-
Notifications
You must be signed in to change notification settings - Fork 153
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug: X-Amzn-Trace-Id Header Growth in instrumentFetch Causes 431 Errors When Using SQS Triggers #3692
Comments
Thanks for opening your first issue here! We'll come back to you as soon as we can. |
Hi @drewjohnston-0000 thank you for opening this issue. I've been trying to reproduce the behavior you have described but I am unable to do so. I have created a stack with a SQS queue, a DQL, and an API. The SQS queue has a consumer function (the one that should be exhibiting the bug) and the API also has a function that simply logs the header of the incoming request - this second function replaces the NGINX server you mentioned in your request. The SQS consumer function uses Tracer to instrument fetch requests made with the See consumer function codeimport {
BatchProcessor,
EventType,
processPartialResponse,
} from '@aws-lambda-powertools/batch';
import { Tracer } from '@aws-lambda-powertools/tracer';
import type { SQSHandler, SQSRecord } from 'aws-lambda';
import { fetch } from 'undici';
import { AwsClient } from 'aws4fetch';
import { Logger } from '@aws-lambda-powertools/logger';
const logger = new Logger({ logLevel: 'DEBUG' });
const signer = new AwsClient({
region: process.env.AWS_REGION,
service: 'lambda',
accessKeyId: process.env.AWS_ACCESS_KEY_ID || '',
secretAccessKey: process.env.AWS_SECRET_ACCESS_KEY || '',
sessionToken: process.env.AWS_SESSION_TOKEN,
});
const tracer = new Tracer();
const processor = new BatchProcessor(EventType.SQS);
const API_URL = process.env.API_URL || '';
const recordHandler = async (record: SQSRecord) => {
const { body } = record;
const { action } = JSON.parse(body) as {
action: 'fail' | 'succeed';
};
try {
logger.debug('url', {
url: API_URL,
});
const request = await signer.sign(API_URL, {
method: 'POST',
});
logger.debug('signed', { request: request.headers });
const response = await fetch(API_URL, request);
const body = await response.json();
if (action === 'fail') {
throw new Error(`Failing request: ${JSON.stringify(body)}`);
}
return body;
} catch (error) {
tracer.addErrorAsMetadata(error as Error);
throw error;
}
};
export const handler: SQSHandler = async (event, context) => {
return processPartialResponse(event, recordHandler, processor, {
context,
});
}; On the other hand, the API function is very simple and its only purpose is to log the headers of the request. If the bug is confirmed the size of the See API function codeimport { Logger } from '@aws-lambda-powertools/logger';
import type { APIGatewayProxyEventV2 } from 'aws-lambda';
const logger = new Logger({ logLevel: 'DEBUG' });
export const handler = async (event: APIGatewayProxyEventV2) => {
logger.debug('event headers', {
headers: event.headers,
});
return {
statusCode: 200,
body: JSON.stringify({
message: 'Hello from Lambda!',
}),
};
}; After deploying the stack, I have then sent a single message to the queue with this payload: {"action": "fail"} Then, I observed the trace data, and confirmed that the request is being instrumented (see example below): Finally, I checked the logs of both functions and confirmed that the trace headers looked like this in all the three retries:
In all the three requests the trace header that arrived to the API has the expected components and doesn't appear to be repeated or otherwise abnormally large. You can find the entire stack with all the components, and optionally try the test for yourself, at this repo: https://github.com/dreamorosi/3692 As a side note, while it's true that we don't check for an existing header nor clear existing headers, this is because the The only cases I can think of - unless I'm missing something or have misunderstood the case - is that you're already adding the trace id manually, in that case the solution would be to not do that and let the Tracer add the header. With this in mind, could you please provide a minimal reproduction example similar to the one I share above that consistently reproduces the bug? This would help us understand what's happening and hopefully provide a fix. |
This issue has not received a response in 2 weeks. If you still think there is a problem, please leave a comment to avoid the issue from automatically closing. |
Greetings! We are closing this issue because it has been open a long time and hasn’t been updated in a while and may not be getting the attention it deserves. We encourage you to check if this is still an issue in the latest release and if you find that this is still a problem, please feel free to comment or reopen the issue. |
Expected Behavior
The X-Amzn-Trace-Id header is added once per outgoing request.
On retries, the instrumentation should either replace the trace header or prevent duplicate appends so that the header does not grow over successive invocations.
Current Behavior
Code snippet
Steps to Reproduce
Possible Solution
Powertools for AWS Lambda (TypeScript) version
latest
AWS Lambda function runtime
22.x
Packaging format used
Lambda Layers
Execution logs
The text was updated successfully, but these errors were encountered: