You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/monitoring-aws-lambda.asciidoc
+42-18
Original file line number
Diff line number
Diff line change
@@ -92,39 +92,23 @@ Instead of specifying the <<aws-lambda-config-authentication-keys>> as plain tex
92
92
=== `ELASTIC_APM_SERVICE_NAME`
93
93
The configured name of your application or service. The APM agent will use this value when reporting data to the APM Server. If unset, the APM agent will automatically set the value based on the Lambda function name. Use this config option if you want to group multiple Lambda functions under a single service entity in APM.
deprecated::[1.2.0,Replaced by `ELASTIC_APM_DATA_FORWARDER_TIMEOUT`. See <<aws-lambda-config-data-forwarder-timeout>>]
120
-
121
-
The timeout value, in seconds, for the {apm-lambda-ext}'s HTTP client sending data to the APM Server. The _default_ is `3`. If the extension's attempt to send APM data during this time interval is not successful, the extension queues back the data. Further attempts at sending the data are governed by an exponential backoff algorithm: data will be sent after a increasingly large grace period of 0, then circa 1, 4, 9, 16, 25 and 36 seconds, provided that the Lambda function execution is ongoing.
122
-
123
107
[float]
124
108
[[aws-lambda-config-data-forwarder-timeout]]
125
109
=== `ELASTIC_APM_DATA_FORWARDER_TIMEOUT`
126
110
127
-
coming::[1.2.0,Replaces `ELASTIC_APM_DATA_FORWARDER_TIMEOUT_SECONDS`. See <<aws-lambda-config-data-forwarder-timeout-seconds>>]
The timeout value, for the {apm-lambda-ext}'s HTTP client sending data to the APM Server. The _default_ is `3s`. If the extension's attempt to send APM data during this time interval is not successful, the extension queues back the data. Further attempts at sending the data are governed by an exponential backoff algorithm: data will be sent after a increasingly large grace period of 0, then circa 1, 4, 9, 16, 25 and 36 seconds, provided that the Lambda function execution is ongoing.
130
114
@@ -148,6 +132,46 @@ though it ensures that all APM data is sent to the APM server.
148
132
=== `ELASTIC_APM_LOG_LEVEL`
149
133
The logging level to be used by both the APM Agent and the {apm-lambda-ext}. Supported values are `trace`, `debug`, `info`, `warning`, `error`, `critical` and `off`.
150
134
135
+
[float]
136
+
=== `ELASTIC_APM_LAMBDA_CAPTURE_LOGS`
137
+
138
+
preview:[]
139
+
Starting in Elastic Stack version 8.5.0, the Elastic APM lambda extension supports the collection of log events by default.
140
+
Log events can be viewed in {kib} in the APM UI. Disable log collection by setting this to `false`.
141
+
142
+
[NOTE]
143
+
====
144
+
You may see errors similar to the following in {stack} versions less than 8.5:
145
+
146
+
[source,text]
147
+
----
148
+
client error: response status code: 400
149
+
message: log: did not recognize object type
150
+
----
151
+
152
+
Users on older versions should disable log collection by setting `ELASTIC_APM_LAMBDA_CAPTURE_LOGS` to `false`.
[small]#Deprecated in: v1.2.0. Use <<aws-lambda-config-data-forwarder-timeout>> instead.#
172
+
173
+
The timeout value, in seconds, for the {apm-lambda-ext}'s HTTP client sending data to the APM Server. The _default_ is `3`. If the extension's attempt to send APM data during this time interval is not successful, the extension queues back the data. Further attempts at sending the data are governed by an exponential backoff algorithm: data will be sent after a increasingly large grace period of 0, then circa 1, 4, 9, 16, 25 and 36 seconds, provided that the Lambda function execution is ongoing.
174
+
151
175
[[aws-lambda-secrets-manager]]
152
176
== Using AWS Secrets Manager to manage APM authentication keys
153
177
When using the config options <<aws-lambda-config-authentication-keys>> for authentication of the {apm-lambda-ext}, the corresponding keys are specified in plain text in the environment variables of your Lambda function. If you prefer to securely store the authentication keys, you can use the AWS Secrets Manager and let the extension retrieve the actual keys from the AWS Secrets Manager. Follow the instructions below to set up the AWS Secrets Manager with the extension.
0 commit comments