Hackers and Slackers

Preparing your AWS Project to Build an API

Using AWS API Gateway to create serverless APIs

There comes a surreal moment in nearly every profession in which perspective is violently forced into our own self-awareness. People with cooler jobs probably have that moment when they save their first patient, or launch their first rocket. For me, the idea of building an API was tbis moment in software development. All those past blackboxes which spat out results your life depended on: we can make those now.

Feel free to remain unphased by this as I'm sure most are... for those of us who can't remember how they became an "engineer" in the first place, API design feels like reaching a final frontier. Granted, that will happen at least 20 more times in your software career, so don’t pause too long now.

If you managed to catch the tutorial on setting up RDS on AWS, you're already a step ahead. We're going to make our way through this slowly, which is probably a good idea even if you're done this before. There are so many pitfalls and nuances in AWS's architecture that I'm not even sure I fully understand what's happening, even when everything works.

Quick Overview

Here are the services we'll be using to hook this baby up:

  • RDS: Amazon's cloud-hosted relational databases. These databases come preconfigured with an endpoint, which can be made accessible to other AWS services or even to external manipulation.
  • Lambda: "Serverless" code snippets which can be invoked without setting up a webserver. Lambda functions are intended to serve simple specific functions (such as serving as the logic for an endpoint, for instance). Lambda functions play well with other AWS services: we'll be using this as the glue between our API and interacting with the Database.
  • API Gateway: Amazon's visual editor for creating an API. API Gateway will allow you to architect the structure and logic of your API without having to worry about setting up routes, or other extra work.
  • IAM: Amazon's headache of a user & permissions manager. IAM is needed to specify exactly with AWS services have access to other services, which users are permitted to interact with your API, etc.

Gameplan

So here's the deal. Our RDS database will be where all the data we provide and receive will live. Lambda functions will be the snippets of code actually interacting with information from the database; all of our queries will be done through Lambda. API Gateway will control the "design" of the API, as in the structure of endpoints, their respective methods, and how all these should interact with Lambda.

It sounds simple enough, but the devil is in the details. And trust me, there are a lot of details.

Setting the Correct Roles

Normally I'd say we should jump in to the fun stuff and deal with the details when we get to them. I won't let you steer down that road with AWS... let's avoid smashing our heads on keyboards where possible and kick things off slow.

If you were to attempt to create a Lambda function off the bat, the first question it will ask is to select a role. Roles are one of the types of permission packages (?) we mentioned earlier. Roles limit exactly whcih services your Lambda function can interact with off the bat. Start with the wrong role, and you won't be able to do much of anything

Head over the IAM console to set up an appropriate role:

Screenshot-2018-05-06-08.06.13

Let's pause for a moment to take this all in. You'll see we have users, groups, roles, policies and a whole bunch of other garbage. Policies can be attached to roles. Policies can also be attached to users, and also attached to groups. Users can be in groups. Wait, so what if a user has a bunch of policies, but then joins a group with a bunch of policies? What even is a policy anyway? These are the real questions. The short answer is none of it makes sense, it's really just extra job security for those who make it work.

Click on "Roles" in the sidebar. Create a role. Select "Lambda" for now and click next.

Screenshot-2018-05-06-08.18.21

Ok cool. The role we're creating is basically just going to be a collection of permissions we can attached directly to the role. Go ahead and attach these:

  • AmazonVPCFullAccess
  • AmazonAPIGatewayInvokeFullAccess
  • AmazonRDSFullAccess
  • AWSLambdaFullAccess
  • CloudWatchLogsFullAccess

Save the role, and remember what you name it. You'll need it.

Getting Started with Lambda

Go back to the Lambda console It's game time. We're going to create a function from scratch (sadly, I haven't found any of the blueprints to be very useful just yet).

Lambda

Under runtime, you'll need to pick which language we'll be messing with. I'm doing Python 3 because I don't mess with semicolons, ya dig. That said most people seem to stick with Node, which is probably faster at runtime. Up to you.

Aha, see the "Role" dropdown? This is what I warned you about. Select the role you just created earlier from existing roles.

The Editor

Lambda Visual Editor

Welcome to the Lambda visual editor. That tree you're seeing is a representation of the integration this function will handle. The current function is the box top-middle, the trigger is on the left, and the list of potential AWS services we can touch is on the right; these were automatically populated by that role I forced you to create. You're welcome.

NOTE: The entire interface below this section depends on which service you've clicked in the tree. It's not the most intuitive at first. I have my Lambda function selected, so that's the interface I can interact with below.

Lambda Interface Stuff

Function code

Real quick, we need to go over what each field here does. The dropdown currently set to "edit code inline" can be expanded, which gives you the option to upload a zip file of source code. THIS WILL DELETE ALL PREEXISTING WORK. They don't tell you that, hah. Ha hah. I recommend doing everything offline to be uploaded later - this needs to be done with python packages anyway.

Handler specifies which function should be called upon initialization. "lambda_function" is referring to the function, so "handler" here specifies that the function handler within lambda_function.py is what will get called upon execution.

VPC Settings

Scroll down until you hit this pretty little gem:

VPC

We need to specify the VPC this function will interact with. If you created an RDS already, go ahead select the VPC you created. Add a bunch of subnets (whichever ones). Finally, select a security group. Remember that the permissions of this group determine whether or not your VPC is allowed to speak to this function. If you're struggling with this, check out the AWS MySQL post again. I'm not going to link it twice in one post, sorry. I have self respect you know.

Chill for Now

There's a lot to take in when playing around in AWS. The gibberish terminology and horrible documentation doesn't help this at all, so if any of this is frustrating just know it's supposed to be. Amazon owns you, and they hate you. Kind of like God.

I'd suggest messing around the interface, and maybe even check out API Gateway a bit to get a feel for how that stuff looks. They set you up with a cute demo to make you think it's going to be easy, so maybe you'll enjoy that. Next time, we're going to crank out some Lambdas.

Author image
New York City Website
Product manager turned engineer with ongoing identity crisis. Breaks everything before learning best practices. Completely normal and emotionally stable.

Product manager turned engineer with ongoing identity crisis. Breaks everything before learning best practices. Completely normal and emotionally stable.