diff --git a/packages/opentelemetry-resource-detector-aws/src/detectors/AwsEksDetector.ts b/packages/opentelemetry-resource-detector-aws/src/detectors/AwsEksDetector.ts index b64aaea8bc1..e046243e784 100644 --- a/packages/opentelemetry-resource-detector-aws/src/detectors/AwsEksDetector.ts +++ b/packages/opentelemetry-resource-detector-aws/src/detectors/AwsEksDetector.ts @@ -78,7 +78,7 @@ export class AwsEksDetector implements Detector { [CONTAINER_RESOURCE.ID]: containerId || '', }); } catch (e) { - config.logger.warn('This process is not running on Kubernetes because either the token path or certificate path cannot be accessed ', e); + config.logger.warn('Process is not running on K8S', e); return Resource.empty(); } } diff --git a/packages/opentelemetry-resource-detector-aws/test/detectors/AwsEksDetector.test.ts b/packages/opentelemetry-resource-detector-aws/test/detectors/AwsEksDetector.test.ts index b35be60f479..c6a729315e2 100644 --- a/packages/opentelemetry-resource-detector-aws/test/detectors/AwsEksDetector.test.ts +++ b/packages/opentelemetry-resource-detector-aws/test/detectors/AwsEksDetector.test.ts @@ -34,14 +34,14 @@ describe('awsEksDetector', () => { const errorMsg = { fileNotFoundError: new Error('cannot find cgroup file'), }; - let sandbox: sinon.SinonSandbox; - let readStub, fileStub, getCredStub; const correctCgroupData = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklm'; const mockedClusterResponse = 'my-cluster'; const mockedAwsAuth = 'my-auth'; const k8s_token = 'Bearer 31ada4fd-adec-460c-809a-9e56ceb75269'; + let sandbox: sinon.SinonSandbox; + let readStub, fileStub, getCredStub; beforeEach(() => { sandbox = sinon.createSandbox(); nock.disableNetConnect(); @@ -79,6 +79,9 @@ describe('awsEksDetector', () => { scope.done(); + sandbox.assert.calledOnce(fileStub); + sandbox.assert.calledOnce(readStub); + sandbox.assert.calledOnce(getCredStub); assert.ok(resource); assertK8sResource(resource, { clusterName: 'my-cluster',