dd-trace-java icon indicating copy to clipboard operation
dd-trace-java copied to clipboard

Datadog APM client for Java

Results 483 dd-trace-java issues
Sort by recently updated
recently updated
newest added

# What Does This Do Implementation of the single span sampling mechanism described in [this RFC](https://github.com/DataDog/architecture/tree/master/rfcs/apm/integrations/single-span-ingestion-control#recommended-solution-span-sampling-rules). It introduces SpanProcessingWorker running in its own thread that is responsible for sampling single...

# What Does This Do Instead of collecting declared (lexical) type for argument, fields or local variable, we collect dynamic type that provides more useful information. # Motivation Knowing my...

# What Does This Do When sending request to remote config we ensure service name, env, version are tokenized and sanitized # Motivation env or version need to be tokenized...

# What Does This Do Adds all the instrumentation needed to perform taint tacking in repeat operation for String objects # Motivation IAST requires to track all modifications that happen...

do-not-merge/WIP
no release notes
iast

# What Does This Do Adds all the instrumentation needed to perform taint tacking in join operations for String objects # Motivation IAST requires to track all modifications that happen...

do-not-merge/WIP
no release notes
iast

This is an attempt at increasing cohesion in the IAST instrumentations. The current strategy to do taint propagation goes like this: 1. A class with call site advice is created...

do-not-merge/WIP
experimental
iast

# What Does This Do Adds a benchmark to compare the overhead introduced by before, around and after call sites # Motivation # Additional Notes

no release notes
iast

# What Does This Do Adds all the instrumentation needed to perform taint tacking in substring operations for String objects # Motivation IAST requires to track all modifications that happen...

do-not-merge/WIP
no release notes
iast

# What Does This Do Change weak hash and weak cipher instrumentation so we use the call site interface instead of the target instrumentation. # Motivation This is needed so...

iast

# What Does This Do # Motivation # Additional Notes