Back to Serverless

AWS Infrastructure Resources

docs/sf/providers/aws/guide/resources.md

4.29.047.2 KB
Original Source
<!-- title: Serverless Framework - AWS Infrastructure Resources short_title: AWS Infrastructure Resources description: How to deploy and manage AWS infrastructure to use with your AWS Lambda functions with the Serverless Framework. keywords: ['Serverless Framework', 'AWS Lambda', 'AWS Infrastructure', 'Serverless'] --> <!-- DOCS-SITE-LINK:START automatically generated -->

Read this on the main serverless docs site

<!-- DOCS-SITE-LINK:END -->

AWS Infrastructure Resources

If you are using AWS as a provider for your Service, all Resources are other AWS infrastructure resources which the AWS Lambda functions in your Service depend on, like AWS DynamoDB or AWS S3.

Using the Serverless Framework, you can define the infrastructure resources you need in serverless.yml, and easily deploy them.

Configuration

Every stage you deploy to with serverless.yml using the aws provider is a single AWS CloudFormation stack. This is where your AWS Lambda functions and their event configurations are defined and it's how they are deployed. When you add resources those resources are added into your CloudFormation stack upon serverless deploy.

Define your AWS resources in a property titled resources. What goes in this property is raw CloudFormation template syntax, in YAML, like this:

yml
# serverless.yml

service: usersCrud
provider: aws
functions:

resources: # CloudFormation template syntax
  Resources:
    usersTable:
      Type: AWS::DynamoDB::Table
      Properties:
        TableName: usersTable
        AttributeDefinitions:
          - AttributeName: email
            AttributeType: S
        KeySchema:
          - AttributeName: email
            KeyType: HASH
        ProvisionedThroughput:
          ReadCapacityUnits: 1
          WriteCapacityUnits: 1

You can attach any kind of resource to your CloudFormation stack. You can add Resources, Outputs. You can also use Serverless Variables for sensitive data or reusable configuration in your resources templates.

Note: By supplying your resources at resources.Resources you may accidentally override resources as generated by the framework. To intentionally extend such resources, please use resources.extensions, see Override AWS CloudFormation Resource section for more info.

Note: You can now remove resource properties with null assignment. Since CloudFormation does not allow this, Serverless will strip these properties from the final template before upload.

AWS CloudFormation Resource Reference

To have consistent naming in the CloudFormation Templates that get deployed we use a standard pattern:

{Function Name}{Cloud Formation Resource Type}{Resource Name}{SequentialID, instanceId or Random String}

  • Function Name - This is optional for Resources that should be recreated when the function name gets changed. Those resources are also called function bound
  • Cloud Formation Resource Type - E.g., S3Bucket
  • Resource Name - An identifier for the specific resource, e.g. for an S3 Bucket the configured bucket name.
  • SequentialID, instanceId or Random String - For a few resources we need to add an optional sequential id, the Serverless instanceId (accessible via ${sls:instanceId}) or a random string to identify them

All resource names that are deployed by Serverless have to follow this naming scheme. The only exception (for backwards compatibility reasons) is the S3 Bucket that is used to upload artifacts so they can be deployed to your function.

We're also using the term normalizedName or similar terms in this guide. This means dropping any characters that aren't allowed in resources names, e.g. special characters.

If you have path variables in your url, they get normalized too, and there is a Var added implicitly. So normalizedPath for POST /users/{user_id} will be normalized to UsersUseridVarTestPost

Tip: If you are unsure how a resource is named, that you want to reference from your custom resources, you can issue a serverless package. This will create the CloudFormation template for your service in the .serverless folder (it is named cloudformation-template-update-stack.json). Just open the file and check for the generated resource name.

AWS ResourceName TemplateExample
S3::BucketS3Bucket{normalizedBucketName}S3BucketMybucket
IAM::RoleIamRoleLambdaExecutionIamRoleLambdaExecution
Lambda::Function{normalizedFunctionName}LambdaFunctionHelloLambdaFunction
Lambda::Url{normalizedFunctionName}LambdaFunctionUrlHelloLambdaFunctionUrl
Lambda::Version{normalizedFunctionName}LambdaVersion{sha256}HelloLambdaVersionr3pgoTvv1xT4E4NiCL6JG02fl6vIyi7OS1aW0FwAI
Logs::LogGroup{normalizedFunctionName}LogGroupHelloLogGroup
Lambda::Permission<ul><li>Schedule: {normalizedFunctionName}LambdaPermissionEventsRuleSchedule{index}</li><li>CloudWatch Event: {normalizedFunctionName}LambdaPermissionEventsRuleCloudWatchEvent{index}</li><li>CloudWatch Log: {normalizedFunctionName}LambdaPermissionLogsSubscriptionFilterCloudWatchLog{index}</li><li>IoT: {normalizedFunctionName}LambdaPermissionIotTopicRule{index} </li><li>S3: {normalizedFunctionName}LambdaPermission{normalizedBucketName}S3</li><li>APIG: {normalizedFunctionName}LambdaPermissionApiGateway</li><li>SNS: {normalizedFunctionName}LambdaPermission{normalizedTopicName}SNS</li><li>Alexa Skill: {normalizedFunctionName}LambdaPermissionAlexaSkill</li><li>Alexa Smart Home: {normalizedFunctionName}LambdaPermissionAlexaSmartHome{index}</li><li>Cognito User Pool Trigger Source: {normalizedFunctionName}LambdaPermissionCognitoUserPool{normalizedPoolId}TriggerSource{triggerSource}</li> </ul><ul><li>Schedule: HelloLambdaPermissionEventsRuleSchedule1</li><li>CloudWatch Event: HelloLambdaPermissionEventsRuleCloudWatchEvent1</li><li>CloudWatch Log: HelloLambdaPermissionLogsSubscriptionFilterCloudWatchLog1</li><li>IoT: HelloLambdaPermissionIotTopicRule1 </li><li>S3: HelloLambdaPermissionBucketS3</li><li>APIG: HelloLambdaPermissionApiGateway</li><li>SNS: HelloLambdaPermissionTopicSNS</li><li>Alexa Skill: HelloLambdaPermissionAlexaSkill</li><li>Alexa Smart Home: HelloLambdaPermissionAlexaSmartHome1</li><li>Cognito User Pool Trigger Source: HelloLambdaPermissionCognitoUserPoolMyPoolTriggerSourceCustomMessage</li> </ul>
Events::Rule<ul><li>Schedule: {normalizedFunctionName}EventsRuleSchedule{SequentialID}</li><li>CloudWatch Event: {normalizedFunctionName}EventsRuleCloudWatchEvent{SequentialID}</li> </ul><ul><li>Schedule: HelloEventsRuleSchedule1</li><li>CloudWatch Event: HelloEventsRuleCloudWatchEvent1</li></ul>
AWS::Logs::SubscriptionFilter{normalizedFunctionName}LogsSubscriptionFilterCloudWatchLog{SequentialID}HelloLogsSubscriptionFilterCloudWatchLog1
AWS::IoT::TopicRule{normalizedFunctionName}IotTopicRule{SequentialID}HelloIotTopicRule1
ApiGateway::RestApiApiGatewayRestApiApiGatewayRestApi
ApiGateway::ResourceApiGatewayResource{normalizedPath}ApiGatewayResourceUsers
ApiGateway::MethodApiGatewayMethod{normalizedPath}{normalizedMethod}ApiGatewayMethodUsersGet
ApiGateway::Authorizer{normalizedFunctionName}ApiGatewayAuthorizerHelloApiGatewayAuthorizer
ApiGateway::DeploymentApiGatewayDeployment{instanceId}ApiGatewayDeployment12356789
ApiGateway::ApiKeyApiGatewayApiKey{OptionalNormalizedName}{SequentialID}ApiGatewayApiKeyFree1
ApiGateway::UsagePlanApiGatewayUsagePlan{OptionalNormalizedName}ApiGatewayUsagePlanFree
ApiGateway::UsagePlanKeyApiGatewayUsagePlanKey{OptionalNormalizedName}{SequentialID}ApiGatewayUsagePlanKeyFree1
ApiGateway::StageApiGatewayStageApiGatewayStage
SNS::TopicSNSTopic{normalizedTopicName}SNSTopicSometopic
SNS::Subscription{normalizedFunctionName}SnsSubscription{normalizedTopicName}HelloSnsSubscriptionSomeTopic
AWS::Lambda::EventSourceMapping<ul><li>DynamoDB: {normalizedFunctionName}EventSourceMappingDynamodb{tableName}</li><li>Kinesis: {normalizedFunctionName}EventSourceMappingKinesis{streamName}</li></ul><ul><li>DynamoDB: HelloLambdaEventSourceMappingDynamodbUsers</li><li>Kinesis: HelloLambdaEventSourceMappingKinesisMystream</li></ul>
Cognito::UserPoolCognitoUserPool{normalizedPoolId}CognitoUserPoolPoolId

Override AWS CloudFormation Resource

You can override the specific CloudFormation resource to apply your own options (place all such extensions at resources.extensions section). For example, if you want to set AWS::Logs::LogGroup retention time to 30 days, override it with above table's Name Template.

When you override basic resources, there are two things to keep in mind when it comes to normalizedFunctionName:

  • It should start with an uppercase character
  • The - will be changed to Dash, _ will be changed to Underscore

Here's an example:

yml
functions:
  write-post:
    handler: handler.writePost
    events:
      - httpApi: 'POST /api/posts/new'

resources:
  extensions:
    WriteDashPostLogGroup:
      Properties:
        RetentionInDays: '30'

Here's how the extension logic is defined:

Resource attributeOperation
ConditionSet to extension value if present.
CreationPolicySet to extension value if present.
DeletionPolicySet to extension value if present.
DependsOnMerge. The extension value will be added to the resource's DependsOn list.
MetadataMerge. If a metadata key with the same name exists in the resource, the value will be replaced with the extension value.
PropertiesMerge. If a property with the same name exists in the resource, the value will be replaced with the extension value.
UpdatePolicySet to extension value if present.
UpdateReplacePolicySet to extension value if present.
otherNot supported. An error will be thrown if you try to extend an unsupported attribute.

Extending using resources.extensions only works on the Resources part of the CloudFormation template.