After deploying function to AWS, seems like Lambda has incorrect IAM policies attached:
AccessDenied: User: arn:aws:sts::085108115628:assumed-role/lambda-dashboard-dev-us-east-1-lambdaRole/lambda-dashboard-dev-main is not authorized to perform: cloudwatch:GetMetricStatistics
at Request.extractError (/var/runtime/node_modules/aws-sdk/lib/protocol/query.js:47:29)
at Request.callListeners (/var/runtime/node_modules/aws-sdk/lib/sequential_executor.js:105:20)
at Request.emit (/var/runtime/node_modules/aws-sdk/lib/sequential_executor.js:77:10)
at Request.emit (/var/runtime/node_modules/aws-sdk/lib/request.js:683:14)
at Request.transition (/var/runtime/node_modules/aws-sdk/lib/request.js:22:10)
at AcceptorStateMachine.runTo (/var/runtime/node_modules/aws-sdk/lib/state_machine.js:14:12)