Skip to content

Commit b768cf5

Browse files
committed
First commit
1 parent face517 commit b768cf5

12 files changed

+348
-9
lines changed

Arch.png

30.5 KB
Loading

README.md

+171-9
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,179 @@
1-
## My Project
1+
# Decoding protobuf messages using AWS Lambda
22

3-
TODO: Fill this README out!
3+
## Overview
44

5-
Be sure to:
5+
![Overall Architecture of the solution](./Arch.png)
66

7-
* Change the title in this README
8-
* Edit your repository description on GitHub
7+
This project contains source code and supporting files for a serverless application that you can deploy with the SAM CLI. It includes the following files and folders.
98

10-
## Security
9+
- functions - Code for the application's Lambda function, which is a Kinesis Stream decoding function, to decode the protobuf records before writing them to S3
10+
- template.yaml - A template that defines the application's AWS resources.
1111

12-
See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.
12+
This application capture events encoded in protobuf coming from a Kinesis stream, it decodes and stores them in an S3 Bucket.
1313

14-
## License
1514

16-
This library is licensed under the MIT-0 License. See the LICENSE file.
15+
The application uses several AWS resources, including an S3 Bucket, Lambda functions, and a Kinesis stream. These resources are defined in the `template.yaml` file in this project. You can update the template to add AWS resources through the same deployment process that updates your application code.
1716

17+
## Pre-requisites for deploying this application
18+
* [Protobuf Lambda Layer](#Protobuf-Lambda-Layer)
19+
* [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)
20+
* [Python 3.9](https://www.python.org/downloads/)
21+
* [SAM CLI](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/serverless-sam-cli-install.html)
22+
23+
24+
25+
### Protobuf Lambda Layer
26+
The first pre-requisite is to build the AWS Lambda Layer containing the protobuf libraries that are required for the decoding.
27+
You can use any development environment where you can install Python 3.x and pip to create the Lambda layers.
28+
29+
First generate the python source code required for the protobuf encoding and decoding, starting from the proto definition file.
30+
This code can be generated using the protobuf compiler having with the proto definition file as input
31+
32+
Create the proto definition file:
33+
```bash
34+
cat > /home/ec2-user/environment/demo.proto << ENDOFFILE
35+
syntax = "proto3";
36+
message demo {
37+
optional int32 id = 1;
38+
optional string name = 2;
39+
optional int32 timevalue = 3;
40+
optional string event = 4;
41+
}
42+
ENDOFFILE
43+
```
44+
&nbsp;
45+
&nbsp;
46+
47+
Now compile this file with the protobuf compiler (protoc), to generate the python source code required for the protobuf encoding/decoding.
48+
Note that the generated code will work only for the classes defined in the proto definition file:
49+
```bash
50+
wget
51+
https://github.com/protocolbuffers/protobuf/releases/download/v3.19.1/protoc-3.19.1-linux-x86_64.zip
52+
53+
unzip protoc-3.19.1-linux-x86_64.zip
54+
55+
mkdir /home/ec2-user/environment/output
56+
57+
/home/ec2-user/environment/bin/protoc -I=/home/ec2-user/environment/ --python_out=/home/ec2-user/environment/output demo.proto
58+
```
59+
&nbsp;
60+
&nbsp;
61+
62+
Create a new directory named protobuf and install locally the protobuf libraries:
63+
```bash
64+
mkdir -p ~/environment/output/protobuf
65+
cd ~/environment/output/protobuf
66+
mkdir python
67+
cd python
68+
pip3 install protobuf --target .
69+
```
70+
&nbsp;
71+
&nbsp;
72+
73+
Now you have to include the python source code to the libraries installed locally:
74+
```bash
75+
mkdir custom
76+
cd custom
77+
cp ~/environment/output/demo_pb2.py .
78+
echo 'custom' >> ~/environment/output/protobuf/python/protobuf-3.19.1.dist-info/namespace_packages.txt
79+
echo 'custom/demo_pb2.py' >> ~/environment/output/protobuf/python/protobuf-3.19.1.dist-info/RECORD
80+
echo 'custom' >> ~/environment/output/protobuf/python/protobuf-3.19.1.dist-info/top_level.txt
81+
```
82+
&nbsp;
83+
&nbsp;
84+
85+
Now you have to zip the python folder:
86+
```bash
87+
cd ~/environment/output/protobuf
88+
zip -r protobuf.zip .
89+
```
90+
91+
Finally, your Lambda layer is ready, if you built it in a remote instance you have to copy it in your local machine.
92+
&nbsp;
93+
&nbsp;
94+
95+
Now you are going to add the layer created in the previous steps to Lambda.
96+
From the AWS Console select the Lambda service and select Create a Layer:
97+
98+
![Creation of Lambda Layer](./lambdalayer.png)
99+
&nbsp;
100+
&nbsp;
101+
102+
Name it protobuf-lambda and upload the protobuf.zip that you created in the previous step.
103+
104+
Once the upload is complete select x86_64 compatible architectures and select the corresponding python runtime versions.
105+
106+
107+
## Deploy this application
108+
109+
The Serverless Application Model Command Line Interface (SAM CLI) is an extension of the AWS CLI that adds functionality for building and testing Lambda applications.
110+
111+
112+
Build the application running the below command in your shell:
113+
114+
```bash
115+
sam build
116+
```
117+
118+
The second command will package and deploy your application to AWS, with a series of prompts:
119+
120+
To deploy this application, run the following in your shell:
121+
122+
```bash
123+
sam deploy --guided --capabilities CAPABILITY_NAMED_IAM
124+
```
125+
126+
---
127+
**NOTE**
128+
SAM deploy for this project needs `CAPABILITY_NAMED_IAM` as the template creates roles and policies.
129+
---
130+
131+
* **Stack Name**: The name of the stack to deploy to CloudFormation. This should be unique to your account and region, and a good starting point would be something matching your project name. `protodecoder` is recommended.
132+
* **AWS Region**: The AWS region you want to deploy your app to.
133+
* **KinesisProtobufStreamName**: The name of the Kinesis Stream containing the protobuf messages.
134+
* **TargetS3BucketName**: The name of the S3 bucket to store the messages once decoded.
135+
* **ProtobufLayerName**: Name and version in the format: 'name:version' of the Lambda Layer containing the protobuf library. (Check pre-requisites section).
136+
* **Allow SAM CLI IAM role creation**: Many AWS SAM templates, including this example, create AWS IAM roles required for the AWS Lambda function(s) included to access AWS services. By default, these are scoped down to minimum required permissions. To deploy an AWS CloudFormation stack which creates or modifies IAM roles, the `CAPABILITY_IAM` value for `capabilities` must be provided. If permission isn't provided through this prompt, to deploy this example you must explicitly pass `--capabilities CAPABILITY_NAMED_IAM` to the `sam deploy` command. Answer 'Y' to this.
137+
* **Save arguments to samconfig.toml**: If set to yes, your choices will be saved to a configuration file inside the project, so that in the future you can just re-run `sam deploy` without parameters to deploy changes to your application.
138+
139+
## Testing the Serverless Application
140+
141+
Check that on the S3 bucket all the messages are stored correctly in JSON format.
142+
From the AWS console, select the S3 service and click on the destination bucket that you defined in the Lambda function.
143+
144+
![JSON messages stored in S3](./jsonmessagess3.png)
145+
&nbsp;
146+
&nbsp;
147+
148+
You can see that there are multiple files, select one of them, click on Actions -> Query with S3 Select
149+
150+
![Query with S3 Select](./querys3select.png)
151+
&nbsp;
152+
&nbsp;
153+
154+
Now, in the “Input settings” panel, for the “Format” option select the value JSON and in the “Output settings” panel, for the “Format” option select the value JSON.
155+
156+
![Configuration for Query with S3 Select](./configurations3select.png)
157+
&nbsp;
158+
&nbsp;
159+
160+
Finally, scroll down till the “SQL Query” panel, click on “Run SQL Query” and you should be able to see that the content of the file store in the S3 bucket is a JSON message.
161+
162+
![Result of Query with S3 Select](./outputs3select.png)
163+
164+
165+
## Cleanup
166+
167+
If you have generated any events, you will need to empty the S3 buckets before deleting the entire stack. If you do not, your data stored in them will not be deleted.
168+
169+
To delete the stack, use the SAM CLI. Assuming you used protodecoder for the stack name, you can run the following:
170+
171+
```bash
172+
sam delete --stack-name protodecoder
173+
```
174+
175+
## Resources
176+
177+
See the [AWS SAM developer guide](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/what-is-sam.html) for an introduction to SAM specification, the SAM CLI, and serverless application concepts.
178+
179+
Next, you can use AWS Serverless Application Repository to deploy ready to use Apps that go beyond hello world samples and learn how authors developed their applications: [AWS Serverless Application Repository main page](https://aws.amazon.com/serverless/serverlessrepo/)

configurations3select.png

56.2 KB
Loading

functions/.DS_Store

6 KB
Binary file not shown.

functions/protodecode/.DS_Store

6 KB
Binary file not shown.

functions/protodecode/app.py

+73
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
"""
2+
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3+
SPDX-License-Identifier: MIT-0
4+
5+
Permission is hereby granted, free of charge, to any person obtaining a copy of this
6+
software and associated documentation files (the "Software"), to deal in the Software
7+
without restriction, including without limitation the rights to use, copy, modify,
8+
merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
9+
permit persons to whom the Software is furnished to do so.
10+
11+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
12+
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
13+
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
14+
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
15+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
16+
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
17+
"""
18+
19+
20+
"""
21+
Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
22+
SPDX-License-Identifier: MIT-0
23+
24+
Permission is hereby granted, free of charge, to any person obtaining a copy of this
25+
software and associated documentation files (the "Software"), to deal in the Software
26+
without restriction, including without limitation the rights to use, copy, modify,
27+
merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
28+
permit persons to whom the Software is furnished to do so.
29+
30+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
31+
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
32+
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
33+
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
34+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
35+
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
36+
"""
37+
38+
39+
from custom import demo_pb2
40+
import json
41+
import base64
42+
import boto3
43+
import time
44+
import os
45+
46+
s3_client = boto3.client('s3')
47+
bucket_name = os.environ['BUCKET_NAME']
48+
49+
def lambda_handler(event, context):
50+
output = ""
51+
52+
for record in event['Records']:
53+
try:
54+
payload = base64.b64decode(record['kinesis']['data'])
55+
print("Original protobuf message: " + str(payload))
56+
57+
proto_message = demo_pb2.demo()
58+
proto_message.ParseFromString(payload)
59+
elems = proto_message.ListFields()
60+
61+
fields = {}
62+
for elem in elems:
63+
fields[elem[0].name] = elem[1]
64+
65+
json_elem = json.dumps(fields)
66+
67+
print("Decoded message in JSON: " + json_elem)
68+
output = output + json_elem
69+
70+
except Exception as e:
71+
print(f"Error occurred transforming records {e}")
72+
73+
s3_client.put_object(Body=output.encode(), Bucket=bucket_name, Key=str(time.time())+".txt")

functions/protodecode/requirements.txt

Whitespace-only changes.

jsonmessagess3.png

248 KB
Loading

lambdalayer.png

99.9 KB
Loading

outputs3select.png

62.4 KB
Loading

querys3select.png

162 KB
Loading

template.yaml

+104
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
AWSTemplateFormatVersion: 2010-09-09
2+
Transform: AWS::Serverless-2016-10-31
3+
Description: SAM template for the Lambda Protobuf Decoding
4+
5+
Parameters:
6+
7+
KinesisProtobufStreamName:
8+
Description: "Name of the kinesis stream containing the protobuf messages"
9+
Type: String
10+
MinLength: 1
11+
12+
TargetS3BucketName:
13+
Description: "Name of the S3 bucket where to store the decoded messages"
14+
Type: String
15+
MinLength: 1
16+
17+
ProtobufLayerName:
18+
Description: "Name and version in the format: 'name:version' of the Lambda Layer containing the protobuf library"
19+
Default: "protobuf-lambda:1"
20+
Type: String
21+
MinLength: 1
22+
23+
24+
Resources:
25+
26+
ProtoLambdaIAMRole:
27+
Type: "AWS::IAM::Role"
28+
Properties:
29+
RoleName: proto-demo-lambda-role
30+
AssumeRolePolicyDocument:
31+
Version: "2012-10-17"
32+
Statement:
33+
- Action:
34+
- "sts:AssumeRole"
35+
Effect: "Allow"
36+
Principal:
37+
Service:
38+
- "lambda.amazonaws.com"
39+
ManagedPolicyArns:
40+
- arn:aws:iam::aws:policy/service-role/AWSLambdaKinesisExecutionRole
41+
Policies:
42+
- PolicyName: "cw-demo-protobuf-lambda"
43+
PolicyDocument:
44+
Version: "2012-10-17"
45+
Statement:
46+
- Action:
47+
- "logs:CreateLogGroup"
48+
- "logs:CreateLogStream"
49+
- "logs:PutLogEvents"
50+
Effect: "Allow"
51+
Resource:
52+
- !Sub "arn:aws:logs:${AWS::Region}:${AWS::AccountId}:log-group:/aws/lambda/protobuf-decoder-lambda:*"
53+
- PolicyName: "s3-demo-protobuf-lambda"
54+
PolicyDocument:
55+
Version: "2012-10-17"
56+
Statement:
57+
- Action:
58+
- "s3:*"
59+
Effect: "Allow"
60+
Resource:
61+
- !Sub "arn:aws:s3:::${TargetS3BucketName}"
62+
- !Sub "arn:aws:s3:::${TargetS3BucketName}/*"
63+
- PolicyName:
64+
Fn::Sub: ${AWS::StackName}-KMS
65+
PolicyDocument:
66+
Statement:
67+
- Effect: Allow
68+
Action:
69+
- kms:Encrypt
70+
- kms:Decrypt
71+
- kms:ReEncrypt*
72+
- kms:DescribeKey
73+
Resource: '*'
74+
75+
76+
LambdaFunction:
77+
Type: AWS::Serverless::Function
78+
Properties:
79+
CodeUri: functions/protodecode
80+
Handler: app.lambda_handler
81+
Role: !GetAtt ProtoLambdaIAMRole.Arn
82+
Timeout: 60
83+
Runtime: python3.9
84+
FunctionName: "protobuf-decoder-lambda"
85+
MemorySize: 512
86+
Environment:
87+
Variables:
88+
BUCKET_NAME: !Ref 'TargetS3BucketName'
89+
Layers:
90+
- !Sub "arn:aws:lambda:${AWS::Region}:${AWS::AccountId}:layer:${ProtobufLayerName}"
91+
Events:
92+
KinesisEvent:
93+
Type: Kinesis
94+
Properties:
95+
Stream: !Sub "arn:aws:kinesis:${AWS::Region}:${AWS::AccountId}:stream/${KinesisProtobufStreamName}"
96+
StartingPosition: LATEST
97+
BatchSize: 100
98+
Enabled: true
99+
100+
101+
Outputs:
102+
LambdaFunction:
103+
Value: !Ref 'LambdaFunction'
104+
Description: Lambda Function for Protobuf Decoding

0 commit comments

Comments
 (0)