An S3 bucket is configured to trigger a Lambda function on object creation. What is the expected behavior when a new file is uploaded?
Think about how event-driven services work in AWS.
When an S3 event trigger is set, Lambda automatically runs with details of the event, such as the file uploaded.
You want your Lambda function to read files from an S3 bucket when triggered. Which IAM permission must be included in the Lambda execution role?
Consider what action Lambda needs to do to read a file.
To read files from S3, Lambda needs the "s3:GetObject" permission on the bucket or objects.
You want to ensure your Lambda function processes every S3 upload event even if it fails initially. Which architecture best supports this?
Think about how to handle failures automatically.
Using a DLQ allows failed Lambda invocations to be captured and retried or inspected later, improving fault tolerance.
You want your Lambda function to access only a specific S3 bucket and no others. Which IAM policy condition achieves this?
Restrict permissions by resource ARN rather than broad access.
Limiting the IAM policy "Resource" to the specific bucket ARN restricts Lambda access to only that bucket.
Your Lambda function triggered by S3 events has high cold start latency. Which approach best reduces this delay?
Think about how to keep Lambda ready to run instantly.
Provisioned concurrency keeps Lambda instances initialized and ready, reducing cold start latency significantly.