Node's Perpetuum Mobile


    1.0.3 • Public • Published


    Node module to easily retrieve multiple parameters from AWS parameter store.

    The function takes two argument, an array of parameter names and AWS region. It returns a JSON object with parameter name as key and parameter value as value. See the usage example below.

    The decrypt option is enabled. It works on all parameter types, SecureString, String, and StringList.

    Output look like this:

      my.db.endpoint:'endpoint-url', 'database-name',
      my.db.password: 'database-pw',
      my.db.usernme: 'database-username'


    npm i @mdhnpm/aws-ssm-parameters


    It requires AWS Cli. It needs to be configured with the correct credentials (read access rights to AWS Parameter Store). Check out the official documentation for AWS Cli configuration.

    To use this module in Lambda function. The function needs to have the permission for AWS parameter store access as below.

    - Effect: Allow
        - ssm:Describe*
        - ssm:Get*
      Resource: arn:aws:ssm:ap-southeast-2:<account no>:parameter/*

    Example Code

    'use strict';
    const { getParameters } = require('@mdhnpm/aws-ssm-parameters');
    // Input is an array of parameter names
    const parameterNames = [
    const getParams = async () => {
      // Argument is (1) an array of parameter name & (2) AWS region
      const parameters = await getParameters(parameterNames, 'ap-southeast-2');
    // The module creates a Json object 
    // with parameter name as key and actual value as value
    // Decrypt option is enabled. It works on secure string.
    // {
    //   my.db.endpoint:'endpoint-url', 
    // 'database-name',
    //   my.db.password: 'database-pw',
    //   my.db.usernme: 'database-username'
    // }

    Lambda Function Use Case

    Instead of adding the actual database credentials or API keys in the environment variable, we can add the parameter names and use this module to retrieve them. In this way, the lambda function does not need to be deployed every time the credential gets roatated.

    Retrieval of parameters has computational costs. The parameter store also throttles requests when the volume is high. The best practice is to store the retrieved value globally and make sure the code only calls parameter store when it doesn't exist in the global scope (this is when the lambd execution container is on cold start) as well as retry logic when the credentials get roatated.

    Source Code

    Soucre code can be found at a GitHub repo, aws-ssm-parameters.


    npm i @mdhnpm/aws-ssm-parameters

    DownloadsWeekly Downloads






    Unpacked Size

    8.95 kB

    Total Files


    Last publish


    • mdhnpm