-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtrace.ts
155 lines (141 loc) · 5.12 KB
/
trace.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
import { Tracer } from '@aws-lambda-powertools/tracer';
import { randomUUID } from 'crypto';
// Mocked AWS API Gateway event, see: https://docs.aws.amazon.com/lambda/latest/dg/services-apigateway.html
const event = {
resource: '/',
path: '/',
httpMethod: 'GET',
headers: {
accept:
'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9',
'accept-encoding': 'gzip, deflate, br',
'accept-language': 'en-US,en;q=0.9',
'CloudFront-Viewer-Country': 'SE',
'User-Agent':
'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36',
'X-Amzn-Trace-Id': 'Root=1-5e66d96f-7491f09xmpl79d18acf3d050',
'X-Forwarded-For': '192.168.0.1',
'X-Forwarded-Port': '443',
'X-Forwarded-Proto': 'https'
},
multiValueHeaders: {},
queryStringParameters: null,
multiValueQueryStringParameters: null,
pathParameters: null,
stageVariables: null,
requestContext: {
resourceId: '2gxmpl',
resourcePath: '/',
httpMethod: 'GET',
extendedRequestId: 'JJbxmplHYosFVYQ=',
requestTime: '10/Mar/2020:00:03:59 +0000',
path: '/prod/',
accountId: '123456789012',
protocol: 'HTTP/1.1',
stage: 'prod',
domainPrefix: '70ixmpl4fl',
requestTimeEpoch: 1583798639428,
requestId: '77375676-xmpl-4b79-853a-f982474efe18',
identity: {
cognitoIdentityPoolId: null,
accountId: null,
cognitoIdentityId: null,
caller: null,
sourceIp: '192.168.0.1',
principalOrgId: null,
accessKey: null,
cognitoAuthenticationType: null,
cognitoAuthenticationProvider: null,
userArn: null,
userAgent:
'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36',
user: null
},
domainName: '70ixmpl4fl.execute-api.us-east-2.amazonaws.com',
apiId: '70ixmpl4fl'
},
body: null,
isBase64Encoded: false
};
// Mocked AWS API Gateway context
const context = {
callbackWaitsForEmptyEventLoop: {},
succeed: {},
fail: {},
done: {},
functionVersion: '$LATEST',
functionName: 'somestack-FunctionName',
memoryLimitInMB: '1024',
logGroupName: '/aws/lambda/somestack-FunctionName',
logStreamName: '2022/07/09/[$LATEST]159282acddb84ca0bc0d5f325ea01343',
clientContext: '',
identity: '',
invokedFunctionArn: 'arn:aws:lambda:eu-north-1:123412341234:function:somestack-FunctionName',
awsRequestId: '6c933bd2-9535-45a8-b09c-84d00b4f50cc',
getRemainingTimeInMillis: {}
};
export const handler = async (event: any): Promise<void> => {
// Static metadata
const staticMetadata = {
dataSensitivity: 'public',
domain: 'CustomerAcquisition',
hostPlatform: 'aws',
jurisdiction: 'EU',
owner: 'MyCompany',
service: 'UserSignUp',
system: 'ShowroomActivities',
tags: ['typescript', 'backend'],
team: 'MyDemoTeam'
};
// Dynamic metadata from environment
const dynamicMetadata = {
accountId: event.requestContext.accountId,
correlationId: context.awsRequestId, // This is rudimentary and should also check for ID coming through headers etc!
functionMemorySize: process.env.AWS_LAMBDA_FUNCTION_MEMORY_SIZE || context.memoryLimitInMB,
functionName: process.env.AWS_LAMBDA_FUNCTION_NAME || context.functionName,
functionVersion: process.env.AWS_LAMBDA_FUNCTION_VERSION || context.functionVersion,
region: process.env.AWS_REGION || 'UNKNOWN',
resource: event.path, // This case is only valid for HTTP not for EventBridge etc!
runtime: process.env.AWS_EXECUTION_ENV || 'UNKNOWN',
stage: event.requestContext.stage,
timestampRequest: event.requestContext.requestTimeEpoch.toString(),
user: event.requestContext.identity.user,
viewerCountry: event.headers['CloudFront-Viewer-Country'] // This may or may not be present
};
const startTime = Date.now();
// Setup tracer and create a nested subsegment
const tracer = new Tracer({
serviceName: staticMetadata.service
});
const segment = tracer.getSegment();
const spanName = 'Call the User service and fetch a response';
const subsegment = segment.addNewSubsegment(spanName);
tracer.setSegment(subsegment);
tracer.addServiceNameAnnotation();
/**
* Do something
*/
const endTime = Date.now();
const requiredMetadata = {
attributes: {}, // Any extra attributes
correlationId: event.requestContext.requestId,
durationMs: endTime - startTime,
spanId: randomUUID(),
spanName: spanName,
timestamp: new Date(startTime).toISOString(),
timestampEpoch: `${startTime}`,
traceId: randomUUID()
};
const addMetadata = (metadata: any) => {
const [key, value] = metadata;
tracer.putMetadata(key, value);
};
Object.entries(dynamicMetadata).forEach((metadata: any) => addMetadata(metadata));
Object.entries(staticMetadata).forEach((metadata: any) => addMetadata(metadata));
Object.entries(requiredMetadata).forEach((metadata: any) => addMetadata(metadata));
// Finish or close the nested subsegment
subsegment.close();
// Reset to main segment
tracer.setSegment(segment);
};
handler(event);