Reputation: 195
I created one VPC 10.5.0.0/16
with 2 subnets (10.5.1.0/24
, 10.5.4.0/24
).
I created a security security group:
Inbound rules:
Type Protocol Port range Source Description - optional
All traffic All All 0.0.0.0/0 allowing traffic from same security group
All traffic All All ::/0 allowing traffic from same security group
Outbound rules:
Type Protocol Port range Source Description - optional
All traffic All All 0.0.0.0/0 allowing traffic from same security group
All traffic All All ::/0 allowing traffic from same security group
Now I created 2 Lambda functions with proper IAM Role (which contains invoke policy). These 2 Lambda functions are in same VPC, subnets and security groups.
Case 1:
Case 2:
I think I am missing something but i can't figure out it. Any suggestions?
Upvotes: 10
Views: 7031
Reputation: 1
I have had same issue. We have 2 lambdas running in same VPC , with same Subnets and same Route table. Still Lambda1 was unable to call Lambda2. While going through this post i realized that invoke permission is the issue. So I created invoke function permission in Lambda2 (Service being called) as below. Lambda - Permissions - Resource-based Policy statements -> Add permissions - for AWS Service -> in that for "service" i selected API Gateway and in the "Source ARN" entered ARN of the Lambda2 (Service being called).
And it worked.
Upvotes: 0
Reputation: 146
It turns out after introduction of AWS PrivateLink for AWS Lambda, its possible to invoke one lambda from another, with both of them on a VPC, that does not need internet access.
Some nice tutorials can be found here (must read):
Here's what is did that worked (there might be redundant steps, but it worked):
sg-abc
) and assigned it to both the lambdassg-abc
on All Traffic, also modified sg-abc
to allow All Trafic from default SGcom.amazonaws.ap-south-1.lambda
(use your preferred location) and assigned the default SG and sg-abc
both.lambda:Invoke
(i'm using serverless.yml
)Upvotes: 4
Reputation: 269101
Regarding the Security Groups...
Calls made to invoke an AWS Lambda function are made to the AWS Lambda service, which lives on the Internet.
If Lambda-1 invokes Lambda-2, there is no need for them to be in the same VPC and there is no need for them to be accessible to each other via a Security Group.
In fact, the normal security group configuration for security groups on AWS Lambda functions are:
Let's say that you have an AWS Lambda function calling an Amazon RDS database. The configuration would be:
Lambda-SG
) with no inbound rules, default outbound rules (All Traffic)RDS-SG
) that permits all inbound connections from Lambda-SG
and default outbound rules (All Traffic)This means that the Lambda function can communicate with the RDS database (since RDS-SG
specifically references Lambda-SG
) but nothing else would be permitted to access the RDS database.
Upvotes: 1
Reputation: 238051
i think iam missing something but i can't figure out it
Unfortunately, the only way to invoke lambda is through a public lambda service endpoint. Since lambda function in a VPC does not have internet access nor public IP, you can't invoke one lambda function from other one in VPC, without access to the internet. From docs:
Connecting a function to a public subnet does not give it internet access or a public IP address.
The fact that they are in the same VPC or even same subnet is irrelevant sadly.
To rectify the issue the invoking function must have access to the internet, since lambda service does not have VPC interface endpoint. This can be achieved by placing it in a private subnet and using NAT gateway/instance with correctly configured route tables to provide the access.
Upvotes: 13
Reputation: 12259
Lambdas inside VPC without a NAT gateway don't have internet access. Invoking lambda function requires the caller being able to connect to AWS APIs. This typically means that the caller needs to have internet access. While the exceptions are the services that support VPC endpoints, in this case, caller inside the VPC can connect to service APIs privately. Unfortunately, lambda isn't one of the services that support VPC endpoints.
Upvotes: 2