From bf93e477ffaa8abe5bb36e46ac8b54f2fcdd9279 Mon Sep 17 00:00:00 2001 From: Rajkumar Kanakattu Date: Sun, 2 Jul 2023 21:42:28 +0100 Subject: [PATCH 1/5] Update s3-notification-triggers.sh --- aws-event-triggering/s3-notification-triggers.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/aws-event-triggering/s3-notification-triggers.sh b/aws-event-triggering/s3-notification-triggers.sh index 1c293f6..33d4ea4 100755 --- a/aws-event-triggering/s3-notification-triggers.sh +++ b/aws-event-triggering/s3-notification-triggers.sh @@ -13,7 +13,7 @@ aws_region="us-east-1" bucket_name="abhishek-ultimate-bucket" lambda_func_name="s3-lambda-function" role_name="s3-lambda-sns" -email_address="zyz@gmail.com" +email_address="Kanakatturajkumar6@gmail.com" # Create IAM Role for the project role_response=$(aws iam create-role --role-name s3-lambda-sns --assume-role-policy-document '{ From 474f9afb65192ea627ca358f21c3e7293d329d31 Mon Sep 17 00:00:00 2001 From: Rajkumar Kanakattu Date: Sun, 2 Jul 2023 22:08:13 +0100 Subject: [PATCH 2/5] Update s3-notification-triggers.sh --- aws-event-triggering/s3-notification-triggers.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/aws-event-triggering/s3-notification-triggers.sh b/aws-event-triggering/s3-notification-triggers.sh index 33d4ea4..216c73e 100755 --- a/aws-event-triggering/s3-notification-triggers.sh +++ b/aws-event-triggering/s3-notification-triggers.sh @@ -10,9 +10,9 @@ echo "AWS Account ID: $aws_account_id" # Set AWS region and bucket name aws_region="us-east-1" -bucket_name="abhishek-ultimate-bucket" -lambda_func_name="s3-lambda-function" -role_name="s3-lambda-sns" +bucket_name="rajkumar-ultimate-bucket" +lambda_func_name="s3-function" +role_name="s3-sns" email_address="Kanakatturajkumar6@gmail.com" # Create IAM Role for the project From 42f2c995a9dc11cbf235bd97f401c0e4a51d7d18 Mon Sep 17 00:00:00 2001 From: Rajkumar Kanakattu Date: Sun, 2 Jul 2023 22:35:08 +0100 Subject: [PATCH 3/5] Update s3-notification-triggers.sh --- aws-event-triggering/s3-notification-triggers.sh | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/aws-event-triggering/s3-notification-triggers.sh b/aws-event-triggering/s3-notification-triggers.sh index 216c73e..258b1ec 100755 --- a/aws-event-triggering/s3-notification-triggers.sh +++ b/aws-event-triggering/s3-notification-triggers.sh @@ -16,7 +16,7 @@ role_name="s3-sns" email_address="Kanakatturajkumar6@gmail.com" # Create IAM Role for the project -role_response=$(aws iam create-role --role-name s3-lambda-sns --assume-role-policy-document '{ +role_response=$(aws iam create-role --role-name s3-sns --assume-role-policy-document '{ "Version": "2012-10-17", "Statement": [{ "Action": "sts:AssumeRole", @@ -51,7 +51,7 @@ echo "Bucket creation output: $bucket_output" aws s3 cp ./example_file.txt s3://"$bucket_name"/example_file.txt # Create a Zip file to upload Lambda Function -zip -r s3-lambda-function.zip ./s3-lambda-function +zip -r s3-function.zip ./s3-function sleep 5 # Create a Lambda function @@ -59,22 +59,22 @@ aws lambda create-function \ --region "$aws_region" \ --function-name $lambda_func_name \ --runtime "python3.8" \ - --handler "s3-lambda-function/s3-lambda-function.lambda_handler" \ + --handler "s3-function/s3-function.lambda_handler" \ --memory-size 128 \ --timeout 30 \ --role "arn:aws:iam::$aws_account_id:role/$role_name" \ - --zip-file "fileb://./s3-lambda-function.zip" + --zip-file "fileb://./s3-function.zip" # Add Permissions to S3 Bucket to invoke Lambda aws lambda add-permission \ --function-name "$lambda_func_name" \ - --statement-id "s3-lambda-sns" \ + --statement-id "s3-sns" \ --action "lambda:InvokeFunction" \ --principal s3.amazonaws.com \ --source-arn "arn:aws:s3:::$bucket_name" # Create an S3 event trigger for the Lambda function -LambdaFunctionArn="arn:aws:lambda:us-east-1:$aws_account_id:function:s3-lambda-function" +LambdaFunctionArn="arn:aws:lambda:us-east-1:$aws_account_id:function:s3-function" aws s3api put-bucket-notification-configuration \ --region "$aws_region" \ --bucket "$bucket_name" \ From b72213d67f126b2c4809056ce305cd6b6f50a373 Mon Sep 17 00:00:00 2001 From: Rajkumar Kanakattu Date: Sun, 2 Jul 2023 22:57:02 +0100 Subject: [PATCH 4/5] Update s3-notification-triggers.sh --- aws-event-triggering/s3-notification-triggers.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/aws-event-triggering/s3-notification-triggers.sh b/aws-event-triggering/s3-notification-triggers.sh index 258b1ec..ac653e8 100755 --- a/aws-event-triggering/s3-notification-triggers.sh +++ b/aws-event-triggering/s3-notification-triggers.sh @@ -11,8 +11,8 @@ echo "AWS Account ID: $aws_account_id" # Set AWS region and bucket name aws_region="us-east-1" bucket_name="rajkumar-ultimate-bucket" -lambda_func_name="s3-function" -role_name="s3-sns" +lambda_func_name="s3-lambda-function" +role_name="s3-lambda-sns" email_address="Kanakatturajkumar6@gmail.com" # Create IAM Role for the project @@ -68,7 +68,7 @@ aws lambda create-function \ # Add Permissions to S3 Bucket to invoke Lambda aws lambda add-permission \ --function-name "$lambda_func_name" \ - --statement-id "s3-sns" \ + --statement-id "s3-lambda-sns" \ --action "lambda:InvokeFunction" \ --principal s3.amazonaws.com \ --source-arn "arn:aws:s3:::$bucket_name" From c3a0cbf9d7f8b9adb5cb284c1efa5d9e053ba890 Mon Sep 17 00:00:00 2001 From: Rajkumar Kanakattu Date: Sun, 2 Jul 2023 23:07:16 +0100 Subject: [PATCH 5/5] Update s3-lambda-function.py --- aws-event-triggering/s3-lambda-function/s3-lambda-function.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/aws-event-triggering/s3-lambda-function/s3-lambda-function.py b/aws-event-triggering/s3-lambda-function/s3-lambda-function.py index 797329b..29b0650 100644 --- a/aws-event-triggering/s3-lambda-function/s3-lambda-function.py +++ b/aws-event-triggering/s3-lambda-function/s3-lambda-function.py @@ -11,7 +11,7 @@ def lambda_handler(event, context): # Example: Send a notification via SNS sns_client = boto3.client('sns') - topic_arn = 'arn:aws:sns:us-east-1::s3-lambda-sns' + topic_arn = 'arn:aws:sns:us-east-1:<987808550845>:s3-lambda-sns' sns_client.publish( TopicArn=topic_arn, Subject='S3 Object Created',