diff --git a/modules/ami-housekeeper/main.tf b/modules/ami-housekeeper/main.tf index d8cec2f857..97ce2cef8a 100644 --- a/modules/ami-housekeeper/main.tf +++ b/modules/ami-housekeeper/main.tf @@ -22,7 +22,7 @@ resource "aws_lambda_function" "ami_housekeeper" { LOG_LEVEL = var.log_level POWERTOOLS_LOGGER_LOG_EVENT = var.log_level == "debug" ? "true" : "false" AMI_CLEANUP_OPTIONS = jsonencode(var.cleanup_config) - POWERTOOLS_SERVICE_NAME = "ami-housekeeper" + POWERTOOLS_SERVICE_NAME = "${var.prefix}-ami-housekeeper" POWERTOOLS_TRACE_ENABLED = var.tracing_config.mode != null ? true : false POWERTOOLS_TRACER_CAPTURE_HTTPS_REQUESTS = var.tracing_config.capture_http_requests POWERTOOLS_TRACER_CAPTURE_ERROR = var.tracing_config.capture_error diff --git a/modules/runners/pool/main.tf b/modules/runners/pool/main.tf index e141b22d25..be61018c93 100644 --- a/modules/runners/pool/main.tf +++ b/modules/runners/pool/main.tf @@ -42,7 +42,7 @@ resource "aws_lambda_function" "pool" { SSM_TOKEN_PATH = var.config.ssm_token_path SSM_CONFIG_PATH = var.config.ssm_config_path SUBNET_IDS = join(",", var.config.subnet_ids) - POWERTOOLS_SERVICE_NAME = "runners-pool" + POWERTOOLS_SERVICE_NAME = "${var.config.prefix}-pool" POWERTOOLS_TRACE_ENABLED = var.tracing_config.mode != null ? true : false POWERTOOLS_TRACER_CAPTURE_HTTPS_REQUESTS = var.tracing_config.capture_http_requests POWERTOOLS_TRACER_CAPTURE_ERROR = var.tracing_config.capture_error diff --git a/modules/runners/scale-down.tf b/modules/runners/scale-down.tf index d274e3d4f1..a36f3b0532 100644 --- a/modules/runners/scale-down.tf +++ b/modules/runners/scale-down.tf @@ -34,7 +34,7 @@ resource "aws_lambda_function" "scale_down" { POWERTOOLS_LOGGER_LOG_EVENT = var.log_level == "debug" ? "true" : "false" RUNNER_BOOT_TIME_IN_MINUTES = var.runner_boot_time_in_minutes SCALE_DOWN_CONFIG = jsonencode(var.idle_config) - POWERTOOLS_SERVICE_NAME = "runners-scale-down" + POWERTOOLS_SERVICE_NAME = "${var.prefix}-scale-down" POWERTOOLS_METRICS_NAMESPACE = var.metrics.namespace POWERTOOLS_TRACE_ENABLED = var.tracing_config.mode != null ? true : false POWERTOOLS_TRACER_CAPTURE_HTTPS_REQUESTS = var.tracing_config.capture_http_requests diff --git a/modules/runners/scale-up.tf b/modules/runners/scale-up.tf index b97fefed4f..7722f2d361 100644 --- a/modules/runners/scale-up.tf +++ b/modules/runners/scale-up.tf @@ -54,7 +54,7 @@ resource "aws_lambda_function" "scale_up" { RUNNER_GROUP_NAME = var.runner_group_name RUNNER_NAME_PREFIX = var.runner_name_prefix RUNNERS_MAXIMUM_COUNT = var.runners_maximum_count - POWERTOOLS_SERVICE_NAME = "runners-scale-up" + POWERTOOLS_SERVICE_NAME = "${var.prefix}-scale-up" SSM_TOKEN_PATH = local.token_path SSM_CONFIG_PATH = "${var.ssm_paths.root}/${var.ssm_paths.config}" SUBNET_IDS = join(",", var.subnet_ids) diff --git a/modules/runners/ssm-housekeeper.tf b/modules/runners/ssm-housekeeper.tf index b535dfee3f..b591938fae 100644 --- a/modules/runners/ssm-housekeeper.tf +++ b/modules/runners/ssm-housekeeper.tf @@ -32,7 +32,7 @@ resource "aws_lambda_function" "ssm_housekeeper" { ENVIRONMENT = var.prefix LOG_LEVEL = var.log_level SSM_CLEANUP_CONFIG = jsonencode(local.ssm_housekeeper.config) - POWERTOOLS_SERVICE_NAME = "ssm-housekeeper" + POWERTOOLS_SERVICE_NAME = "${var.prefix}-ssm-housekeeper" POWERTOOLS_TRACE_ENABLED = var.tracing_config.mode != null ? true : false POWERTOOLS_TRACER_CAPTURE_HTTPS_REQUESTS = var.tracing_config.capture_http_requests POWERTOOLS_TRACER_CAPTURE_ERROR = var.tracing_config.capture_error diff --git a/modules/webhook/eventbridge/dispatcher.tf b/modules/webhook/eventbridge/dispatcher.tf index 9f06e322da..2a0e733fbb 100644 --- a/modules/webhook/eventbridge/dispatcher.tf +++ b/modules/webhook/eventbridge/dispatcher.tf @@ -39,7 +39,7 @@ resource "aws_lambda_function" "dispatcher" { for k, v in { LOG_LEVEL = var.config.log_level POWERTOOLS_LOGGER_LOG_EVENT = var.config.log_level == "debug" ? "true" : "false" - POWERTOOLS_SERVICE_NAME = "dispatcher" + POWERTOOLS_SERVICE_NAME = "${var.config.prefix}-dispatcher" POWERTOOLS_TRACE_ENABLED = var.config.tracing_config.mode != null ? true : false POWERTOOLS_TRACER_CAPTURE_HTTPS_REQUESTS = var.config.tracing_config.capture_http_requests POWERTOOLS_TRACER_CAPTURE_ERROR = var.config.tracing_config.capture_error diff --git a/modules/webhook/eventbridge/webhook.tf b/modules/webhook/eventbridge/webhook.tf index 8792403134..66d8baef18 100644 --- a/modules/webhook/eventbridge/webhook.tf +++ b/modules/webhook/eventbridge/webhook.tf @@ -23,7 +23,7 @@ resource "aws_lambda_function" "webhook" { for k, v in { LOG_LEVEL = var.config.log_level POWERTOOLS_LOGGER_LOG_EVENT = var.config.log_level == "debug" ? "true" : "false" - POWERTOOLS_SERVICE_NAME = "webhook" + POWERTOOLS_SERVICE_NAME = "${var.config.prefix}-webhook" POWERTOOLS_TRACE_ENABLED = var.config.tracing_config.mode != null ? true : false POWERTOOLS_TRACER_CAPTURE_HTTPS_REQUESTS = var.config.tracing_config.capture_http_requests POWERTOOLS_TRACER_CAPTURE_ERROR = var.config.tracing_config.capture_error