-
Notifications
You must be signed in to change notification settings - Fork 459
/
Copy pathoption.go
1610 lines (1424 loc) · 56.5 KB
/
option.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
// Unless explicitly stated otherwise all files in this repository are licensed
// under the Apache License Version 2.0.
// This product includes software developed at Datadog (https://www.datadoghq.com/).
// Copyright 2016 Datadog, Inc.
package tracer
import (
"context"
"encoding/json"
"fmt"
"io"
"math"
"net"
"net/http"
"net/url"
"os"
"path/filepath"
"runtime"
"runtime/debug"
"strconv"
"strings"
"sync"
"time"
"golang.org/x/mod/semver"
pb "github.com/DataDog/datadog-agent/pkg/proto/pbgo/trace"
"github.com/DataDog/dd-trace-go/v2/ddtrace/ext"
"github.com/DataDog/dd-trace-go/v2/internal"
appsecconfig "github.com/DataDog/dd-trace-go/v2/internal/appsec/config"
"github.com/DataDog/dd-trace-go/v2/internal/civisibility/constants"
"github.com/DataDog/dd-trace-go/v2/internal/globalconfig"
"github.com/DataDog/dd-trace-go/v2/internal/log"
"github.com/DataDog/dd-trace-go/v2/internal/namingschema"
"github.com/DataDog/dd-trace-go/v2/internal/normalizer"
"github.com/DataDog/dd-trace-go/v2/internal/telemetry"
"github.com/DataDog/dd-trace-go/v2/internal/traceprof"
"github.com/DataDog/dd-trace-go/v2/internal/version"
"github.com/tinylib/msgp/msgp"
"github.com/DataDog/datadog-go/v5/statsd"
)
var contribIntegrations = map[string]struct {
name string // user readable name for startup logs
imported bool // true if the user has imported the integration
}{
"github.com/99designs/gqlgen": {"gqlgen", false},
"github.com/aws/aws-sdk-go": {"AWS SDK", false},
"github.com/aws/aws-sdk-go-v2": {"AWS SDK v2", false},
"github.com/bradfitz/gomemcache": {"Memcache", false},
"cloud.google.com/go/pubsub.v1": {"Pub/Sub", false},
"github.com/confluentinc/confluent-kafka-go": {"Kafka (confluent)", false},
"github.com/confluentinc/confluent-kafka-go/v2": {"Kafka (confluent) v2", false},
"database/sql": {"SQL", false},
"github.com/dimfeld/httptreemux/v5": {"HTTP Treemux", false},
"github.com/elastic/go-elasticsearch/v6": {"Elasticsearch v6", false},
"github.com/emicklei/go-restful/v3": {"go-restful v3", false},
"github.com/gin-gonic/gin": {"Gin", false},
"github.com/globalsign/mgo": {"MongoDB (mgo)", false},
"github.com/go-chi/chi": {"chi", false},
"github.com/go-chi/chi/v5": {"chi v5", false},
"github.com/go-pg/pg/v10": {"go-pg v10", false},
"github.com/go-redis/redis": {"Redis", false},
"github.com/go-redis/redis/v7": {"Redis v7", false},
"github.com/go-redis/redis/v8": {"Redis v8", false},
"go.mongodb.org/mongo-driver": {"MongoDB", false},
"github.com/gocql/gocql": {"Cassandra", false},
"github.com/gofiber/fiber/v2": {"Fiber", false},
"github.com/gomodule/redigo": {"Redigo", false},
"google.golang.org/api": {"Google API", false},
"google.golang.org/grpc": {"gRPC", false},
"github.com/gorilla/mux": {"Gorilla Mux", false},
"gorm.io/gorm.v1": {"Gorm v1", false},
"github.com/graph-gophers/graphql-go": {"Graph Gophers GraphQL", false},
"github.com/graphql-go/graphql": {"GraphQL-Go GraphQL", false},
"github.com/hashicorp/consul/api": {"Consul", false},
"github.com/hashicorp/vault/api": {"Vault", false},
"github.com/jackc/pgx/v5": {"PGX", false},
"github.com/jmoiron/sqlx": {"SQLx", false},
"github.com/julienschmidt/httprouter": {"HTTP Router", false},
"k8s.io/client-go/kubernetes": {"Kubernetes", false},
"github.com/labstack/echo/v4": {"echo v4", false},
"log/slog": {"log/slog", false},
"github.com/miekg/dns": {"miekg/dns", false},
"net/http": {"HTTP", false},
"gopkg.in/olivere/elastic.v5": {"Elasticsearch v5", false},
"github.com/redis/go-redis/v9": {"Redis v9", false},
"github.com/redis/rueidis": {"Rueidis", false},
"github.com/segmentio/kafka-go": {"Kafka v0", false},
"github.com/IBM/sarama": {"IBM sarama", false},
"github.com/Shopify/sarama": {"Shopify sarama", false},
"github.com/sirupsen/logrus": {"Logrus", false},
"github.com/syndtr/goleveldb": {"LevelDB", false},
"github.com/tidwall/buntdb": {"BuntDB", false},
"github.com/twitchtv/twirp": {"Twirp", false},
"github.com/uptrace/bun": {"Bun", false},
"github.com/urfave/negroni": {"Negroni", false},
"github.com/valyala/fasthttp": {"FastHTTP", false},
"github.com/valkey-io/valkey-go": {"Valkey", false},
}
var (
// defaultSocketDSD specifies the socket path to use for connecting to the statsd server.
// Replaced in tests
defaultSocketDSD = "/var/run/datadog/dsd.socket"
// defaultStatsdPort specifies the default port to use for connecting to the statsd server.
defaultStatsdPort = "8125"
// defaultMaxTagsHeaderLen specifies the default maximum length of the X-Datadog-Tags header value.
defaultMaxTagsHeaderLen = 128
// defaultRateLimit specifies the default trace rate limit used when DD_TRACE_RATE_LIMIT is not set.
defaultRateLimit = 100.0
)
// config holds the tracer configuration.
type config struct {
// debug, when true, writes details to logs.
debug bool
// appsecStartOptions controls the options used when starting appsec features.
appsecStartOptions []appsecconfig.StartOption
// agent holds the capabilities of the agent and determines some
// of the behaviour of the tracer.
agent agentFeatures
// integrations reports if the user has instrumented a Datadog integration and
// if they have a version of the library available to integrate.
integrations map[string]integrationConfig
// featureFlags specifies any enabled feature flags.
featureFlags map[string]struct{}
// logToStdout reports whether we should log all traces to the standard
// output instead of using the agent. This is used in Lambda environments.
logToStdout bool
// sendRetries is the number of times a trace or CI Visibility payload send is retried upon
// failure.
sendRetries int
// retryInterval is the interval between agent connection retries. It has no effect if sendRetries is not set
retryInterval time.Duration
// logStartup, when true, causes various startup info to be written
// when the tracer starts.
logStartup bool
// serviceName specifies the name of this application.
serviceName string
// universalVersion, reports whether span service name and config service name
// should match to set application version tag. False by default
universalVersion bool
// version specifies the version of this application
version string
// env contains the environment that this application will run under.
env string
// sampler specifies the sampler that will be used for sampling traces.
sampler RateSampler
// agentURL is the agent URL that receives traces from the tracer.
agentURL *url.URL
// originalAgentURL is the agent URL that receives traces from the tracer and does not get changed.
originalAgentURL *url.URL
// serviceMappings holds a set of service mappings to dynamically rename services
serviceMappings map[string]string
// globalTags holds a set of tags that will be automatically applied to
// all spans.
globalTags dynamicConfig[map[string]interface{}]
// transport specifies the Transport interface which will be used to send data to the agent.
transport transport
// httpClientTimeout specifies the timeout for the HTTP client.
httpClientTimeout time.Duration
// propagator propagates span context cross-process
propagator Propagator
// httpClient specifies the HTTP client to be used by the agent's transport.
httpClient *http.Client
// hostname is automatically assigned when the DD_TRACE_REPORT_HOSTNAME is set to true,
// and is added as a special tag to the root span of traces.
hostname string
// logger specifies the logger to use when printing errors. If not specified, the "log" package
// will be used.
logger Logger
// runtimeMetrics specifies whether collection of runtime metrics is enabled.
runtimeMetrics bool
// runtimeMetricsV2 specifies whether collection of runtime metrics v2 is enabled.
runtimeMetricsV2 bool
// dogstatsdAddr specifies the address to connect for sending metrics to the
// Datadog Agent. If not set, it defaults to "localhost:8125" or to the
// combination of the environment variables DD_AGENT_HOST and DD_DOGSTATSD_PORT.
dogstatsdAddr string
// statsdClient is set when a user provides a custom statsd client for tracking metrics
// associated with the runtime and the tracer.
statsdClient internal.StatsdClient
// spanRules contains user-defined rules to determine the sampling rate to apply
// to a single span without affecting the entire trace
spanRules []SamplingRule
// traceRules contains user-defined rules to determine the sampling rate to apply
// to the entire trace if any spans satisfy the criteria
traceRules []SamplingRule
// tickChan specifies a channel which will receive the time every time the tracer must flush.
// It defaults to time.Ticker; replaced in tests.
tickChan <-chan time.Time
// noDebugStack disables the collection of debug stack traces globally. No traces reporting
// errors will record a stack trace when this option is set.
noDebugStack bool
// profilerHotspots specifies whether profiler Code Hotspots is enabled.
profilerHotspots bool
// profilerEndpoints specifies whether profiler endpoint filtering is enabled.
profilerEndpoints bool
// enabled reports whether tracing is enabled.
enabled dynamicConfig[bool]
// enableHostnameDetection specifies whether the tracer should enable hostname detection.
enableHostnameDetection bool
// spanAttributeSchemaVersion holds the selected DD_TRACE_SPAN_ATTRIBUTE_SCHEMA version.
spanAttributeSchemaVersion int
// peerServiceDefaultsEnabled indicates whether the peer.service tag calculation is enabled or not.
peerServiceDefaultsEnabled bool
// peerServiceMappings holds a set of service mappings to dynamically rename peer.service values.
peerServiceMappings map[string]string
// debugAbandonedSpans controls if the tracer should log when old, open spans are found
debugAbandonedSpans bool
// spanTimeout represents how old a span can be before it should be logged as a possible
// misconfiguration
spanTimeout time.Duration
// partialFlushMinSpans is the number of finished spans in a single trace to trigger a
// partial flush, or 0 if partial flushing is disabled.
// Value from DD_TRACE_PARTIAL_FLUSH_MIN_SPANS, default 1000.
partialFlushMinSpans int
// partialFlushEnabled specifices whether the tracer should enable partial flushing. Value
// from DD_TRACE_PARTIAL_FLUSH_ENABLED, default false.
partialFlushEnabled bool
// statsComputationEnabled enables client-side stats computation (aka trace metrics).
statsComputationEnabled bool
// dataStreamsMonitoringEnabled specifies whether the tracer should enable monitoring of data streams
dataStreamsMonitoringEnabled bool
// orchestrionCfg holds Orchestrion (aka auto-instrumentation) configuration.
// Only used for telemetry currently.
orchestrionCfg orchestrionConfig
// traceSampleRate holds the trace sample rate.
traceSampleRate dynamicConfig[float64]
// traceSampleRules holds the trace sampling rules
traceSampleRules dynamicConfig[[]SamplingRule]
// headerAsTags holds the header as tags configuration.
headerAsTags dynamicConfig[[]string]
// dynamicInstrumentationEnabled controls if the target application can be modified by Dynamic Instrumentation or not.
// Value from DD_DYNAMIC_INSTRUMENTATION_ENABLED, default false.
dynamicInstrumentationEnabled bool
// globalSampleRate holds sample rate read from environment variables.
globalSampleRate float64
// ciVisibilityEnabled controls if the tracer is loaded with CI Visibility mode. default false
ciVisibilityEnabled bool
// ciVisibilityAgentless controls if the tracer is loaded with CI Visibility agentless mode. default false
ciVisibilityAgentless bool
// logDirectory is directory for tracer logs specified by user-setting DD_TRACE_LOG_DIRECTORY. default empty/unused
logDirectory string
// tracingAsTransport specifies whether the tracer is running in transport-only mode, where traces are only sent when other products request it.
tracingAsTransport bool
// traceRateLimitPerSecond specifies the rate limit for traces.
traceRateLimitPerSecond float64
}
// orchestrionConfig contains Orchestrion configuration.
type (
orchestrionConfig struct {
// Enabled indicates whether this tracer was instanciated via Orchestrion.
Enabled bool `json:"enabled"`
// Metadata holds Orchestrion specific metadata (e.g orchestrion version, mode (toolexec or manual) etc..)
Metadata *orchestrionMetadata `json:"metadata,omitempty"`
}
orchestrionMetadata struct {
// Version is the version of the orchestrion tool that was used to instrument the application.
Version string `json:"version,omitempty"`
}
)
// HasFeature reports whether feature f is enabled.
func (c *config) HasFeature(f string) bool {
_, ok := c.featureFlags[strings.TrimSpace(f)]
return ok
}
// StartOption represents a function that can be provided as a parameter to Start.
type StartOption func(*config)
// maxPropagatedTagsLength limits the size of DD_TRACE_X_DATADOG_TAGS_MAX_LENGTH to prevent HTTP 413 responses.
const maxPropagatedTagsLength = 512
// partialFlushMinSpansDefault is the default number of spans for partial flushing, if enabled.
const partialFlushMinSpansDefault = 1000
// newConfig renders the tracer configuration based on defaults, environment variables
// and passed user opts.
func newConfig(opts ...StartOption) (*config, error) {
c := new(config)
c.sampler = NewAllSampler()
sampleRate := math.NaN()
if r := getDDorOtelConfig("sampleRate"); r != "" {
var err error
sampleRate, err = strconv.ParseFloat(r, 64)
if err != nil {
log.Warn("ignoring DD_TRACE_SAMPLE_RATE, error: %v", err)
sampleRate = math.NaN()
} else if sampleRate < 0.0 || sampleRate > 1.0 {
log.Warn("ignoring DD_TRACE_SAMPLE_RATE: out of range %f", sampleRate)
sampleRate = math.NaN()
}
}
c.globalSampleRate = sampleRate
c.httpClientTimeout = time.Second * 10 // 10 seconds
c.traceRateLimitPerSecond = defaultRateLimit
origin := telemetry.OriginDefault
if v, ok := os.LookupEnv("DD_TRACE_RATE_LIMIT"); ok {
l, err := strconv.ParseFloat(v, 64)
if err != nil {
log.Warn("DD_TRACE_RATE_LIMIT invalid, using default value %f: %v", defaultRateLimit, err)
} else if l < 0.0 {
log.Warn("DD_TRACE_RATE_LIMIT negative, using default value %f", defaultRateLimit)
} else {
c.traceRateLimitPerSecond = l
origin = telemetry.OriginEnvVar
}
}
reportTelemetryOnAppStarted(telemetry.Configuration{Name: "trace_rate_limit", Value: c.traceRateLimitPerSecond, Origin: origin})
if v := os.Getenv("OTEL_LOGS_EXPORTER"); v != "" {
log.Warn("OTEL_LOGS_EXPORTER is not supported")
}
if internal.BoolEnv("DD_TRACE_ANALYTICS_ENABLED", false) {
globalconfig.SetAnalyticsRate(1.0)
}
if os.Getenv("DD_TRACE_REPORT_HOSTNAME") == "true" {
var err error
c.hostname, err = os.Hostname()
if err != nil {
log.Warn("unable to look up hostname: %v", err)
return c, fmt.Errorf("unable to look up hostnamet: %v", err)
}
}
if v := os.Getenv("DD_TRACE_SOURCE_HOSTNAME"); v != "" {
c.hostname = v
}
if v := os.Getenv("DD_ENV"); v != "" {
c.env = v
}
if v := os.Getenv("DD_TRACE_FEATURES"); v != "" {
WithFeatureFlags(strings.FieldsFunc(v, func(r rune) bool {
return r == ',' || r == ' '
})...)(c)
}
if v := getDDorOtelConfig("service"); v != "" {
c.serviceName = v
globalconfig.SetServiceName(v)
}
if ver := os.Getenv("DD_VERSION"); ver != "" {
c.version = ver
}
if v := os.Getenv("DD_SERVICE_MAPPING"); v != "" {
internal.ForEachStringTag(v, internal.DDTagsDelimiter, func(key, val string) { WithServiceMapping(key, val)(c) })
}
c.headerAsTags = newDynamicConfig("trace_header_tags", nil, setHeaderTags, equalSlice[string])
if v := os.Getenv("DD_TRACE_HEADER_TAGS"); v != "" {
c.headerAsTags.update(strings.Split(v, ","), telemetry.OriginEnvVar)
// Required to ensure that the startup header tags are set on reset.
c.headerAsTags.startup = c.headerAsTags.current
}
if v := getDDorOtelConfig("resourceAttributes"); v != "" {
tags := internal.ParseTagString(v)
internal.CleanGitMetadataTags(tags)
for key, val := range tags {
WithGlobalTag(key, val)(c)
}
// TODO: should we track the origin of these tags individually?
c.globalTags.cfgOrigin = telemetry.OriginEnvVar
}
if _, ok := os.LookupEnv("AWS_LAMBDA_FUNCTION_NAME"); ok {
// AWS_LAMBDA_FUNCTION_NAME being set indicates that we're running in an AWS Lambda environment.
// See: https://docs.aws.amazon.com/lambda/latest/dg/configuration-envvars.html
c.logToStdout = true
}
c.logStartup = internal.BoolEnv("DD_TRACE_STARTUP_LOGS", true)
c.runtimeMetrics = internal.BoolVal(getDDorOtelConfig("metrics"), false)
c.runtimeMetricsV2 = internal.BoolEnv("DD_RUNTIME_METRICS_V2_ENABLED", false)
c.debug = internal.BoolVal(getDDorOtelConfig("debugMode"), false)
c.logDirectory = os.Getenv("DD_TRACE_LOG_DIRECTORY")
c.enabled = newDynamicConfig("tracing_enabled", internal.BoolVal(getDDorOtelConfig("enabled"), true), func(_ bool) bool { return true }, equal[bool])
if _, ok := os.LookupEnv("DD_TRACE_ENABLED"); ok {
c.enabled.cfgOrigin = telemetry.OriginEnvVar
}
c.profilerEndpoints = internal.BoolEnv(traceprof.EndpointEnvVar, true)
c.profilerHotspots = internal.BoolEnv(traceprof.CodeHotspotsEnvVar, true)
if compatMode := os.Getenv("DD_TRACE_CLIENT_HOSTNAME_COMPAT"); compatMode != "" {
if semver.IsValid(compatMode) {
c.enableHostnameDetection = semver.Compare(semver.MajorMinor(compatMode), "v1.66") <= 0
} else {
log.Warn("ignoring DD_TRACE_CLIENT_HOSTNAME_COMPAT, invalid version %q", compatMode)
}
}
c.debugAbandonedSpans = internal.BoolEnv("DD_TRACE_DEBUG_ABANDONED_SPANS", false)
if c.debugAbandonedSpans {
c.spanTimeout = internal.DurationEnv("DD_TRACE_ABANDONED_SPAN_TIMEOUT", 10*time.Minute)
}
c.statsComputationEnabled = internal.BoolEnv("DD_TRACE_STATS_COMPUTATION_ENABLED", false)
c.dataStreamsMonitoringEnabled = internal.BoolEnv("DD_DATA_STREAMS_ENABLED", false)
c.partialFlushEnabled = internal.BoolEnv("DD_TRACE_PARTIAL_FLUSH_ENABLED", false)
c.partialFlushMinSpans = internal.IntEnv("DD_TRACE_PARTIAL_FLUSH_MIN_SPANS", partialFlushMinSpansDefault)
if c.partialFlushMinSpans <= 0 {
log.Warn("DD_TRACE_PARTIAL_FLUSH_MIN_SPANS=%d is not a valid value, setting to default %d", c.partialFlushMinSpans, partialFlushMinSpansDefault)
c.partialFlushMinSpans = partialFlushMinSpansDefault
} else if c.partialFlushMinSpans >= traceMaxSize {
log.Warn("DD_TRACE_PARTIAL_FLUSH_MIN_SPANS=%d is above the max number of spans that can be kept in memory for a single trace (%d spans), so partial flushing will never trigger, setting to default %d", c.partialFlushMinSpans, traceMaxSize, partialFlushMinSpansDefault)
c.partialFlushMinSpans = partialFlushMinSpansDefault
}
// TODO(partialFlush): consider logging a warning if DD_TRACE_PARTIAL_FLUSH_MIN_SPANS
// is set, but DD_TRACE_PARTIAL_FLUSH_ENABLED is not true. Or just assume it should be enabled
// if it's explicitly set, and don't require both variables to be configured.
c.dynamicInstrumentationEnabled = internal.BoolEnv("DD_DYNAMIC_INSTRUMENTATION_ENABLED", false)
schemaVersionStr := os.Getenv("DD_TRACE_SPAN_ATTRIBUTE_SCHEMA")
if v, ok := namingschema.ParseVersion(schemaVersionStr); ok {
namingschema.SetVersion(v)
c.spanAttributeSchemaVersion = int(v)
} else {
v := namingschema.SetDefaultVersion()
c.spanAttributeSchemaVersion = int(v)
log.Warn("DD_TRACE_SPAN_ATTRIBUTE_SCHEMA=%s is not a valid value, setting to default of v%d", schemaVersionStr, v)
}
// Allow DD_TRACE_SPAN_ATTRIBUTE_SCHEMA=v0 users to disable default integration (contrib AKA v0) service names.
// These default service names are always disabled for v1 onwards.
namingschema.SetUseGlobalServiceName(internal.BoolEnv("DD_TRACE_REMOVE_INTEGRATION_SERVICE_NAMES_ENABLED", false))
// peer.service tag default calculation is enabled by default if using attribute schema >= 1
c.peerServiceDefaultsEnabled = true
if c.spanAttributeSchemaVersion == int(namingschema.SchemaV0) {
c.peerServiceDefaultsEnabled = internal.BoolEnv("DD_TRACE_PEER_SERVICE_DEFAULTS_ENABLED", false)
}
c.peerServiceMappings = make(map[string]string)
if v := os.Getenv("DD_TRACE_PEER_SERVICE_MAPPING"); v != "" {
internal.ForEachStringTag(v, internal.DDTagsDelimiter, func(key, val string) { c.peerServiceMappings[key] = val })
}
c.retryInterval = time.Millisecond
for _, fn := range opts {
if fn == nil {
continue
}
fn(c)
}
if c.agentURL == nil {
c.agentURL = internal.AgentURLFromEnv()
}
c.originalAgentURL = c.agentURL // Preserve the original agent URL for logging
if c.httpClient == nil {
if c.agentURL.Scheme == "unix" {
// If we're connecting over UDS we can just rely on the agent to provide the hostname
log.Debug("connecting to agent over unix, do not set hostname on any traces")
c.httpClient = udsClient(c.agentURL.Path, c.httpClientTimeout)
c.agentURL = &url.URL{
Scheme: "http",
Host: fmt.Sprintf("UDS_%s", strings.NewReplacer(":", "_", "/", "_", `\`, "_").Replace(c.agentURL.Path)),
}
} else {
c.httpClient = defaultHTTPClient(c.httpClientTimeout)
}
}
WithGlobalTag(ext.RuntimeID, globalconfig.RuntimeID())(c)
globalTags := c.globalTags.get()
if c.env == "" {
if v, ok := globalTags["env"]; ok {
if e, ok := v.(string); ok {
c.env = e
}
}
}
if c.version == "" {
if v, ok := globalTags["version"]; ok {
if ver, ok := v.(string); ok {
c.version = ver
}
}
}
if c.serviceName == "" {
if v, ok := globalTags["service"]; ok {
if s, ok := v.(string); ok {
c.serviceName = s
globalconfig.SetServiceName(s)
}
} else {
// There is not an explicit service set, default to binary name.
// In this case, don't set a global service name so the contribs continue using their defaults.
c.serviceName = filepath.Base(os.Args[0])
}
}
if c.transport == nil {
c.transport = newHTTPTransport(c.agentURL.String(), c.httpClient)
}
if c.propagator == nil {
envKey := "DD_TRACE_X_DATADOG_TAGS_MAX_LENGTH"
max := internal.IntEnv(envKey, defaultMaxTagsHeaderLen)
if max < 0 {
log.Warn("Invalid value %d for %s. Setting to 0.", max, envKey)
max = 0
}
if max > maxPropagatedTagsLength {
log.Warn("Invalid value %d for %s. Maximum allowed is %d. Setting to %d.", max, envKey, maxPropagatedTagsLength, maxPropagatedTagsLength)
max = maxPropagatedTagsLength
}
c.propagator = NewPropagator(&PropagatorConfig{
MaxTagsHeaderLen: max,
})
}
if c.logger != nil {
log.UseLogger(c.logger)
}
if c.debug {
log.SetLevel(log.LevelDebug)
}
// Check if CI Visibility mode is enabled
if internal.BoolEnv(constants.CIVisibilityEnabledEnvironmentVariable, false) {
c.ciVisibilityEnabled = true // Enable CI Visibility mode
c.httpClientTimeout = time.Second * 45 // Increase timeout up to 45 seconds (same as other tracers in CIVis mode)
c.logStartup = false // If we are in CI Visibility mode we don't want to log the startup to stdout to avoid polluting the output
ciTransport := newCiVisibilityTransport(c) // Create a default CI Visibility Transport
c.transport = ciTransport // Replace the default transport with the CI Visibility transport
c.ciVisibilityAgentless = ciTransport.agentless
}
// if using stdout or traces are disabled or we are in ci visibility agentless mode, agent is disabled
agentDisabled := c.logToStdout || !c.enabled.current || c.ciVisibilityAgentless
c.agent = loadAgentFeatures(agentDisabled, c.agentURL, c.httpClient)
info, ok := debug.ReadBuildInfo()
if !ok {
c.loadContribIntegrations([]*debug.Module{})
} else {
c.loadContribIntegrations(info.Deps)
}
if c.statsdClient == nil {
// configure statsd client
addr := resolveDogstatsdAddr(c)
globalconfig.SetDogstatsdAddr(addr)
c.dogstatsdAddr = addr
}
// Re-initialize the globalTags config with the value constructed from the environment and start options
// This allows persisting the initial value of globalTags for future resets and updates.
globalTagsOrigin := c.globalTags.cfgOrigin
c.initGlobalTags(c.globalTags.get(), globalTagsOrigin)
if !internal.BoolEnv("DD_APM_TRACING_ENABLED", true) {
// Enable tracing as transport layer mode
// This means to stop sending trace metrics, send one trace per minute and those force-kept by other products
// using the tracer as transport layer for their data. And finally adding the _dd.apm.enabled=0 tag to all traces
// to let the backend know that it needs to keep APM UI disabled.
c.globalSampleRate = 1.0
c.traceRateLimitPerSecond = 1.0 / 60
c.tracingAsTransport = true
WithGlobalTag("_dd.apm.enabled", 0)(c)
// Disable runtime metrics. In `tracingAsTransport` mode, we'll still
// tell the agent we computed them, so it doesn't do it either.
c.runtimeMetrics = false
c.runtimeMetricsV2 = false
}
return c, nil
}
// resolveDogstatsdAddr resolves the Dogstatsd address to use, based on the user-defined
// address and the agent-reported port. If the agent reports a port, it will be used
// instead of the user-defined address' port. UDS paths are honored regardless of the
// agent-reported port.
func resolveDogstatsdAddr(c *config) string {
addr := c.dogstatsdAddr
if addr == "" {
// no config defined address; use host and port from env vars
// or default to localhost:8125 if not set
addr = defaultDogstatsdAddr()
}
agentport := c.agent.StatsdPort
if agentport == 0 {
// the agent didn't report a port; use the already resolved address as
// features are loaded from the trace-agent, which might be not running
return addr
}
// the agent reported a port
host, _, err := net.SplitHostPort(addr)
if err != nil {
// parsing the address failed; use the already resolved address as is
return addr
}
if host == "unix" {
// no need to change the address because it's a UDS connection
// and these don't have ports
return addr
}
if host == "" {
// no host was provided; use the default hostname
host = defaultHostname
}
// use agent-reported address if it differs from the user-defined TCP-based protocol URI
// we have a valid host:port address; replace the port because the agent knows better
addr = net.JoinHostPort(host, strconv.Itoa(agentport))
return addr
}
func newStatsdClient(c *config) (internal.StatsdClient, error) {
if c.statsdClient != nil {
return c.statsdClient, nil
}
return internal.NewStatsdClient(c.dogstatsdAddr, statsTags(c))
}
// udsClient returns a new http.Client which connects using the given UDS socket path.
func udsClient(socketPath string, timeout time.Duration) *http.Client {
if timeout == 0 {
timeout = defaultHTTPTimeout
}
return &http.Client{
Transport: &http.Transport{
Proxy: http.ProxyFromEnvironment,
DialContext: func(ctx context.Context, _, _ string) (net.Conn, error) {
return defaultDialer.DialContext(ctx, "unix", (&net.UnixAddr{
Name: socketPath,
Net: "unix",
}).String())
},
MaxIdleConns: 100,
IdleConnTimeout: 90 * time.Second,
TLSHandshakeTimeout: 10 * time.Second,
ExpectContinueTimeout: 1 * time.Second,
},
Timeout: timeout,
}
}
// defaultDogstatsdAddr returns the default connection address for Dogstatsd.
func defaultDogstatsdAddr() string {
envHost, envPort := os.Getenv("DD_DOGSTATSD_HOST"), os.Getenv("DD_DOGSTATSD_PORT")
if envHost == "" {
envHost = os.Getenv("DD_AGENT_HOST")
}
if _, err := os.Stat(defaultSocketDSD); err == nil && envHost == "" && envPort == "" {
// socket exists and user didn't specify otherwise via env vars
return "unix://" + defaultSocketDSD
}
host, port := defaultHostname, defaultStatsdPort
if envHost != "" {
host = envHost
}
if envPort != "" {
port = envPort
}
return net.JoinHostPort(host, port)
}
type integrationConfig struct {
Instrumented bool `json:"instrumented"` // indicates if the user has imported and used the integration
Available bool `json:"available"` // indicates if the user is using a library that can be used with DataDog integrations
Version string `json:"available_version"` // if available, indicates the version of the library the user has
}
// agentFeatures holds information about the trace-agent's capabilities.
// When running WithLambdaMode, a zero-value of this struct will be used
// as features.
type agentFeatures struct {
// DropP0s reports whether it's ok for the tracer to not send any
// P0 traces to the agent.
DropP0s bool
// Stats reports whether the agent can receive client-computed stats on
// the /v0.6/stats endpoint.
Stats bool
// StatsdPort specifies the Dogstatsd port as provided by the agent.
// If it's the default, it will be 0, which means 8125.
StatsdPort int
// featureFlags specifies all the feature flags reported by the trace-agent.
featureFlags map[string]struct{}
// peerTags specifies precursor tags to aggregate stats on when client stats is enabled
peerTags []string
// defaultEnv is the trace-agent's default env, used for stats calculation if no env override is present
defaultEnv string
// metaStructAvailable reports whether the trace-agent can receive spans with the `meta_struct` field.
metaStructAvailable bool
// obfuscationVersion reports the trace-agent's version of obfuscation logic. A value of 0 means this field wasn't present.
obfuscationVersion int
// spanEvents reports whether the trace-agent can receive spans with the `span_events` field.
spanEventsAvailable bool
}
// HasFlag reports whether the agent has set the feat feature flag.
func (a *agentFeatures) HasFlag(feat string) bool {
_, ok := a.featureFlags[feat]
return ok
}
// loadAgentFeatures queries the trace-agent for its capabilities and updates
// the tracer's behaviour.
func loadAgentFeatures(agentDisabled bool, agentURL *url.URL, httpClient *http.Client) (features agentFeatures) {
if agentDisabled {
// there is no agent; all features off
return
}
resp, err := httpClient.Get(fmt.Sprintf("%s/info", agentURL))
if err != nil {
log.Error("Loading features: %v", err)
return
}
if resp.StatusCode == http.StatusNotFound {
// agent is older than 7.28.0, features not discoverable
return
}
defer resp.Body.Close()
type infoResponse struct {
Endpoints []string `json:"endpoints"`
ClientDropP0s bool `json:"client_drop_p0s"`
FeatureFlags []string `json:"feature_flags"`
PeerTags []string `json:"peer_tags"`
SpanMetaStruct bool `json:"span_meta_structs"`
ObfuscationVersion int `json:"obfuscation_version"`
SpanEvents bool `json:"span_events"`
Config struct {
StatsdPort int `json:"statsd_port"`
} `json:"config"`
}
var info infoResponse
if err := json.NewDecoder(resp.Body).Decode(&info); err != nil {
log.Error("Decoding features: %v", err)
return
}
features.DropP0s = info.ClientDropP0s
features.StatsdPort = info.Config.StatsdPort
features.metaStructAvailable = info.SpanMetaStruct
features.peerTags = info.PeerTags
features.obfuscationVersion = info.ObfuscationVersion
features.spanEventsAvailable = info.SpanEvents
for _, endpoint := range info.Endpoints {
switch endpoint {
case "/v0.6/stats":
features.Stats = true
}
}
features.featureFlags = make(map[string]struct{}, len(info.FeatureFlags))
for _, flag := range info.FeatureFlags {
features.featureFlags[flag] = struct{}{}
}
return features
}
// MarkIntegrationImported labels the given integration as imported
func MarkIntegrationImported(integration string) bool {
s, ok := contribIntegrations[integration]
if !ok {
return false
}
s.imported = true
contribIntegrations[integration] = s
return true
}
func (c *config) loadContribIntegrations(deps []*debug.Module) {
integrations := map[string]integrationConfig{}
for _, s := range contribIntegrations {
integrations[s.name] = integrationConfig{
Instrumented: s.imported,
}
}
for _, d := range deps {
p := d.Path
s, ok := contribIntegrations[p]
if !ok {
continue
}
conf := integrations[s.name]
conf.Available = true
conf.Version = d.Version
integrations[s.name] = conf
}
c.integrations = integrations
}
func (c *config) canComputeStats() bool {
return c.agent.Stats && (c.HasFeature("discovery") || c.statsComputationEnabled)
}
func (c *config) canDropP0s() bool {
return c.canComputeStats() && c.agent.DropP0s
}
func statsTags(c *config) []string {
tags := []string{
"lang:go",
"lang_version:" + runtime.Version(),
}
if c.env != "" {
tags = append(tags, "env:"+c.env)
}
if c.hostname != "" {
tags = append(tags, "host:"+c.hostname)
}
for k, v := range c.globalTags.get() {
if vstr, ok := v.(string); ok {
tags = append(tags, k+":"+vstr)
}
}
globalconfig.SetStatsTags(tags)
tags = append(tags, "tracer_version:"+version.Tag)
if c.serviceName != "" {
tags = append(tags, "service:"+c.serviceName)
}
return tags
}
// withNoopStats is used for testing to disable statsd client
func withNoopStats() StartOption {
return func(c *config) {
c.statsdClient = &statsd.NoOpClientDirect{}
}
}
// WithAppSecEnabled specifies whether AppSec features should be activated
// or not.
//
// By default, AppSec features are enabled if `DD_APPSEC_ENABLED` is set to a
// truthy value; and may be enabled by remote configuration if
// `DD_APPSEC_ENABLED` is not set at all.
//
// Using this option to explicitly disable appsec also prevents it from being
// remote activated.
func WithAppSecEnabled(enabled bool) StartOption {
mode := appsecconfig.ForcedOff
if enabled {
mode = appsecconfig.ForcedOn
}
return func(c *config) {
c.appsecStartOptions = append(c.appsecStartOptions, appsecconfig.WithEnablementMode(mode))
}
}
// WithFeatureFlags specifies a set of feature flags to enable. Please take into account
// that most, if not all features flags are considered to be experimental and result in
// unexpected bugs.
func WithFeatureFlags(feats ...string) StartOption {
return func(c *config) {
if c.featureFlags == nil {
c.featureFlags = make(map[string]struct{}, len(feats))
}
for _, f := range feats {
c.featureFlags[strings.TrimSpace(f)] = struct{}{}
}
log.Info("FEATURES enabled: %v", feats)
}
}
// WithLogger sets logger as the tracer's error printer.
// Diagnostic and startup tracer logs are prefixed to simplify the search within logs.
// If JSON logging format is required, it's possible to wrap tracer logs using an existing JSON logger with this
// function. To learn more about this possibility, please visit: https://github.com/DataDog/dd-trace-go/issues/2152#issuecomment-1790586933
func WithLogger(logger Logger) StartOption {
return func(c *config) {
c.logger = logger
}
}
// WithDebugStack can be used to globally enable or disable the collection of stack traces when
// spans finish with errors. It is enabled by default. This is a global version of the NoDebugStack
// FinishOption.
func WithDebugStack(enabled bool) StartOption {
return func(c *config) {
c.noDebugStack = !enabled
}
}
// WithDebugMode enables debug mode on the tracer, resulting in more verbose logging.
func WithDebugMode(enabled bool) StartOption {
return func(c *config) {
c.debug = enabled
}
}
// WithLambdaMode enables lambda mode on the tracer, for use with AWS Lambda.
// This option is only required if the the Datadog Lambda Extension is not
// running.
func WithLambdaMode(enabled bool) StartOption {
return func(c *config) {
c.logToStdout = enabled
}
}
// WithSendRetries enables re-sending payloads that are not successfully
// submitted to the agent. This will cause the tracer to retry the send at
// most `retries` times.
func WithSendRetries(retries int) StartOption {
return func(c *config) {
c.sendRetries = retries
}
}
// WithRetryInterval sets the interval, in seconds, for retrying submitting payloads to the agent.
func WithRetryInterval(interval int) StartOption {
return func(c *config) {
c.retryInterval = time.Duration(interval) * time.Second
}
}
// WithPropagator sets an alternative propagator to be used by the tracer.
func WithPropagator(p Propagator) StartOption {
return func(c *config) {
c.propagator = p
}
}
// WithService sets the default service name for the program.
func WithService(name string) StartOption {
return func(c *config) {
c.serviceName = name
globalconfig.SetServiceName(c.serviceName)
}
}
// WithGlobalServiceName causes contrib libraries to use the global service name and not any locally defined service name.
// This is synonymous with `DD_TRACE_REMOVE_INTEGRATION_SERVICE_NAMES_ENABLED`.
func WithGlobalServiceName(enabled bool) StartOption {
return func(_ *config) {
namingschema.SetUseGlobalServiceName(enabled)
}
}
// WithAgentAddr sets the address where the agent is located. The default is
// localhost:8126. It should contain both host and port.
func WithAgentAddr(addr string) StartOption {
return func(c *config) {
c.agentURL = &url.URL{
Scheme: "http",
Host: addr,
}
}
}
// WithAgentURL sets the full trace agent URL
func WithAgentURL(agentURL string) StartOption {