I work with API Gateway and Lambda heavily. Whenever you create a new API, or make changes, there are several things you need to do:
- enable Detailed Metrics for the deployment stage
- set up a dashboard in CloudWatch, showing request count, latencies and error counts
- set up CloudWatch Alarms for p99 latencies and error counts
Because these are manual steps, they often get missed.
Have you ever forgotten to update the dashboard after adding a new endpoint to your API? And did you also remember to set up a p99 latency alarm on this new endpoint? How about alarms on the no. of 4XX or 5xx errors?
Most teams I have dealt with have some conventions around these, but without a way to enforce them. The result is that the convention is applied in patches and cannot be relied upon. I find this approach doesn’t scale with the size of the team.
It works when you’re a small team. Everyone has a shared understanding, and the necessary discipline to follow the convention. When the team gets bigger, you need automation to help enforce these conventions.
Fortunately, we can automate away these manual steps using the same pattern. In the Monitoring unit of my course Production-Ready Serverless, I demonstrated how you can do this in 3 simple steps:
- CloudTrail captures the CreateDeployment request to API Gateway.
- CloudWatch Events pattern against this captured request.
- Lambda function to a) enable detailed metrics, and b) create alarms for each endpoint
If you use the Serverless framework, then you might have a function that looks like this:
auto-create-api-alarms:
handler: functions/create-alarms.handler
events:
- cloudwatchEvent:
event:
source:
- aws.apigateway
detail-type:
- AWS API Call via CloudTrail
detail:
eventSource:
- apigateway.amazonaws.com
eventName:
- CreateDeployment
environment:
alarm_actions: arn:aws:sns:#{AWS::Region}:#{AWS::AccountId}:NotifyMe
ok_actions: arn:aws:sns:#{AWS::Region}:#{AWS::AccountId}:NotifyMe
iamRoleStatements:
- Effect: Allow
Action: apigateway:GET
Resource:
- arn:aws:apigateway:#{AWS::Region}::/restapis/*
- arn:aws:apigateway:#{AWS::Region}::/restapis/*/stages/${self:custom.stage}
- Effect: Allow
Action: apigateway:PATCH
Resource: arn:aws:apigateway:#{AWS::Region}::/restapis/*/stages/${self:custom.stage}
- Effect: Allow
Action: cloudwatch:PutMetricAlarm
Resource: "*"
Couple of things to note from the code above:
- I’m using the serverless-iam-roles-per-function plugin to give the function a tailored IAM role
- The function needs the
apigateway:PATCH
permission to enable detailed metrics
- The function needs the
apigateway:GET
permission to get the API name and REST endpoints
- The function needs the
cloudwatch:PutMetricAlarm
permission to create the alarms
- The environment variables specify SNS topics for the CloudWatch Alarms
The captured event looks like this:
{
"version": "0",
"id": "dee9a69c-8166-1ad7-41d4-1dad201e29f6",
"detail-type": "AWS API Call via CloudTrail",
"source": "aws.apigateway",
"account": "374852340821",
"time": "2018-04-09T00:17:47Z",
"region": "us-east-1",
"resources": [],
"detail": {
"eventVersion": "1.05",
"userIdentity": {
"type": "IAMUser",
"principalId": "AIDAIRMUZZEGPO27IPFYW",
"arn": "arn:aws:iam::374852340821:user/yan.cui",
"accountId": "374852340821",
"accessKeyId": "ASIAJNZDKN26DXPZFYQE",
"userName": "yan.cui",
"sessionContext": {
"attributes": {
"mfaAuthenticated": "false",
"creationDate": "2018-04-09T00:17:30Z"
}
},
"invokedBy": "cloudformation.amazonaws.com"
},
"eventTime": "2018-04-09T00:17:47Z",
"eventSource": "apigateway.amazonaws.com",
"eventName": "CreateDeployment",
"awsRegion": "us-east-1",
"sourceIPAddress": "cloudformation.amazonaws.com",
"userAgent": "cloudformation.amazonaws.com",
"requestParameters": {
"restApiId": "8kbasri6v7",
"createDeploymentInput": {
"stageName": "dev"
},
"template": false
},
"responseElements": {
"id": "cj2y0f",
"createdDate": "Apr 9, 2018 12:17:47 AM",
"deploymentUpdate": {
"restApiId": "8kbasri6v7",
"deploymentId": "cj2y0f",
"template": false
},
"deploymentStages": {
"deploymentId": "cj2y0f",
"restApiId": "8kbasri6v7",
"template": false,
"templateSkipList": [
"position"
]
},
"deploymentDelete": {
"deploymentId": "cj2y0f",
"restApiId": "8kbasri6v7",
"template": false
},
"self": {
"deploymentId": "cj2y0f",
"restApiId": "8kbasri6v7",
"template": false
}
},
"requestID": "6e25bd56-3b8b-11e8-a351-e5e3d3161fe7",
"eventID": "a150d941-7a54-4572-97b2-0614a81fd25b",
"readOnly": false,
"eventType": "AwsApiCall"
}
}
We can find the restApiId
and stageName
inside the detail.requestParameters
attribute. That’s all we need to figure out what endpoints are there, and so what alarms we need to create.
Inside the handler function, which you can find here, we perform a few steps:
- enable detailed metrics with an
updateStage
call to API Gateway
- get the list of REST endpoints with a
getResources
call to API Gateway
- get the REST API name with a
getRestApi
call to API Gateway
- for each of the REST endpoints, create a p99 latency alarm in the
AWS/ApiGateway
namespace