AWS Compute Blog
Category: Serverless
Getting started with serverless for developers: Part 3 – The front door
This blog post is part 3 of Getting started with serverless for developers, helping developers to start building serverless applications from their IDE. In the previous post, I introduce AWS Lambda and show how functions are designed to run business logic for serverless applications. In this blog post, you see how to access that business […]
Modeling workflow input and output path processing with data flow simulator
AWS Step Functions recently introduced a new data flow simulator to model input and output path processing. This new feature makes it easier to evaluate JSON-based input and output data as it passes through a state, helping to build workflows faster. Developers build Step Functions workflows to orchestrate multiple services into business-critical applications with minimal […]
Optimizing serverless development with samconfig
The AWS Serverless Application Model (AWS SAM) is an open-source framework for building serverless applications using infrastructure as code (IaC). Using shorthand syntax, developers declare AWS CloudFormation resources or specialized serverless resources that are transformed to infrastructure during deployment. AWS SAM commands list AWS SAM’s companion, the AWS SAM Command Line Interface (CLI), provides a […]
Getting started with serverless for developers: Part 2 – The business logic
This blog is part 2 of “Getting started with serverless for developers“, helping developers start building serverless applications from their IDE. In part 1 you learn why developers need serverless technologies and which challenges serverless technologies help to solve. You are introduced to an example serverless application. Deploying this application to your AWS account in […]
Introducing cross-Region event routing with Amazon EventBridge
With cross-Region event routing in EventBridge, you can now route events from any AWS Region to other supported Regions. This post explains how to configure cross-Region event routing in the console and CLI and explains how to restrict access to routing capabilities. Finally, I walk through an example you can deploy to your AWS account.
Controlling concurrency in distributed systems using AWS Step Functions
In this blog post, you learn how to control concurrency in a distributed system. You implement a semaphore using Step Functions and DynamoDB Conditional Expressions. Finally, you use EventBridge to trigger lock cleanup when you encounter failure.
Register now for the Serverless Live virtual event
The AWS Serverless team is excited to bring you the second annual serverless-first event, Serverless Live, on May 19. We’ll be livestreaming technical deep dives, demos, and live Q&A to help you get the most out of the cloud. The event opens with a keynote by Adrian Cockcroft, VP of Sustainability Architecture. It’s followed by […]
Getting started with serverless for developers: Part 1
Update : You can now find the supporting GitHub repository to this series. Part 2: The business logic Part 3: The front door Part 4: Local developer workflow Part 5: Sandbox developer account Developers around the world are already running serverless applications in production without worrying about servers. This new getting started series is for […]
Operating Lambda: Isolating and resolving issues
This blog post outlines a general approach to debugging Lambda performance issues and errors. This provides a repeatable process for isolating and resolving problems in your serverless workloads. Using the walkthrough of the Coffee Lookup application, I show how to reproduce a production bug, isolate the cause of errors, and then isolate the performance issue.
Evaluating access control methods to secure Amazon API Gateway APIs
This post is written by Bryant Bost, Cloud Application Architect. There is not a one-size-fits-all approach to access control for Amazon API Gateway. Properties of your application such as API type, identity provider, client access patterns, privacy requirements, and others influence the design of your access control solution. Understanding the types of access control available […]