for starting out with monitoring your serverless applications. The ideal case would always be to leverage both these services together for a complete monitoring experience.
  • Provide the correct IAM permissions: Most of the time the issues are not with your function's code, but rather caused due to incorrect or missing IAM policies and permissions. Always make sure you provide the IAM policies that follow the least privileged requirement in order to run your function and periodically ensure that unwanted or unused IAM roles and policies are removed from the...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £16.99/month. Cancel anytime