Month: May 2020

Error: Unable to put integration response on ‘OPTIONS’ for resource at path ‘/{proxy+}’: Invalid mapping expression specified: Validation Result: warnings : [], errors : [Invalid mapping expression specified: ] (Service: AmazonApiGateway; Status Code: 400; Error Code: BadRequestException;

OK. Let’s get started with this issue. I would like to define an API Gateway with my lambda function using AWS Serverless Application Model (AWS SAM). However I get the error (Error: Unable to put integration response on ‘OPTIONS’ for resource at path ‘/{proxy+}’: Invalid mapping expression specified: Validation Result: warnings : [], errors : [Invalid mapping expression specified: ] (Service:…

Read More »

DIG Command

Dig (Domain Information Groper) is a network administration command-line tool for querying the Domain Name System (DNS) name servers. In its simplest form, when used to query a single host (domain) without any additional options, the dig command is pretty verbose. In the following example, we’re performing on the ilearnaws.com domain: The Got answer section shows technical details about the answer received from the…

Read More »

Error: “Failed to establish a new connection: [Errno -2] Name or service not known” when the Lambda in {Rigion} trying to connect to {URL}

After my investigation, it is said that the root cause could be a DNS resolution failure error in most cases. So you can use dig command line to find out more details. For example, by using the command, dig {URL}, you are able to see if the URL resolves to IP address properly. You can find more information for dig…

Read More »

Issue: unauthenticated user of Cognito Identity Pool is not authorized to perform: sts:AssumeRole

In account A, I have a Cognito identity pool which has a role used for unauthenticated access. I want the unauthenticated role in account A to be able to assume another role in account B. I have setup the permissions and trust policy required by AWS documentation. However, I received this error message: AccessDenied: User: arn:aws:sts::{account A}:assumed-role/{unauthenticated role name}/CognitoIdentityCredentials is…

Read More »