diff --git a/aws-distro-opentelemetry-node-autoinstrumentation/src/aws-span-processing-util.ts b/aws-distro-opentelemetry-node-autoinstrumentation/src/aws-span-processing-util.ts index 65329724..46c8a6fd 100644 --- a/aws-distro-opentelemetry-node-autoinstrumentation/src/aws-span-processing-util.ts +++ b/aws-distro-opentelemetry-node-autoinstrumentation/src/aws-span-processing-util.ts @@ -63,7 +63,7 @@ export class AwsSpanProcessingUtil { operation = AwsSpanProcessingUtil.INTERNAL_OPERATION; } if (isLambdaEnvironment()) { - operation = process.env[AWS_LAMBDA_FUNCTION_NAME_CONFIG] + '/Handler'; + operation = process.env[AWS_LAMBDA_FUNCTION_NAME_CONFIG] + '/FunctionHandler'; } else if (!AwsSpanProcessingUtil.isValidOperation(span, operation)) { operation = AwsSpanProcessingUtil.generateIngressOperation(span); } diff --git a/aws-distro-opentelemetry-node-autoinstrumentation/test/aws-span-processing-util.test.ts b/aws-distro-opentelemetry-node-autoinstrumentation/test/aws-span-processing-util.test.ts index 1119b587..415df95b 100644 --- a/aws-distro-opentelemetry-node-autoinstrumentation/test/aws-span-processing-util.test.ts +++ b/aws-distro-opentelemetry-node-autoinstrumentation/test/aws-span-processing-util.test.ts @@ -375,7 +375,7 @@ describe('AwsSpanProcessingUtilTest', () => { (spanDataMock as any).name = validName; (spanDataMock as any).kind = SpanKind.SERVER; const actualOperation: string = AwsSpanProcessingUtil.getIngressOperation(spanDataMock); - expect(actualOperation).toEqual('TestFunction/Handler'); + expect(actualOperation).toEqual('TestFunction/FunctionHandler'); }); it('should return cloud.resource_id when present', () => { diff --git a/lambda-layer/terraform/lambda/main.tf b/lambda-layer/terraform/lambda/main.tf index f9a1235e..b86cc659 100644 --- a/lambda-layer/terraform/lambda/main.tf +++ b/lambda-layer/terraform/lambda/main.tf @@ -64,5 +64,5 @@ resource "aws_iam_role_policy_attachment" "hello-lambda-cloudwatch" { resource "aws_iam_role_policy_attachment" "test_xray" { role = module.hello-lambda-function.lambda_function_name - policy_arn = "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess" + policy_arn = "arn:aws:iam::aws:policy/CloudWatchLambdaApplicationSignalsExecutionRolePolicy" }