Skip to content

Commit e3def3f

Browse files
authored
AWS EC2 -> Amazon EC2 (#585)
1 parent 8914645 commit e3def3f

File tree

7 files changed

+10
-10
lines changed

7 files changed

+10
-10
lines changed

src/docs/getting-started/go-sdk/manual-instr.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ otel.SetTextMapPropagator(xray.Propagator{})
123123

124124
### Using the AWS resource Detectors
125125

126-
OpenTelemetry Go SDK has AWS EC2, ECS and EKS resource detector support. The resource detectors are responsible for detecting whether a Go application instrumented with OpenTelemetry is running on the respective environment, and populating resource attributes for that environment if available. If the resource detector detects that the application
126+
OpenTelemetry Go SDK has Amazon EC2, ECS and EKS resource detector support. The resource detectors are responsible for detecting whether a Go application instrumented with OpenTelemetry is running on the respective environment, and populating resource attributes for that environment if available. If the resource detector detects that the application
127127
is not running on an environment (EC2, ECS or EKS), then it will return an empty `resource` struct.
128128

129129
<img src={goImg5} alt="Diagram" style="margin: 30px 0;" />

src/docs/getting-started/prometheus-remote-write-exporter/ecs.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import availableMetricsECSImg from "assets/img/docs/gettingStarted/prometheus/ec
1515
In this guide, we'll enable Prometheus collection for an ECS cluster on EC2 and an ECS cluster on Fargate. In this scenario, we will use the Prometheus Receiver to scrape from
1616
applications and the AWS ECS Container Metrics Receiver to scrape infrastructure metrics. We will scrape from an application that provides us with some example Prometheus metrics.
1717

18-
For ECS clusters powered by both AWS Fargate or AWS EC2, we will create a task definition of an ADOT Collector and a Prometheus metric emitter sample app.
18+
For ECS clusters powered by both AWS Fargate or Amazon EC2, we will create a task definition of an ADOT Collector and a Prometheus metric emitter sample app.
1919

2020
Our ADOT Collector configurations will contain two pipelines.
2121

@@ -130,7 +130,7 @@ Next, push this image to a remote repository on either ECR or Dockerhub so that
130130

131131
<SectionSeparator />
132132

133-
## Demonstration 2: ECS Powered by AWS EC2
133+
## Demonstration 2: ECS Powered by Amazon EC2
134134

135135
Note that you must have a cluster created with an EC2 instance available. We chose “EC2 Linux + Networking” template. For more detailed cluster setup please refer to the link in the prerequisites section of this document.
136136

src/docs/getting-started/python-sdk/manual-instr.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ When you install `opentelemetry-sdk-extension-aws`, you automatically get AWS Re
124124

125125
The ADOT Python SDK supports automatically recording metadata in EC2, Elastic Beanstalk, ECS, and EKS environments.
126126

127-
For example, if tracing with OpenTelemetry on an AWS EC2 instance, you can automatically populate `resource` attributes by creating a `TraceProvider` using the `AwsEc2ResourceDetector`:
127+
For example, if tracing with OpenTelemetry on an Amazon EC2 instance, you can automatically populate `resource` attributes by creating a `TraceProvider` using the `AwsEc2ResourceDetector`:
128128

129129

130130
```python lineNumbers=true

src/docs/getting-started/ruby-sdk/trace-manual-instr.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ TODO: Update this section when ADOT Ruby Resource Detectors have been contribute
189189

190190
The ADOT Ruby SDK supports automatically detecting and recording metadata from resources such as EC2, Elastic Beanstalk, ECS, and EKS.
191191

192-
For example, if tracing with OpenTelemetry Ruby on an AWS EC2 instance, you can automatically populate `resource` attributes by initializing the OpenTelemetry Ruby SDK `TraceProvider` to use the `AwsEc2ResourceDetector`:
192+
For example, if tracing with OpenTelemetry Ruby on an Amazon EC2 instance, you can automatically populate `resource` attributes by initializing the OpenTelemetry Ruby SDK `TraceProvider` to use the `AwsEc2ResourceDetector`:
193193

194194
```ruby lineNumbers=true
195195
OpenTelemetry::SDK.configure do |c|

src/docs/setup/build-collector-as-debian.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ import SectionSeparator from "components/MdxSectionSeparator/sectionSeparator.js
99

1010
<SectionSeparator />
1111

12-
## Run ADOTCollector Beta on AWS EC2 Debian(ubuntu)
12+
## Run ADOTCollector Beta on Amazon EC2 Debian(ubuntu)
1313

14-
To run ADOTCollector on AWS EC2 debian host, you can choose to install ADOTCollector Debian on your host by the following steps.
14+
To run ADOTCollector on Amazon EC2 debian host, you can choose to install ADOTCollector Debian on your host by the following steps.
1515

1616
**Steps,**
1717

src/docs/setup/build-collector-as-rpm.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ import SectionSeparator from "components/MdxSectionSeparator/sectionSeparator.js
99

1010
<SectionSeparator />
1111

12-
## Run ADOT Collector on AWS EC2 Linux
12+
## Run ADOT Collector on Amazon EC2 Linux
1313

14-
To run ADOT Collector on AWS EC2 Linux host, you can choose to install ADOT Collector RPM on your host by the following steps.
14+
To run ADOT Collector on Amazon EC2 Linux host, you can choose to install ADOT Collector RPM on your host by the following steps.
1515

1616
**Steps,**
1717

src/docs/setup/ec2.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ aws cloudformation create-stack --stack-name AOCEC2-Test \
6464
--capabilities CAPABILITY_NAMED_IAM \
6565
--region ${Region}
6666
```
67-
3. Go to AWS EC2 Console and verify there is a new EC2 instance that has been launched.
67+
3. Go to Amazon EC2 Console and verify there is a new EC2 instance that has been launched.
6868
4. Select the instance, and then choose *Connect. *You can login to the EC2 host with the example command below.
6969
```
7070
ssh -i "<ec2-ssh-key-name>.pem" ec2-user@ec2-<instance_id>.us-west-2.compute.amazonaws.com (mailto:[email protected])

0 commit comments

Comments
 (0)