Skip to main content
Help us improve PyPI by participating in user testing. All experience levels needed!

A small monitoring tool which runs in AWS Lambda

Project description

AWS Lambda Monitor

AWS Lambda Monitor is a small monitoring tool which runs in AWS Lambda. The tool is triggered either regularly by a CloudWatch scheduled task or on demand by an email triggered event. With this tool you can monitor services on servers out on the internet for free and receive alert emails when there are problems.

Why create another monitoring tool?

The rationale behind creating this tool (instead of using one of the many existing monitoring tools in existence) is to take advantage of the AWS Lambda pricing model to get free monitoring forever. AWS provides 37 days of 128MB memory Lambda execution per month. Unlike the EC2 free tier, the Lambda free tier doesn’t expire after the first year.

The reason the tool uses email for input (triggering a monitoring run) and output (alerting on problems) is that the AWS SES pricing model allows for 1000 emails per month. The alternative interface for AWS Lambda would be the AWS API Gateway which costs $3.50/month.

How to build and upload awslambdamonitor to AWS

Build and package virtualenv

To build the zip file containing the virtualenv, spin up an Amazon Linux EC2 instance (as this is the environment that AWS Lambda functions run in). Create the zip file as follows

sudo yum groupinstall 'Development Tools'
sudo yum install libyaml-devel libffi-devel openssl-devel
virtualenv build-aws-lambda-monitor-environment
build-aws-lambda-monitor-environment/bin/pip install pyOpenSSL paramiko ecdsa pycrypto python-whois PyYAML ndg-httpsclient pyasn1 requests
pushd build-aws-lambda-monitor-environment/lib/python2.7/dist-packages/
zip -r ~/ *

pushd build-aws-lambda-monitor-environment/lib64/python2.7/dist-packages/
zip -r ~/ *

rm -rf build-aws-lambda-monitor-environment

scp fetch the file from the amazon linux machine

Download the resulting zipped virtualenv from the EC2 instance and destroy the instance.

Add the monitor to the zipped virtualenv

zip --junk-paths awslambdamonitor/

Add your config to the zipped virtualenv

zip --junk-paths awslambdamonitor/monitor.yaml

Publish package to AWS Lambda and setup CloudWatch scheduled job

aws lambda create-function --function-name monitor --runtime python2.7 --timeout 30 --role arn:aws:iam::$AWS_ACCOUNT_ID:role/lambda_basic_execution --handler monitor.monitor --zip-file fileb://  --profile $AWS_PROFILE --region $AWS_REGION
aws lambda invoke --function-name monitor --log-type Tail --payload '{"account": "123456789012","region": "us-east-1","detail": {},"detail-type": "Scheduled Event","source": "","time": "1970-01-01T00:00:00Z","id": "cdc73f9d-aea9-11e3-9d5a-835b769c0d9c","resources": ["arn:aws:events:us-east-1:123456789012:rule/AWSLambdaMonitor5Minutes"]}'  --profile $AWS_PROFILE --region $AWS_REGION output.txt

aws lambda update-function-code --function-name monitor --zip-file fileb:// --profile $AWS_PROFILE --region $AWS_REGION

aws events put-rule --name AWSLambdaMonitor5Minutes --schedule-expression 'rate(5 minutes)' --state ENABLED --profile $AWS_PROFILE --region $AWS_REGION
aws events put-rule --name AWSLambdaMonitorDaily --schedule-expression 'rate(1 day)' --state ENABLED --profile $AWS_PROFILE --region $AWS_REGION

aws lambda add-permission --function-name monitor --statement-id AWSLambdaMonitor5MinutesID --action 'lambda:monitor' --principal --source-arn arn:aws:events:$AWS_REGION:$AWS_ACCOUNT_ID:rule/AWSLambdaMonitor5Minutes --profile $AWS_PROFILE --region $AWS_REGION
aws lambda add-permission --function-name monitor --statement-id AWSLambdaMonitorDailyID --action 'lambda:monitor' --principal --source-arn arn:aws:events:$AWS_REGION:$AWS_ACCOUNT_ID:rule/AWSLambdaMonitorDaily --profile $AWS_PROFILE --region $AWS_REGION

aws events put-targets --rule AWSLambdaMonitor5Minutes --targets '{"Id" : "AWSLambdaMonitor5Minutes-monitor", "Arn": "arn:aws:lambda:$AWS_REGION:$AWS_ACCOUNT_ID:function:monitor"}' --profile $AWS_PROFILE --region $AWS_REGION
aws events put-targets --rule AWSLambdaMonitorDaily --targets '{"Id" : "AWSLambdaMonitorDaily-monitor", "Arn": "arn:aws:lambda:$AWS_REGION:$AWS_ACCOUNT_ID:function:monitor"}' --profile $AWS_PROFILE --region $AWS_REGION

Iterate on code by updating and uploading

If you want to extend or modify the monitor you can update the running code like this

# Update the file in the zip archive
zip --junk-paths awslambdamonitor/

# Upload the new zip file
aws lambda update-function-code --function-name monitor --zip-file fileb:// --profile $AWS_PROFILE --region $AWS_REGION

If you want to change your configuration

# Update the file in the zip archive
zip --junk-paths awslambdamonitor/monitor.yaml

# Upload the new zip file
aws lambda update-function-code --function-name monitor --zip-file fileb:// --profile $AWS_PROFILE --region $AWS_REGION

Test Event

Here is an example event that you can use in the AWS Lambda web console to test the monitor

  "account": "123456789012",
  "region": "us-east-1",
  "detail": {},
  "detail-type": "Scheduled Event",
  "source": "",
  "time": "1970-01-01T00:00:00Z",
  "id": "cdc73f9d-aea9-11e3-9d5a-835b769c0d9c",
  "resources": [

Project details

Release history Release notifications

This version
History Node


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, size & hash SHA256 hash help File type Python version Upload date
awslambdamonitor-1.0.0-py2-none-any.whl (11.9 kB) Copy SHA256 hash SHA256 Wheel py2 Aug 31, 2016
awslambdamonitor-1.0.0.tar.gz (9.2 kB) Copy SHA256 hash SHA256 Source None Aug 31, 2016

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging CloudAMQP CloudAMQP RabbitMQ AWS AWS Cloud computing Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page