Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/trace
OpenTelemetry Google Cloud Trace Exporter allows the user to send collected traces and spans to Google Cloud.
To get started with instrumentation in Google Cloud, see Generate traces and metrics with Go.
To learn more about instrumentation and observability, including opinionated recommendations for Google Cloud Observability, visit Instrumentation and observability.
Google Cloud Trace is a distributed tracing backend system. It helps developers to gather timing data needed to troubleshoot latency problems in microservice & monolithic architectures. It manages both the collection and lookup of gathered trace data.
This exporter package assumes your application is already instrumented with the OpenTelemetry SDK. Once you get ready to export OpenTelemetry data, you can add this exporter to your application.
Google Cloud Trace is a managed service provided by Google Cloud Platform. The end-to-end set up guide with OpenTelemetry is available on the official GCP docs, so this document goes through the exporter set up.
Once you import the trace exporter package, create and install a new export pipeline, then you can start tracing. If you are running in a GCP environment, the exporter will automatically authenticate using the environment's service account. If not, you will need to follow the instruction in Authentication.
package main
import (
"context"
"log"
texporter "github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/trace"
"go.opentelemetry.io/otel"
sdktrace "go.opentelemetry.io/otel/sdk/trace"
)
func main() {
exporter, err := texporter.New()
if err != nil {
log.Fatalf("unable to set up tracing: %v", err)
}
tp := sdktrace.NewTracerProvider(sdktrace.WithBatcher(exporter))
defer tp.Shutdown(context.Background())
otel.SetTracerProvider(tp)
tracer := tp.Tracer("example.com/trace")
ctx := context.TODO()
ctx, span := tracer.Start(ctx, "foo")
defer span.End()
// Do some work.
}
The Google Cloud Trace exporter depends upon google.FindDefaultCredentials
, so the service account is automatically detected by default, but also the custom credential file (so called service_account_key.json
) can be detected with specific conditions. Quoting from the document of google.FindDefaultCredentials
:
GOOGLE_APPLICATION_CREDENTIALS
environment variable.%APPDATA%/gcloud/application_default_credentials.json
. On other systems, $HOME/.config/gcloud/application_default_credentials.json
.When running code locally, you may need to specify a Google Project ID in addition to GOOGLE_APPLICATION_CREDENTIALS
. This is best done using an environment variable (e.g. GOOGLE_CLOUD_PROJECT
) and the WithProjectID
method, e.g.:
projectID := os.Getenv("GOOGLE_CLOUD_PROJECT")
exporter, err := texporter.New(texporter.WithProjectID(projectID))
...
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.