Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(node): Implement Sentry-specific http instrumentation #13763

Merged
merged 14 commits into from
Oct 11, 2024

Conversation

mydea
Copy link
Member

@mydea mydea commented Sep 24, 2024

This PR is a pretty big change, but it should help us to make custom OTEL support way better/easier to understand in the future.

The fundamental problem this PR is trying to change is the restriction that we rely on our instance of HttpInstrumentation for Sentry-specific (read: not span-related) things. This made it tricky/annoying for users with a custom OTEL setup that may include HttpInstrumentation to get things working, because they may inadvertedly overwrite our instance of the instrumentation (because there can only be a single monkey-patch per module in the regular instrumentations), leading to hard-to-debug and often subtle problems.

This PR fixes this by splitting out the non-span related http instrumentation code into a new, dedicated SentryHttpInstrumentation, which can be run side-by-side with the OTEL instrumentation (which emits spans, ...).

We make this work by basically implementing our own custom, minimal wrap method instead of using shimmer. This way, OTEL instrumentation cannot identify the wrapped module as wrapped, and allow to wrap it again. While this is slightly hacky and also means you cannot unwrap the http module, we do not generally support this for the Sentry SDK anyhow.

This new Instrumentation does two things:

  1. Handles automatic forking of the isolation scope per incoming request. By using our own code, we can actually make this much nicer, as we do not need to retrospectively update the isolation scope anymore, but instead we can do this properly now.
  2. Emit breadcrumbs for outgoing requests.

With this change, in errors only mode you really do not need our instance of the default HttpInstrumentation anymore at all, you can/should just provide your own if you want to capture http spans in a non-Sentry environment. However, this is sadly a bit tricky, because up to now we forced users in this scenario to still use our Http instance and avoid adding their own (instead we allowed users to pass their Http instrumentation config to our Http integration). This means that if we'd simply stop adding our http instrumentation instance when tracing is disabled, these users would stop getting otel spans as well :/ so we sadly can't change this without a major.

Instead, I re-introduced the spans: false for httpIntegration({ spans: false }). When this is set (which for now is opt-in, but probably should be opt-out in v9) we will only register SentryHttpInstrumentation, not HttpInstrumentation, thus not emitting any spans. Users can add their own instance of HttpInstrumentation if they care.

One semi-related thing that I noticed while looking into this is that we incorrectly emitted node-fetch spans in errors-only mode. This apparently sneaked in when we migrated to the new undici instrumentation. I extracted this out into a dedicated PR too, but the changes are in this too because tests were a bit fucked up otherwise.

On top of #13765

This also includes a bump of import-in-the-middle to 1.11.2, as this includes a fix to properly allow double-wrapping ESM modules.

@mydea mydea self-assigned this Sep 24, 2024
Copy link
Contributor

github-actions bot commented Sep 24, 2024

size-limit report 📦

Path Size % Change Change
@sentry/browser 22.73 KB - -
@sentry/browser - with treeshaking flags 21.53 KB - -
@sentry/browser (incl. Tracing) 34.97 KB - -
@sentry/browser (incl. Tracing, Replay) 71.62 KB - -
@sentry/browser (incl. Tracing, Replay) - with treeshaking flags 62.03 KB - -
@sentry/browser (incl. Tracing, Replay with Canvas) 75.97 KB - -
@sentry/browser (incl. Tracing, Replay, Feedback) 88.73 KB - -
@sentry/browser (incl. Tracing, Replay, Feedback, metrics) 90.59 KB - -
@sentry/browser (incl. metrics) 27 KB - -
@sentry/browser (incl. Feedback) 39.87 KB - -
@sentry/browser (incl. sendFeedback) 27.38 KB - -
@sentry/browser (incl. FeedbackAsync) 32.17 KB - -
@sentry/react 25.49 KB - -
@sentry/react (incl. Tracing) 37.94 KB - -
@sentry/vue 26.91 KB - -
@sentry/vue (incl. Tracing) 36.86 KB - -
@sentry/svelte 22.87 KB - -
CDN Bundle 24.05 KB - -
CDN Bundle (incl. Tracing) 36.76 KB - -
CDN Bundle (incl. Tracing, Replay) 71.38 KB - -
CDN Bundle (incl. Tracing, Replay, Feedback) 76.7 KB - -
CDN Bundle - uncompressed 70.53 KB - -
CDN Bundle (incl. Tracing) - uncompressed 109.04 KB - -
CDN Bundle (incl. Tracing, Replay) - uncompressed 221.4 KB - -
CDN Bundle (incl. Tracing, Replay, Feedback) - uncompressed 234.62 KB - -
@sentry/nextjs (client) 37.91 KB - -
@sentry/sveltekit (client) 35.56 KB - -
@sentry/node 124.9 KB +0.32% +404 B 🔺
@sentry/node - without tracing 94.13 KB +0.53% +501 B 🔺
@sentry/aws-serverless 103.7 KB +0.4% +414 B 🔺

View base workflow run

Copy link

codecov bot commented Sep 24, 2024

❌ 1 Tests Failed:

Tests completed Failed Passed Skipped
624 1 623 29
View the top 1 failed tests by shortest run time
basic.test.ts AWS Serverless SDK sends events in ESM mode
Stack Traces | 2.1s run time
basic.test.ts:5:5 AWS Serverless SDK sends events in ESM mode

To view individual test run time comparison to the main branch, go to the Test Analytics Dashboard

mydea added a commit that referenced this pull request Sep 24, 2024
)

Found this while working on
#13763.

Oops, the node-otel-without-tracing E2E test was not running on CI, we
forgot to add it there - and it was actually failing since we switched
to the new undici instrumentation :O

This PR ensures to add it to CI, and also fixes it. The main change for
this is to ensure we do not emit any spans when tracing is disabled,
while still ensuring that trace propagation works as expected for this
case.

I also pulled some general changes into this, which ensure that we patch
both `http.get` and `http.request` properly.
@timfish
Copy link
Collaborator

timfish commented Sep 26, 2024

v1.11.1 of import-in-the-middle has been released which fixes the multiple-hook-overwrite issue!

@@ -14,8 +14,7 @@
},
"devDependencies": {
"@sentry-internal/test-utils": "link:../../../test-utils",
"@playwright/test": "^1.44.1",
"wait-port": "1.0.4"
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

cleaned this up as this is not needed anymore

@@ -18,7 +18,7 @@ test('AWS Serverless SDK sends events in ESM mode', async ({ request }) => {
);

child_process.execSync('pnpm start', {
stdio: 'ignore',
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

was debugging a test here for some time, this made it much easier to debug this

@mydea mydea marked this pull request as ready for review October 8, 2024 12:23
Copy link
Member

@Lms24 Lms24 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks fine to me! I like the idea of having request isolation/our behaviour we add in addition to spans separated.

Copy link
Collaborator

@timfish timfish left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm trying to work out what Node version diagnostics_channel http events were added because they probably make this all possible without touching otel/import-in-the-middle. It has both start and end events for both incoming and outgoing requests.

UPDATE

Yep, just tested and these events are available in v14.17.0

@timfish
Copy link
Collaborator

timfish commented Oct 9, 2024

Let me know if you want me to have a try at reworking this PR with diagnostics_channel events. The main bonus here is that it works even for bundled apps which can break import-in-the-middle.

@mydea
Copy link
Member Author

mydea commented Oct 9, 2024

Thanks for that Tim, I was not aware this was available for Node 14+! I will give it a quick look to see if I can easily use this instead in this PR, if so I'll update it right away. If it is more complex, maybe we merge this and then update it in a follow up :)

@mydea
Copy link
Member Author

mydea commented Oct 11, 2024

So for reference, it is not that easy to move this to diagnostics channel, because there we cannot wrap the incoming request in an easy way to ensure async local storage has the correct isolation scope etc.

So I'm going to merge this like this, we can investigate in a follow up if we can refactor it!

@@ -25,6 +10,7 @@ type HttpOptions = Parameters<typeof originalHttpIntegration>[0];
export const httpIntegration = ((options: HttpOptions = {}) => {
return originalHttpIntegration({
...options,
_instrumentation: RemixHttpIntegration,
// We disable incoming request spans here, because otherwise we'd end up with duplicate spans.
disableIncomingRequestSpans: true,
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

cc @lforst also relevant for Next after we merge this

@mydea mydea merged commit 5d5e2f4 into develop Oct 11, 2024
147 checks passed
@mydea mydea deleted the fn/custom-http-shim branch October 11, 2024 11:02
lforst added a commit that referenced this pull request Oct 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants