Creating a Secure Media CDN with CloudFront and Lambda@Edge (Part IV)

Published on December 15, 2021

2021-11 Creating a secure media CDN PartIV

Subscribe for updates

Build better digital experiences with Contentful updates direct to your inbox.

Continuation of our series on how to build a CloudFront distribution that serves your S3 Media, performs on-demand image transformation and even authenticates incoming requests.

This is part IV of the series of posts where we are building a CloudFront distribution that serves your S3 Media, performs on-demand image transformation, and authenticates incoming requests. If you missed part III, you can check it out here!

Creating the telemetry helper

So we have a working CloudFront distribution with authentication and on-demand transformation capabilities, but there is something we lack here: the ability to monitor the health of our lambda and debug incoming requests. Sure, CloudWatch already provides us some metrics out of the box, like LambdaExecutionError, or how many times it was invoked, but we cannot tell which response was returned or if the authentication failed or succeeded as an example. In order to collect those metrics and make them available on CloudWatch (which we can then inspect on logs, or even create alerts and dashboards with them) we need to use aws-embedded-metrics.

First, we install the package:

npm install --save aws-embedded-metrics

Then we create a telemetry.ts file:

In this file, we create a wrapper function that takes the code inside the handler as a callback. Then, it sets up the AWS Metrics Logger and a logging function (that basically just receives strings and pushes them to an array). It also sets up some common telemetry that will be useful for every lambda, like the Region Dimension and the metrics that tell if the handler managed to execute as planned or not. It then calls the callback (the handler itself) and finally flushes all the metrics to be collected by CloudWatch. If you want to know more about everything you can do with the MetricsLogger, check out their documentation.

Let's take a look at how we can use it on each lambda. Starting with the origin-request:

We start by wrapping up everything inside the handler in a return withTelemetry(). Our handler will then have access to the telemetry object we set up in the previous file. Now we log some properties like what was the origin chosen, what is the response status (in case we do the early response return) and what is the uniform resource indicator (URI) of the request. We also log the message of the error when transforming. All of them will be logged in CloudWatch and can be used to debug and monitor our application.

Same thing with the origin-response now:

Here, we not only log the response status but also put a metric for every HTTP status range we are returning. This is quite useful for dashboards or alerting on the 4xx/2xx-3xx cache hit ratio in order to monitor if our application is broken.

Lastly, let's check out the viewer request:

Similar to the origin request, we log the response status for the early forbidden response, but we also create metrics around the result of the authentication.

These are just a few of the metrics we can use, but by taking advantage of the MetricsLogger, we can monitor everything we want in our distribution and build solid monitoring on top of it. Just be careful to not log any user-sensitive information like tokens!

Let's give this a try, first compile your code:

CLOUDINARY_ID={my_id} npx rollup -c

Then run terraform plan and terraform apply. After everything is done and applied, try out some different flows, like requesting without a token, with the token or with an invalid transformation, and you should see all the different types of logs on CloudWatch. The log group should be /aws/lambda/us-east-1.{lambda-name} for each lambda, like /aws/lambda/us-east-1.media-origin-request. The region should be the region closest to you as it is where the lambda executes (but it will still have us-east-1 on the log group name as this is where the lambda is deployed to). You can also go to the CloudWatch metrics and find them inside the aws-embedded-metrics namespace.

You can check the full solution we went through up to this point (including parts I, II, and III) here in this GitHub repo.

What’s next?

We now have a production-ready Media CloudFront distribution! But this is just the beginning, you can now add more transformations, implement different types of authentication mechanisms, maybe even set up a video transformation origin. Some things to be careful of, though:

  • The Lambda@Edge has some run-time requirements. Origin lambdas cannot take more than 30 seconds to execute, while viewer lambdas cannot take more than five seconds. This is especially tricky if you have an auth check that can take longer than five seconds to return, in this case, you might want to consider passing the auth check to behind the CloudFront cache, using the origin request instead.

  • Even if you adhere to the requirement above, it's not nice to keep your user waiting seconds just for receiving the first byte of the image (not even counting the time it can take for the image to download), so everything that your lambda relies on should ideally have good caching strategies. It's ok for the first uncached request to take three seconds to warm everything needed to fulfil it, but the next ones should hopefully be fulfilled much faster than this, otherwise you will have a pretty bad user experience with all the latency.

  • Be mindful of what packages you use — you will need to include all of them in your .js bundle file, and you do not want a huge file because AWS has some hard limits on how big that file can be.

If you want a quick reference to the code, including all parts of our series, you can find it here in this GitHub repo. It also contains some small things that we have not discussed in this series, like linting and a terraform folder structure.

I hope you have enjoyed everything so far! Have fun setting up your Media CDN!

Read more of the latest developer tutorials on our blog

Subscribe for updates

Build better digital experiences with Contentful updates direct to your inbox.

Leonardo Freitas dos Santos

Leonardo Freitas

Infrastructure Engineer, Contentful

Leonardo is a Infrastructure Engineer at Contentful

Related articles

API-first means the API is the primary and most important focus during the development process for a new product. Why does it matter? Allow us to explain.
Guides

What is API-first?

September 21, 2023

In this tutorial you'll learn how to create a time series chart to display tag usage from blog posts published on your site, using Astro and Contentful.
Guides

Simple data visualization using Astro and Contentful

February 6, 2024

To learn more about a new way of page caching with Netlify and Contentful, we explore how to render content on the fly for faster builds with Jamstack.
Guides

How to generate unlimited CDN-cached pages with Netlify and Contentful

April 5, 2022

Contentful Logo 2.5 Dark

Ready to start building?

Put everything you learned into action. Create and publish your content with Contentful — no credit card required.

Get started