AWS Attendance System:  Introduction

Genese Attendance System is built using AWS Serverless Framework where Dynamodb is used for Database, API Gateway is used for HTTP Requests, Lambda for Serverless Computing and Amazon Cognito for User Authentication. Furthermore, S3(with Static Web Hosting) and CloudFront is used for Hosting it. A serverless system that seeks the help of Image Analyzing AI service provided by AWS to track and record day to day employee attendance details of any kind of organization by Facial Recognition methods. It provides a simple user interface to monitor each and every record at any time. In addition, the system incorporates holiday package, leave management and other handy integrations. Here an Architecture Diagram shows the workflow of the Genese Attendance System.

AWS Services

  • Lambda
  • DynamoDB
  • Simple Storage Service
  • API Gateway
  • Amazon Cognito
  • CloudFront
  • Amazon Rekognition
  • Simple Email Service

Architecture Diagram

1. AWS Lambda Architecture for Attendance System.

2. AWS API Gateway Architecture for Attendance System.

3. CloudFront Architecture for Attendance System.

AWS Services

1. TCO Analysis

TCO analysis helps us to know the cost that we can save by using the use of Amazon Services. As we can see in the figure 73% of a yearly cost has been saved by moving our System in the AWS.

After moving in the AWS we still saw the way to reduce the cost and we moved towards the serverless service of the AWS, through which we successfully saved 140 dollars more by integrating with the serverless of AWS.

2. Detailed reporting with Cloudwatch Reporting and analytics dashboard

We have web distribution URL added and then we can see the different metrics like a chart for the total number of requests for all HTTPS code, another chart is about the data transfer which shows bytes downloads and uploads by the user and another chart shows the request by the HTTPS status code.

We have created Cloudwatch Alarms to notify us about CloudFront metric data whenever it exceeded the threshold that we have defined. When Cloudwatch triggers an alarm and it sends a notification to the email list.

3. Signed URLs Cookies

The system captures images of employees daily. Those images are displayed in the root account. So to deny public access and allow only one user to access those images, we have configured the Signed URLs for those images.

4. Performance testing

Since real user metrics are not available because the application being tested is not receiving real web traffic, we evaluate the performance of our CloudFront distribution by using Synthetic Monitoring approach for performance testing for CDN. For this, we mimic actual web traffic by simulating requests from locations worldwide.

For our application, we use Apache Bench Tool from a command line to test heavy loads on the CloudFront.

Amazon API Gateway

1. Type of API Gateway solution being delivered

An application uses Rest API’s created in API Gateway to facilitate client-server communications. Client-side sends a request to the API Endpoint which then triggers related lambda function and returns an appropriate response to the client side.

2. Guidance provided to the customer for effective monitoring solution and cloud watch metrics

Suggestions to enable the CloudWatch logs and CloudWatch metrics detailed option to track the information or errors of every API call and view the detailed information about API calls, latency, integration latency, 400 errors, and 500 errors.

3. API Versioning

Since we needed to keep the development and production environment separate, we used the Stage variables to separate different versions of API.

4. Proficiency

Under the API Gateway, we have used mapping template for handling the request and response from the client.
For Authentication, we have used Cognito User Pool Authorizers. Client-side sends a request to the API endpoint with a token from Cognito. API Gateway verifies the token using the authorizer and grants further access to the lambda function.

Amazon DynamoDB

1.Description Dyanamodb Tables, their Primary Keys, and Indexes

Table 1: Employee

  • Main Table: Name (hash key) & Date(sort key) For a particular date, a user has only one record in the table. So using “Name” as Hash Key and “Date” as Sort Key, it is efficient to perform query operation in the main table.
  • Global Secondary Index: Name(hash key) & monthvalue(sort key) Since scan operation on DynamoDB table with large item count results in ineffective use of provisioned throughput, we seek the help of Global Secondary index to define a new primary key combination of “Name” as Hash Key and “monthvalue” as Sort Key. Doing so we can retrieve records of a user for a particular month from a query operation

Table 2: employee_details

  • Main Table: username(hash key) This table stored the details of every user of the application. Each user is identical with each other with the username attribute. So the best option for a primary hash key is the username itself.

Table 3: event_records

  • Main Table: companyusername(hash key) & date(sort key) Different company has different events of their own. A particular item in the table includes events records for events of a company on a particular date. So optimum efficiency is achieved by making the “companyusername” the Hash key and “date” as Sort Key.
  • Global Secondary Index: monthvalue(hash key) An application requires frequent queries regarding events in a particular month, so we need to implement an index that has “monthvalue” attribute as the primary hash key.

Table 4:leave_requests

  • Main Table: leaveid(hash key) For every leave request, we generate a 32 digit unique UUID to serve as the primary hash key for the table.
  • Global Secondary Index:
    • employeeusername-index: employeeusername (hash key): The application queries every leave requests for a particular user. So for the smooth and effective query actions, this global secondary index with “employeeusername” as the Primary Key.
    • managerusername-index: managerusername  (hash key): Managers get a notification about any new leave request they are responsible for. To query the leave requests from a manager’s perspective, this index takes  “managerusername” as the Primary Hash key.

2. Backup and Data Encryption of Dynamodb Table

Continuous backup is enabled in the DynamoDB tables and when it’s enabled, point-in-time recovery provides continuous backups until it is explicitly turned off. DynamoDB maintains continuous backups of the tables for the last 35 days. We have enabled encryption for the DynamoDB tables to help protect data at rest.

3. Monitoring and alerting for read and write capacity

We have created Cloudwatch Alarms to notify us about any insufficiency in provisioned throughput capacity.

4. Dynamodb Workload Summary

  • Write Capacity Units: Range between 20,000 to 25,000 WCU-Hrs
  • Read Capacity Units: Range between 20,000 to 25,000 RCU-Hrs
  • Total data storage: less than 5 GB till now
  • Global deployment: In only one region (ap-south-1)

AWS Lambda

1. Uses and Workloads of Lambda Service

  • Connection with other AWS Services:AWS Lambda functions act as the backend to the application. This application utilizes other AWS services and resources that are organized and manipulated by lambda functions. The application uses DynamoDB tables for storing data and records. Lambda is responsible for reads and writes of data from and to the database.For storing static files, AWS storage service S3 is used and all the GET and PUT operation is done by Lambda functions. Amazon Rekognition is implemented in Lambda function codes to do image processing tasks.Since this application is totally serverless, all the application logic resides inside lambda functions only. There is no need for any servers or containers in any kind of roles or tasks in the application.
  • Automating Infrastructures provisioning and managing is not serverless
    AWS Lambda serves client side with appropriate data queries, user registration, and many other application tasks. Automation of Infrastructure provisioning and management is not applicable in this use case.
  • Handle core data flow with AWS Lambda
    Each and every backend logic that the application is based on is hosted in AWS Lambda. All the logic behind DynamoDB table read and writes, S3 GET and PUT, Image processing tasks with Rekognition, Cognito Admin User creation etc. resides inside lambda functions.

2. Solution Characteristics for Lambda Functions

  • Load/Performance Testing:
    We used a package of node (npm) named loadtest to test the API request and Lambda Invocations. We have Installed the Package Locally with command: npm install -g loadtest. To perform Load Test, the command syntax will be like this: Command: ‘loadtest -c 10 –rps 200https://ginyod5w77.execute-api.ap-south-1.amazonaws.com/prod/openapi?addNewIntern=SendCredentials
  • IAM Policy Definition:
    We have used different IAM policies to attach it with the IAM Roles to execute necessary tasks in Lambda functions.
    Different Policies Used are:

    • AttendanceCognitoPolicy(Inline Policy)
    • AttendaceDynamodbPolicy(Inline Policy)
    • ses-full-access(Inline Policy)
    • AWSS3DFullAccess(AWS Managed Policy)
    • AttendaceRecognitionPolicy(Inline Policy)
    • AttendaceS3Policy(Inline Policy)
    • AttendaceSESPolicy(Inline Policy)
  • Managing Failed Executions:
    We have used python boto3 library in our code. Lambda intakes certain parameters values from API Gateway event which determines what task is to be done. Every code logic includes python exception handling mechanism which minimizes failed executions to zero. Since all the moving part are handled for exceptions, there is no way of any failed execution. In certain cases, maybe the input parameters may be wrong and code logic may not comply with the input. In such case, lambda identifies the exception and returns an appropriate message to the client side.
  • Management of Multiple Microservice functions:
    1. The application is composed of small independent services that communicate over a defined API.
    2. The Server Side Logic is written in Lambda functions, which are independent microservice functions of AWS.
    3. We have created a CloudFormation Template(CFT) to create and manage all of the microservice functions.
    4. CloudFormation covers:
      • Create and deploy different lambda functions
      • Create API gateway methods to connect the lambda microservice with the front end logic.
  • VPC vs No-VPC and concurrency:
    Lambda functions are not placed in any VPC’s as the application do not need to connect to any other servers that require VPC Secure Environment. Regarding concurrency limits, the default limit of 1000 concurrent executions is enough for a current use case. We might need a limit increase in the future.
  • Monitoring of Alarms and Metrics:
    1. For Monitoring the execution of lambda functions, we have used CloudWatch Service of AWS.
    2. We have monitored different CloudWatch metrics of Lambda by the Name of Function.
    3. Name of Different Metrics that we monitored for our Lambda includes:
      • Invocation per lambda function
      • Duration of execution of lambda function
      • Error in a lambda function
      • Throttles to manage the flow of execution