Creating an IAM policy to access AWS Lambda resources
You can create an IAM policy that provides the minimum required permissions for Aurora to invoke an AWS Lambda function on your behalf.
The following policy adds the permissions required by Aurora to invoke an AWS Lambda function on your behalf.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowAuroraToExampleFunction", "Effect": "Allow", "Action": "lambda:InvokeFunction", "Resource": "arn:aws:lambda:
<region>
:<123456789012>
:function:<example_function>
" } ] }
You can use the following steps to create an IAM policy that provides the minimum
required permissions for Aurora to invoke an AWS Lambda function on your behalf. To
allow Aurora to invoke all of your AWS Lambda functions, you can skip these steps and
use the predefined AWSLambdaRole
policy instead of creating your
own.
To create an IAM policy to grant invoke to your AWS Lambda functions
-
Open the IAM console
. -
In the navigation pane, choose Policies.
-
Choose Create policy.
-
On the Visual editor tab, choose Choose a service, and then choose Lambda.
-
For Actions, choose Expand all, and then choose the AWS Lambda permissions needed for the IAM policy.
Ensure that
InvokeFunction
is selected. It is the minimum required permission to enable Amazon Aurora to invoke an AWS Lambda function. -
Choose Resources and choose Add ARN for function.
-
In the Add ARN(s) dialog box, provide the details about your resource.
Specify the Lambda function to allow access to. For instance, if you want to allow Aurora to access a Lambda function named
example_function
, then set the ARN value toarn:aws:lambda:::function:example_function
.For more information on how to define an access policy for AWS Lambda, see Authentication and access control for AWS Lambda.
-
Optionally, choose Add additional permissions to add another AWS Lambda function to the policy, and repeat the previous steps for the function.
Note
You can repeat this to add corresponding function permission statements to your policy for each AWS Lambda function that you want Aurora to access.
-
Choose Review policy.
-
Set Name to a name for your IAM policy, for example
AllowAuroraToExampleFunction
. You use this name when you create an IAM role to associate with your Aurora DB cluster. You can also add an optional Description value. -
Choose Create policy.
Complete the steps in Creating an IAM role to allow Amazon Aurora to access AWS services.