Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

The infrastructure makes it possible to trace all actions across different services and components. This is implemented using Istio and OpenTracing with Jaeger.

Header Propagation

For all containers deployed on the infrastructure, an istio-sidecar proxy is deployed in the same pod. The istio proxy are able to automatically send spans (the time spend in a single service) to Jaeger.

But to be able to correlate the spans to an entire trace we need to propagate theĀ appropriate HTTP headers.

The headers that must be propagated from the incoming request to all outgoing requests are the following:

  • x-request-id
  • x-b3-traceid
  • x-b3-spanid
  • x-b3-parentspanid
  • x-b3-sampled
  • x-b3-flags
  • x-ot-span-context
  • b3 (for forward compatibility)

All headers may not be present for all requests, but if they are, then they must be propagated.

Calling external dependencies


If an application deployed on the ehealth-platform infrastructure makes a call to an external dependency, this call should also have the tracing headers on.

This allows the infrastructure to:

  • Pinpoint potentially slow external dependencies
  • Calculate how much time is spend waiting for external dependencies for each end-user request
  • Create audit trails for all requests

More Info

Java client library and great explanation of the different B3 headers: https://github.com/openzipkin/b3-propagation

Istio documentation of distributed tracing using headers propagation: https://istio.io/docs/tasks/telemetry/distributed-tracing/overview/

Alternative Java library: https://github.com/jaegertracing/jaeger-client-java


Example



Tracing on requests to external services

The platform is not able to create automatic traces on on encrypted requests to external services.

This is because of the fact that traces is based on the "x-b3-* headers, and these cannot be read by the proxy when the request is encrypted. Encrypted requests include all requests that uses a TLS, SSL or HTTPS protocol.

Because of this all applications making encrypted requests to external services, where they want to record call time or have trace data, needs to create the Jaeger traces manually for the external request.

  • No labels