-
-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Performance Issue for NestJS Project with Sentry Performance Enabled #15725
Comments
Thanks for the easy to follow reproduction repo. Can confirm, I'm observing the same outcomes with the http integration added as the only integration. I also tried production mode with the same results. When only using the Sentry.httpIntegration({
breadcrumbs: false,
spans: false,
trackIncomingRequestsAsSessions: false,
disableIncomingRequestSpans: true,
}), |
Hey @ReneGreen27, we have several PRs in place that should slightly improve performance, but generally the instrumentation will cause some overhead. Current recommendation is to use the setup posted above by @andreiborza and update to latest versions as we'll try to further optimize this. |
) Small optimization to avoid unnecessary work. ref: #15725
Here's a flamegraph of an extremely simple node.js server load tested: https://drive.google.com/file/d/19CC_zFcRhVme_exz1gpthNv6fh8tNcKe/view?usp=sharing const Sentry = require("@sentry/node");
Sentry.init({
dsn: "....",
// Add Tracing by setting tracesSampleRate
// We recommend adjusting this value in production
tracesSampleRate: 1.0,
// Set sampling rate for profiling
// This is relative to tracesSampleRate
profilesSampleRate: 1.0,
debug: true,
environment: "node-test-app",
});
const http = require("http");
const hostname = "127.0.0.1";
const port = 3000;
const server = http.createServer((req, res) => {
res.statusCode = 200;
res.setHeader("Content-Type", "text/plain");
res.end("Hello, World!\n");
});
server.listen(port, hostname, () => {
console.log(`Server running at http://${hostname}:${port}/`);
}); Some offenders I could make out:
|
Ref: #15725 - Only does the options merging once - Adds short circuiting for event types to avoid doing things multiple times/unnecessarily --------- Co-authored-by: Francesco Gringl-Novy <[email protected]>
Found another one - looks like the ![]() I know we're improving For example with tedious, we should not even register sentry-javascript/packages/node/src/integrations/tracing/tedious.ts Lines 27 to 38 in 3d63621
We should also avoid sentry-javascript/packages/core/src/utils/spanUtils.ts Lines 150 to 163 in 3d63621
|
Updates the implementation of `dropUndefinedKeys`: - added early returns - used for loops in case of larger data structures - handle array case before object case to avoid calls to `isPojo` - simplified `isPojo` by checking [Object.prototype.constructor](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Object/constructor#description) ref #15725
ref #15725 (comment) Similar to the work done in #15765 we can avoid usage of `addNonEnumerableProperty` with usage of a `WeakSet`.
Note: After profiling the changes we made in:
We seem to have made some improvements! We've dropped Before: After: ![]() Now we gotta make ![]() ![]() |
So |
I wonder what makes |
AFAIK instantiating errors is actually quite expensive because the runtime has to compute a stack trace. That might be it. |
Maybe if we threw an object with a certain shape instead it wouldn't be so expensive. |
This replaces usage of `SentryError` for promise buffer control flow. Instead, we can use a symbol and just check this directly, we do not even care about the message here. ref #15725 (comment)
#15823) This PR replaces our usage of `SentryError` for control flow in our event processing. Instead, we now throw either an `InternalError` or `DoNotSendEventError` (which are just POJOs with a symbol, without a stackframe). These two also allow us to differentiate between these two use cases, which so far have been kind of combined via the log level, but are really different things - one is "expected"/configured by a user, the other is unexpected and more of a warning. I also removed the handling for `SentryError` from inbound filters, as this should then become unused. This also deprecates `SentryError`, it is no longer used and we can eventually remove it. ref #15725 (comment)
…5802) Related to #15725 (comment), this PR is an idea to avoid registering `on('spanStart')` hooks for all the node libraries that do not have proper hooks, unless they are used. Today, for OTEL instrumentation that does not provide span hooks, we fall back to `client.on('spanStart')` to enhance/mutate spans emitted by the instrumentation. This PR improved this by only registering the `spanStart` client hook if we detect that the OTEL instrumentation is actually wrapping something. This avoids us calling a bunch of span callbacks each time a span is started, when it is not even needed. For this, a new `instrumentWhenWrapped` utility is added which can be passed an instrumentation. This works by monkey-patching `_wrap` on the instrumentation, and ensuring a callback is only called conditionally. Note: For some (e.g. connect, fastify) we register `spanStart` in the error handler, which is even better, so there we do not need this logic.
Improvements that have been made now:
|
Related to #15725 (comment) When a span is not a root span, we do not need to do sampling work for it. By reordering stuff in the `shouldSample` function, we should be able to save a bunch of operations for the vast majority of (non-root) spans. I _think_ this should be just fine!
Took another detailed trace, we've made some good improvements: Here's whats still left that is notable:
OTEL
OTEL
|
Since we've started the initiative we've improved performance by 30-40%. The next release will contain a majority of these improvements - will leave a comment when that is released. For now going to close this issue. Further improvements will be tracked by #15861 Aside from upgrading the SDK, adjusting the sample rate will also have a lot of benefits performance-wise. We recommend using that as an avenue to get application performance to something you think is reasonable. |
Related to #15725 (comment) When a span is not a root span, we do not need to do sampling work for it. By reordering stuff in the `shouldSample` function, we should be able to save a bunch of operations for the vast majority of (non-root) spans. I _think_ this should be just fine!
Is there an existing issue for this?
How do you use Sentry?
Sentry Saas (sentry.io)
Which SDK are you using?
@sentry/browser
SDK Version
9.5.0
Framework Version
NestJS
Link to Sentry event
No response
Reproduction Example/SDK Setup
Mini repro app and details regarding performance included in internal ticket #146790
Steps to Reproduce
clean NestJS framework + Sentry. The route for testing simply returned a small JSON text.
According to the measurement results:
Clean framework without Sentry - 30,000 rps, 3ms average response time.
Clean framework + Sentry - 2,500 rps, 39ms average response time.
I used the following Sentry configuration:
Reducing the values of tracesSampleRate and profilesSampleRate to 0.1 slightly improves the situation
main performance loss occurs due to the Sentry.httpIntegration() module
Expected Result
Not impactful to app performance to have sentry performance enabled
Actual Result
Performance affected
The text was updated successfully, but these errors were encountered: