-
Notifications
You must be signed in to change notification settings - Fork 9
AWS Benchmarking
Theodor Amariucai edited this page Feb 25, 2021
·
18 revisions
For basic benchmarking, all steps below are required:
- Create an AWS account.
-
Permissions for the Lambda functions: IAM console -> Roles -> Create Role -> Lambda -> Enter name
LambdaProducerConsumerand select bothAWSLambdaBasicExectionRole(for logging),AWSLambdaRole(for triggering other lambdas in a chain, producer-consumer scenario) andAmazonS3FullAccess(for data transfer using S3). Take note of this role ARN (e.g.,arn:aws:iam::12-DIGIT-NUMBER:role/LambdaProducerConsumer). Replace the value of constantlambdaExecutionRoleinsrc/setup/deployment/connection/amazon/deploy.gowith this role ARN. Replace constantUserARNNumberinsrc/setup/deployment/container.gowith the 12-DIGIT-NUMBER. -
Permissions for the client: IAM console -> Users -> Create User. Attach
AWSLambda_FullAccessandAmazonS3FullAccessto this user, and then create and attach another policy, e.g. namedAPIGatewayFull, which hasAPI Gateway Full access All resources. -
Local client authentication: IAM console -> Users -> Summary -> Security credentials -> Create access key. Make sure to keep creating keys until there are no forward slashes in them. Yes, AWS is that unreliable. Take note of your Access key ID (e.g.,
AKIAU4EZSQEM3S42BXY5) and Secret access key (e.g.,vAbqZTA3MpxctAi4zvS5QW4Qvvhpkg53lALgDUDV). Configure your local AWS CLI by runningaws configureand using your Access key ID and Secret access key. The default region name used in the client isus-west-1.
To enable deployment via container images:
- Create a private Amazon ECR repository with name
vhive-bench. - IAM console -> Users. Select your user created in step 2 and attach the
AmazonEC2ContainerRegistryFullAccesspermission policy to it.