Skip to content

Finish implementing trace anonymizer #2556

Description

Requirement - what kind of business use case are you trying to solve?

Allow people to safely export production traces into GitHub tickets (as a way of reproducing problems, especially with the UI) without exposing sensitive information.

Problem - what in Jaeger blocks you from solving the requirement?

The anonymizer is partially implemented.

Proposal - what do you suggest to solve the problem or improve the existing situation?

Finish the implementation as follows

  • extend the Anonymizer type with these additional parameters
    • hashStandardTags - when true, the allowsTags are also hashed, when false they are preserved as is
    • hashCustomTags - when true, all other tags are hashed, when false they are dropped (current behavior)
    • hashLogs - when true, logs are hashed, when false they are dropped (current behavior)
    • hashProcess - when true, process tags are hashed, when false they are dropped (current behavior)
  • implement main program
    • add option to specify query service gRPC address to load the trace
    • add option to specify trace ID to load from gRPC query service
    • add option to specify output directory to save the file
    • add options for Anonymizer configuration parameters
    • when saving anonymized trace to a file, it first must be converted to the UI model (see writer package)
      • validation: the trace should be loadable by Jaeger UI (Load JSON tab in the Search panel)

cc @jpkrohling

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Assignees

Labels

good first issueGood for beginnershelp wantedFeatures that maintainers are willing to accept but do not have cycles to implement

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions