-
Notifications
You must be signed in to change notification settings - Fork 299
Introduce service.peer.name and service.peer.namespace; deprecate peer.service #3097
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
14b1a2b to
6b843a7
Compare
thompson-tomo
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PR should be Blocked due to old attributes not actually being deprecated but rather only a single usage of the attribute being deprecated. Also there is 2 change logs when there should only be 1.
If we think about the use of the attributes for me it makes more sense to put these new attributes under the server namespace given that they are being set based on the server address/port.
It would also enable the server namespace to be the sole namespace containing attributes describing the server side of a connection and the service namespace to be describing the service being used.
I am trying to figure out how to make this work the right way. Pointers appreciated :-)
IMO, it is really not a given that these are set on server address/port. It is difficult to generalize on something like this, and it is going to be very implementation-dependent, but more than one implementation of peer.service I have seen happened at a pretty high level, e.g., embedded in client libraries automatically generated from OpenAPI specs. |
Move the deprecated block from common.yaml into the registry.yaml file and then regenerate the docs. The generation process will propagate the deprecation info onto the attributes on the signals.
This is functionality which is defined via declarative config.
That would also be fine and still fit having it under server as server would be describing the remote side of the connection. |
|
hi @mmanciop! thanks for taking this on. we discussed this in yesterday's Service and Deployment Semconv SIG meeting (https://zoom.us/rec/share/W7L9lhkmwN6GGzh1ykMxcF-dr2B0frjOAaO52BSe-8VP-Zag6n15gQObv_sFtqM.OCG1dIwmHpD2D2rP starting around 34:00 minute marker). I believe we're onboard with renaming We'd like a bit more understanding of whether For We still need to decide whether we want to recommend Can you investigate the existing usages of Once we decide on the migration and stabilization plan, we want to communicate it via a short blog post, to hopefully avoid the surprises that folks had with the |
Very nice!
The identity of a service is the combination of its
The canonical example in my head is the
Sure, I had already done the research before coming up with the proposal, and I just spent some more time with GitHuib search to make sure I did not miss anything. To my knowledge, the list is as follow, going through SDKs and contribs in alphabetical order:
Others:
Sounds good to me. I also think that adding one more fallback case for |
6b843a7 to
985629b
Compare
|
This PR contains changes to area(s) that do not have an active SIG/project and will be auto-closed:
Such changes may be rejected or put on hold until a new SIG/project is established. Please refer to the Semantic Convention Areas |
| stability: development | ||
| brief: > | ||
| Logical name of the service on the other side of the connection. | ||
| SHOULD be equal to the actual [`service.name`](/docs/resource/README.md#service) resource attribute of the remote service if any. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What has me concerned here is we don't have a specified way for instrumentation (i.e the OTel API) to access the resource attribute and fill out a service.name here, e.g. if using baggage.
@mmanciop I do think we need an overall "Improve the state of service-peer in OTEL Specification" tracking bug, with known examples/demos you've collected.
However, there's enough usage in OTEL now, that I think we this is ok for now. I just believe this requirement is "too hard" to accomplish in practice in OTEL.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
7a07a6e to
4964e08
Compare
96f0954 to
51b0ef2
Compare
| component: peer | ||
|
|
||
| # A brief description of the change. Surround your text with quotes ("") if it needs to start with a backtick (`). | ||
| note: The `peer.service` attribute has been deprecated in favor of `service.peer.name`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SemConv SIG discussion:
Please update PR description to make a case for service.peer.namespace and some data points on usage (outside of otel org). It does not have to be the same attribute, just the scenario.
For stabilization, we might want to see more real-life usage (of service.peer.namespace in otel or outside of otel org).
oh, span-to-metrics is a great use case for capturing these attributes 👍
@mapno, @JaredTan95, @open-telemetry/collector-contrib-approvers we're trying to make a case for |
It would be good to get confirmation from @mapno and/or @JaredTan95, but from my read: By default, the connector will create a virtual node in the service graph representing a peer service, based on the presence of one or more of these attributes in a client or server span: It should be easy enough to add (FWIW I like the name change. Besides making room for |
|
This PR has been labeled as stale due to lack of activity. It will be automatically closed if there is no further activity over the next 7 days. |
Fixes #2945
Changes
The goals of this PR are twofold.
Goal 1: Stabilization
Renaming
peer.serviceis necessary for stabilization: the same way the SIG renameddeployment.environmenttodeployment.environment.name, the lack of extensibility ofpeer.serviceprevents its stabilization.The extensibility of
service.peer.*is itself important because of the next goal.Goal 2: Provide means of fully describing service identity
Today's
peer.serviceis meant to contain the same value of theservice.nameattribute of the service on the other end of communication. However,service.nameby itself does not actually suffice to identify every service, because of the existence and adoption ofservice.namespace:(From https://opentelemetry.io/docs/specs/semconv/resource/#service)
That is, in order to allow "references" to a service, we need to be able to also add
service.peer.namespace.The importance of
service.peer.namespaceis directly related with the adoption ofservice.namespace. I pulled statistics across the entirety of the use-base of Dash0, and almost exactly 1/3 of organizations (which equate to a "user site") setservice.namespaceto one or more of their services. (I admit this came to me as a surprise, I had guess-stimated the adoption to be around 10%). This high adoption, in my eyes, justifies making an exception to the rule about existing implementations.For the record, about implementations: we intend in Dash0 to automatically add
service.peer.nameandservice.peer.namespaceto metrics generated for span pairs connecting services. Which means 1/3 of Dash0 users will automatically adopt these attributes.Merge requirement checklist
[chore]