Creating an audit table for a DynamoDB table using CloudTrail, Kinesis Data Stream, Lambda, S3, Glue and Athena and CloudFormation
-
Updated
Jul 6, 2023 - Python
Creating an audit table for a DynamoDB table using CloudTrail, Kinesis Data Stream, Lambda, S3, Glue and Athena and CloudFormation
AWS Serverless Real Time Data Load to DynamoDB using Python Lambda and S3 Event Source Mapping and creating the stack using AWS CloudFormation.
Step Function with Callback Pattern Example (Amazon SQS, Amazon SNS, Lambda) using CloudFormation
serverless REST API with AWS Lambda , DynamoDB and API Gateway
A Demo Step Function using Lambda. The entire stack is created using AWS CloudFormation
Transfer Data Records (Lambda, DynamoDB, Amazon SQS) - Step Function using Serverless Framework
Transfer Data Records (Lambda, DynamoDB, Amazon SQS) - Step Function using AWS CloudFormation
Loading data into DynamoDB Global Table with KMS encryption enabled using Kinesis-Lambda
method that checks if Resource field of AWS::IAM::Role Policy is"*"
Add a description, image, and links to the aws-iam-roles topic page so that developers can more easily learn about it.
To associate your repository with the aws-iam-roles topic, visit your repo's landing page and select "manage topics."