Bad software is everywhere, and we're tired of it. Sentry is on a mission to help developers write better software faster, so we can get back to enjoying technology. If you want to join us Check out our open positions
This is the official Sentry SDK for Sentry.
💁: This README documents unreleased features (from the master
branch). For documentation on the current release, see the official documentation.
To use Sentry in your project, add it as a dependency in your mix.exs
file. Sentry does not install a JSON library nor HTTP client by itself. Sentry will default to trying to use Jason for JSON serialization and Hackney for HTTP requests, but can be configured to use other ones. To use the default ones, do:
defp deps do
[
# ...
{:sentry, "~> 9.0"},
{:jason, "~> 1.4"},
{:hackney, "~> 1.19"}
]
end
Sentry has a range of configuration options, but most applications will have a configuration that looks like the following:
# config/config.exs
config :sentry,
dsn: "https://[email protected]/1",
environment_name: Mix.env(),
enable_source_code_context: true,
root_source_code_paths: [File.cwd!()]
This library comes with a :logger
handler to capture error messages coming from process crashes. To enable this, add the handler when your application starts:
def start(_type, _args) do
+ :logger.add_handler(:sentry_handler, Sentry.LoggerHandler, %{})
# ...
end
The handler can also be configured to capture Logger
metadata. See the documentation here.
Sometimes you want to capture specific exceptions manually. To do so, use Sentry.capture_exception/2
.
try do
ThisWillError.really()
rescue
my_exception ->
Sentry.capture_exception(my_exception, stacktrace: __STACKTRACE__)
end
Sometimes you want to capture messages that are not exceptions. To do that, use Sentry.capture_message/2
:
Sentry.capture_message("custom_event_name", extra: %{extra: information})
To learn more about how to use this SDK, refer to the documentation.
Please refer to CONTRIBUTING.md
.
If you need help setting up or configuring the Python SDK (or anything else in the Sentry universe) please head over to the Sentry Community on Discord. There is a ton of great people in our Discord community ready to help you!
Licensed under the MIT license, see LICENSE
.
Sentry has multiple options for including contextual information. They are organized into "Tags", "User", and "Extra", and Sentry's documentation on them is here. Breadcrumbs are a similar concept and Sentry's documentation covers them here.
In Elixir this can be complicated due to processes being isolated from one another. Tags context can be set globally through configuration, and all contexts can be set within a process, and on individual events. If an event is sent within a process that has some context configured it will include that context in the event. Examples of each are below, and for more information see the documentation of Sentry.Context.
# Global Tags context via configuration:
config :sentry,
tags: %{my_app_version: "14.30.10"}
# ...
# Process-based Context
Sentry.Context.set_extra_context(%{day_of_week: "Friday"})
Sentry.Context.set_user_context(%{id: 24, username: "user_username", has_subscription: true})
Sentry.Context.set_tags_context(%{locale: "en-us"})
Sentry.Context.add_breadcrumb(%{category: "web.request"})
# Event-based Context
Sentry.capture_exception(exception, [tags: %{locale: "en-us", }, user: %{id: 34},
extra: %{day_of_week: "Friday"}, breadcrumbs: [%{timestamp: 1461185753845, category: "web.request"}]]
By default, Sentry aggregates reported events according to the attributes of the event, but users may need to override this functionality via fingerprinting.
To achieve that in Sentry Elixir, one can use the before_send_event
configuration callback. If there are certain types of errors you would like to have grouped differently, they can be matched on in the callback, and have the fingerprint attribute changed before the event is sent. An example configuration and implementation could look like:
# lib/sentry.ex
defmodule MyApp.Sentry
def before_send(%{exception: [%{type: DBConnection.ConnectionError}]} = event) do
%{event | fingerprint: ["ecto", "db_connection", "timeout"]}
end
def before_send(event) do
event
end
end
# config.exs
config :sentry,
before_send_event: {MyApp.Sentry, :before_send},
# ...
Sentry's server supports showing the source code that caused an error, but depending on deployment, the source code for an application is not guaranteed to be available while it is running. To work around this, the Sentry library reads and stores the source code at compile time. This has some unfortunate implications. If a file is changed, and Sentry is not recompiled, it will still report old source code.
The best way to ensure source code is up to date is to recompile Sentry itself via mix deps.compile sentry --force
. It's possible to create a Mix Task alias in mix.exs
to do this. The example below allows one to run mix sentry_recompile && mix compile
which will compile any uncompiled or changed parts of the application, and then force recompilation of Sentry so it has the newest source. The second mix compile
is required due to Mix only invoking the same task once in an alias.
# mix.exs
defp aliases do
[sentry_recompile: ["compile", "deps.compile sentry --force"]]
end
For more documentation, see Sentry.Sources.
To ensure you've set up your configuration correctly we recommend running the included mix task. It can be tested on different Mix environments and will tell you if it is not currently configured to send events in that environment:
$ MIX_ENV=dev mix sentry.send_test_event
Client configuration:
server: https://sentry.io/
public_key: public
secret_key: secret
current environment_name: :dev
:dev is not in [:prod] so no test event will be sent
$ MIX_ENV=prod mix sentry.send_test_event
Client configuration:
server: https://sentry.io/
public_key: public
secret_key: secret
current environment_name: :prod
Sending test event!
In some cases, users may want to test that certain actions in their application cause a report to be sent to Sentry. Sentry itself does this by using Bypass. It is important to note that when modifying the environment configuration the test case should not be run asynchronously. Not returning the environment configuration to its original state could also affect other tests depending on how the Sentry configuration interacts with them.
For example:
test "add/2 does not raise but sends an event to Sentry when given bad input" do
bypass = Bypass.open()
Bypass.expect(bypass, fn conn ->
assert {:ok, _body, conn} = Plug.Conn.read_body(conn)
Plug.Conn.resp(conn, 200, ~s<{"id": "340"}>)
end)
Sentry.put_config(:dsn, "http://public:secret@localhost:#{bypass.port}/1")
Sentry.put_config(:send_result, :sync)
MyModule.add(1, "a")
after
# Return config to the previous value
# ...
end
When testing, you will also want to set the :send_result
type to :sync
, so that sending Sentry events blocks until the event is sent.