Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(node): Implement Sentry-specific http instrumentation #13763

Draft
wants to merge 9 commits into
base: develop
Choose a base branch
from

Conversation

mydea
Copy link
Member

@mydea mydea commented Sep 24, 2024

NOTE: This is currently blocked by nodejs/import-in-the-middle#98

This PR is a pretty big change, but it should help us to make custom OTEL support way better/easier to understand in the future.

The fundamental problem this PR is trying to change is the restriction that we rely on our instance of HttpInstrumentation for Sentry-specific (read: not span-related) things. This made it tricky/annoying for users with a custom OTEL setup that may include HttpInstrumentation to get things working, because they may inadvertedly overwrite our instance of the instrumentation (because there can only be a single monkey-patch per module in the regular instrumentations), leading to hard-to-debug and often subtle problems.

This PR fixes this by splitting out the non-span related http instrumentation code into a new, dedicated SentryHttpInstrumentation, which can be run side-by-side with the OTEL instrumentation (which emits spans, ...).

We make this work by basically implementing our own custom, minimal wrap method instead of using shimmer. This way, OTEL instrumentation cannot identify the wrapped module as wrapped, and allow to wrap it again. While this is slightly hacky and also means you cannot unwrap the http module, we do not generally support this for the Sentry SDK anyhow.

This new Instrumentation does two things:

  1. Handles automatic forking of the isolation scope per incoming request. By using our own code, we can actually make this much nicer, as we do not need to retrospectively update the isolation scope anymore, but instead we can do this properly now.
  2. Emit breadcrumbs for outgoing requests.

With this change, in errors only mode you really do not need our instance of the default HttpInstrumentation anymore at all, you can/should just provide your own if you want to capture http spans in a non-Sentry environment. However, this is sadly a bit tricky, because up to now we forced users in this scenario to still use our Http instance and avoid adding their own (instead we allowed users to pass their Http instrumentation config to our Http integration). This means that if we'd simply stop adding our http instrumentation instance when tracing is disabled, these users would stop getting otel spans as well :/ so we sadly can't change this without a major.

Instead, I re-introduced the spans: false for httpIntegration({ spans: false }). When this is set (which for now is opt-in, but probably should be opt-out in v9) we will only register SentryHttpInstrumentation, not HttpInstrumentation, thus not emitting any spans. Users can add their own instance of HttpInstrumentation if they care.

One semi-related thing that I noticed while looking into this is that we incorrectly emitted node-fetch spans in errors-only mode. This apparently sneaked in when we migrated to the new undici instrumentation. I extracted this out into a dedicated PR too, but the changes are in this too because tests were a bit fucked up otherwise.

On top of #13765

WIP, making sure everything works etc...

@mydea mydea self-assigned this Sep 24, 2024
Copy link
Contributor

github-actions bot commented Sep 24, 2024

size-limit report 📦

Path Size % Change Change
@sentry/browser 22.63 KB - -
@sentry/browser - with treeshaking flags 21.42 KB - -
@sentry/browser (incl. Tracing) 34.86 KB - -
@sentry/browser (incl. Tracing, Replay) 71.36 KB - -
@sentry/browser (incl. Tracing, Replay) - with treeshaking flags 61.79 KB - -
@sentry/browser (incl. Tracing, Replay with Canvas) 75.71 KB - -
@sentry/browser (incl. Tracing, Replay, Feedback) 88.48 KB - -
@sentry/browser (incl. Tracing, Replay, Feedback, metrics) 90.36 KB - -
@sentry/browser (incl. metrics) 26.91 KB - -
@sentry/browser (incl. Feedback) 39.77 KB - -
@sentry/browser (incl. sendFeedback) 27.29 KB - -
@sentry/browser (incl. FeedbackAsync) 32.08 KB - -
@sentry/react 25.38 KB - -
@sentry/react (incl. Tracing) 37.84 KB - -
@sentry/vue 26.8 KB - -
@sentry/vue (incl. Tracing) 36.75 KB - -
@sentry/svelte 22.76 KB - -
CDN Bundle 23.94 KB - -
CDN Bundle (incl. Tracing) 36.63 KB - -
CDN Bundle (incl. Tracing, Replay) 71.13 KB - -
CDN Bundle (incl. Tracing, Replay, Feedback) 76.44 KB - -
CDN Bundle - uncompressed 70.14 KB - -
CDN Bundle (incl. Tracing) - uncompressed 108.6 KB - -
CDN Bundle (incl. Tracing, Replay) - uncompressed 220.48 KB - -
CDN Bundle (incl. Tracing, Replay, Feedback) - uncompressed 233.69 KB - -
@sentry/nextjs (client) 37.8 KB - -
@sentry/sveltekit (client) 35.43 KB - -
@sentry/node 125.28 KB +0.29% +365 B 🔺
@sentry/node - without tracing 94.01 KB +0.47% +450 B 🔺
@sentry/aws-serverless 103.64 KB +0.36% +374 B 🔺

View base workflow run

Copy link

codecov bot commented Sep 24, 2024

❌ 1 Tests Failed:

Tests completed Failed Passed Skipped
624 1 623 29
View the top 1 failed tests by shortest run time
basic.test.ts AWS Serverless SDK sends events in ESM mode
Stack Traces | 2.1s run time
basic.test.ts:5:5 AWS Serverless SDK sends events in ESM mode

To view individual test run time comparison to the main branch, go to the Test Analytics Dashboard

mydea added a commit that referenced this pull request Sep 24, 2024
)

Found this while working on
#13763.

Oops, the node-otel-without-tracing E2E test was not running on CI, we
forgot to add it there - and it was actually failing since we switched
to the new undici instrumentation :O

This PR ensures to add it to CI, and also fixes it. The main change for
this is to ensure we do not emit any spans when tracing is disabled,
while still ensuring that trace propagation works as expected for this
case.

I also pulled some general changes into this, which ensure that we patch
both `http.get` and `http.request` properly.
@timfish
Copy link
Collaborator

timfish commented Sep 26, 2024

v1.11.1 of import-in-the-middle has been released which fixes the multiple-hook-overwrite issue!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants