AWS Compute Blog
Introducing the serverless LAMP stack – part 2 relational databases
Update – June 30, 2020: Amazon RDS Proxy support for MySQL and PostgreSQL is now generally available.
The complete blog series and supporting GitHub repository is now available:
- Part 1: Introducing the new Serverless LAMP stack
- Part 2: Scaling relational databases
- Part 3: Replacing the web server
- Part 4: Building a serverless Laravel application
- Part 5: The CDK construct library for the serverless LAMP stack
- Part 6: From MVC to serverless microservices
- Additional: Building PHP Lambda functions with Docker container images
In this post, you learn how to use an Amazon Aurora MySQL relational database in your serverless applications. I show how to pool and share connections to the database with Amazon RDS Proxy, and how to choose configurations. The code examples in this post are written in PHP and can be found in this GitHub repository. The concepts can be applied to any AWS Lambda supported runtime.
This serverless LAMP stack architecture is first discussed in this post. This architecture uses a PHP Lambda function (or multiple functions) to read and write to an Amazon Aurora MySQL database.
Amazon Aurora provides high performance and availability for MySQL and PostgreSQL databases. The underlying storage scales automatically to meet demand, up to 64 tebibytes (TiB). An Amazon Aurora DB instance is created inside a virtual private cloud (VPC) to prevent public access. To connect to the Aurora database instance from a Lambda function, that Lambda function must be configured to access the same VPC.
Database memory exhaustion can occur when connecting directly to an RDS database. This is caused by a surge in database connections or by a large number of connections opening and closing at a high rate. This can lead to slower queries and limited application scalability. Amazon RDS Proxy is implemented to solve this problem. RDS Proxy is a fully managed database proxy feature for Amazon RDS. It establishes a database connection pool that sits between your application and your relational database and reuses connections in this pool. This protects the database against oversubscription, without the memory and CPU overhead of opening a new database connection each time. Credentials for the database connection are securely stored in AWS Secrets Manager. They are accessed via an AWS Identity and Access Management (IAM) role. This enforces strong authentication requirements for database applications without a costly migration effort for the DB instances themselves.
The following steps show how to connect to an Amazon Aurora MySQL database running inside a VPC. The connection is made from a Lambda function running PHP. The Lambda function connects to the database via RDS Proxy. The database credentials that RDS Proxy uses are held in Secrets Manager and accessed via IAM authentication.
Getting started
Creating an Amazon RDS Aurora MySQL database
Before creating an Aurora DB cluster, you must meet the prerequisites, such as creating a VPC and an RDS DB subnet group. For more information on how to set this up, see DB cluster prerequisites.
- Call the create-db-cluster AWS CLI command to create the Aurora MySQL DB cluster.
aws rds create-db-cluster \ --db-cluster-identifier sample-cluster \ --engine aurora-mysql \ --engine-version 5.7.12 \ --master-username admin \ --master-user-password secret99 \ --db-subnet-group-name default-vpc-6cc1cf0a \ --vpc-security-group-ids sg-d7cf52a3 \ --enable-iam-database-authentication true
- Add a new DB instance to the cluster.
aws rds create-db-instance \ --db-instance-class db.r5.large \ --db-instance-identifier sample-instance \ --engine aurora-mysql \ --db-cluster-identifier sample-cluster
- Store the database credentials as a secret in AWS Secrets Manager.
aws secretsmanager create-secret \ --name MyTestDatabaseSecret \ --description "My test database secret created with the CLI" \ --secret-string '{"username":"admin","password":"secret99","engine":"mysql","host":"<REPLACE-WITH-YOUR-DB-WRITER-ENDPOINT>","port":"3306","dbClusterIdentifier":"<REPLACE-WITH-YOUR-DB-CLUSTER-NAME>"}'
Make a note of the resulting ARN for later
{ "VersionId": "eb518920-4970-419f-b1c2-1c0b52062117", "Name": "MySampleDatabaseSecret", "ARN": "arn:aws:secretsmanager:eu-west-1:1234567890:secret:MySampleDatabaseSecret-JgEWv1" }
This secret is used by RDS Proxy to maintain a connection pool to the database. To access the secret, the RDS Proxy service requires permissions to be explicitly granted.
- Create an IAM policy that provides secretsmanager permissions to the secret.
aws iam create-policy \ --policy-name my-rds-proxy-sample-policy \ --policy-document '{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "secretsmanager:GetResourcePolicy", "secretsmanager:GetSecretValue", "secretsmanager:DescribeSecret", "secretsmanager:ListSecretVersionIds" ], "Resource": [ "<the-arn-of-the-secret>” ] }, { "Sid": "VisualEditor1", "Effect": "Allow", "Action": [ "secretsmanager:GetRandomPassword", "secretsmanager:ListSecrets" ], "Resource": "*" } ] }'
Make a note of the resulting policy ARN, which you need to attach to a new role.
{ "Policy": { "PolicyName": "my-rds-proxy-sample-policy", "PermissionsBoundaryUsageCount": 0, "CreateDate": "2020-06-04T12:21:25Z", "AttachmentCount": 0, "IsAttachable": true, "PolicyId": "ANPA6JE2MLNK3Z4EFQ5KL", "DefaultVersionId": "v1", "Path": "/", "Arn": "arn:aws:iam::1234567890112:policy/my-rds-proxy-sample-policy", "UpdateDate": "2020-06-04T12:21:25Z" } }
- Create an IAM Role that has a trust relationship with the RDS Proxy service. This allows the RDS Proxy service to assume this role to retrieve the database credentials.
aws iam create-role --role-name my-rds-proxy-sample-role --assume-role-policy-document '{ "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "Service": "rds.amazonaws.com" }, "Action": "sts:AssumeRole" } ] }'
- Attach the new policy to the role:
aws iam attach-role-policy \ --role-name my-rds-proxy-sample-role \ --policy-arn arn:aws:iam::123456789:policy/my-rds-proxy-sample-policy
Create an RDS Proxy
- Use the AWS CLI to create a new RDS Proxy. Replace the – -role-arn and SecretArn value to those values created in the previous steps.
aws rds create-db-proxy \ --db-proxy-name sample-db-proxy \ --engine-family MYSQL \ --auth '{ "AuthScheme": "SECRETS", "SecretArn": "arn:aws:secretsmanager:eu-west-1:123456789:secret:exampleAuroraRDSsecret1-DyCOcC", "IAMAuth": "REQUIRED" }' \ --role-arn arn:aws:iam::123456789:role/my-rds-proxy-sample-role \ --vpc-subnet-ids subnet-c07efb9a subnet-2bc08b63 subnet-a9007bcf
To enforce IAM authentication for users of the RDS Proxy, the IAMAuth value is set to REQUIRED. This is a more secure alternative to embedding database credentials in the application code base.
The Aurora DB cluster and its associated instances are referred to as the targets of that proxy.
- Add the database cluster to the proxy with the register-db-proxy-targets command.
aws rds register-db-proxy-targets \ --db-proxy-name sample-db-proxy \ --db-cluster-identifiers sample-cluster
Deploying a PHP Lambda function with VPC configuration
This GitHub repository contains a Lambda function with a PHP runtime provided by a Lambda layer. The function uses the MySQLi PHP extension to connect to the RDS Proxy. The extension has been installed and compiled along with a PHP executable using this command:
The PHP executable is packaged together with a Lambda bootstrap file to create a PHP custom runtime. More information on building your own custom runtime for PHP can be found in this post.
Deploy the application stack using the AWS Serverless Application Model (AWS SAM) CLI:
sam deploy -g
When prompted, enter the SecurityGroupIds and the SubnetIds for your Aurora DB cluster.
The SAM template attaches the SecurityGroupIds and SubnetIds parameters to the Lambda function using the VpcConfig sub-resource.
Lambda creates an elastic network interface for each combination of security group and subnet in the function’s VPC configuration. The function can only access resources (and the internet) through that VPC.
Adding RDS Proxy to a Lambda Function
- Go to the Lambda console.
- Choose the PHPHelloFunction that you just deployed.
- Choose Add database proxy at the bottom of the page.
- Choose existing database proxy then choose sample-db-proxy.
- Choose Add.
Using the RDS Proxy from within the Lambda function
The Lambda function imports three libraries from the AWS PHP SDK. These are used to generate a password token from the database credentials stored in Secrets Manager.
The AWS PHP SDK libraries are provided by the PHP-example-vendor layer. Using Lambda layers in this way creates a mechanism for incorporating additional libraries and dependencies as the application evolves.
The function’s handler named index, is the entry point of the function code. First, getenv()
is called to retrieve the environment variables set by the SAM application’s deployment. These are saved as local variables and available for the duration of the Lambda function’s execution.
The AuthTokenGenerator class generates an RDS auth token for use with IAM authentication. This is initialized by passing in the credential provider to the SDK client constructor. The createToken()
method is then invoked, with the Proxy endpoint, port number, Region, and database user name provided as method parameters. The resultant temporary token is then used to connect to the proxy.
The PHP mysqli class represents a connection between PHP and a MySQL database. The real_connect()
method is used to open a connection to the database via RDS Proxy. Instead of providing the database host endpoint as the first parameter, the proxy endpoint is given. The database user name, temporary token, database name, and port number are also provided. The constant MYSQLI_CLIENT_SSL
is set to ensure that the connection uses SSL encryption.
Once a connection has been established, the connection object can be used. In this example, a SHOW TABLES
query is executed. The connection is then closed, and the result is encoded to JSON and returned from the Lambda function.
This is the output:
RDS Proxy monitoring and performance tuning
RDS Proxy allows you to monitor and adjust connection limits and timeout intervals without changing application code.
Limit the timeout wait period that is most suitable for your application with the connection borrow timeout option. This specifies how long to wait for a connection to become available in the connection pool before returning a timeout error.
Adjust the idle connection timeout interval to help your applications handle stale resources. This can save your application from mistakenly leaving open connections that hold important database resources.
Multiple applications using a single database can each use an RDS Proxy to divide the connection quotas across each application. Set the maximum proxy connections as a percentage of the max_connections
configuration (for MySQL).
The following example shows how to change the MaxConnectionsPercent
setting for a proxy target group.
aws rds modify-db-proxy-target-group \
--db-proxy-name sample-db-proxy \
--target-group-name default \
--connection-pool-config '{"MaxConnectionsPercent": 75 }'
Response:
{
"TargetGroups": [
{
"DBProxyName": "sample-db-proxy",
"TargetGroupName": "default",
"TargetGroupArn": "arn:aws:rds:eu-west-1:####:target-group:prx-tg-03d7fe854604e0ed1",
"IsDefault": true,
"Status": "available",
"ConnectionPoolConfig": {
"MaxConnectionsPercent": 75,
"MaxIdleConnectionsPercent": 50,
"ConnectionBorrowTimeout": 120,
"SessionPinningFilters": []
},
"CreatedDate": "2020-06-04T16:14:35.858000+00:00",
"UpdatedDate": "2020-06-09T09:08:50.889000+00:00"
}
]
}
RDS Proxy may keep a session on the same connection until the session ends when it detects a session state change that isn’t appropriate for reuse. This behavior is called pinning. Performance tuning for RDS Proxy involves maximizing connection reuse by minimizing pinning.
The Amazon CloudWatch metric DatabaseConnectionsCurrentlySessionPinned
can be monitored to see how frequently pinning occurs in your application.
Amazon CloudWatch collects and processes raw data from RDS Proxy into readable, near real-time metrics. Use these metrics to observe the number of connections and the memory associated with connection management. This can help identify if a database instance or cluster would benefit from using RDS Proxy. For example, if it is handling many short-lived connections, or opening and closing connections at a high rate.
Conclusion
In this post, you learn how to create and configure an RDS Proxy to manage connections from a PHP Lambda function to an Aurora MySQL database. You see how to enforce strong authentication requirements by using Secrets Manager and IAM authentication. You deploy a Lambda function that uses Lambda layers to store the AWS PHP SDK as a dependency.
You can create secure, scalable, and performant serverless applications with relational databases. Do this by placing the RDS Proxy service between your database and your Lambda functions. You can also migrate your existing MySQL database to an Aurora DB cluster without altering the database. Using RDS Proxy and Lambda, you can build serverless PHP applications faster, with less code.
Find more PHP examples with the Serverless LAMP stack.