-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Unexpected timeout from process 1. Process will no longer be monitored" While Egressing Trace in Kubernetes #3916
Comments
kkeirstead
changed the title
"Unexpected timeout from process 1. Process will no longer be monitored" While Egressing Artifact in Kubernetes (.NET Monitor 8)
"Unexpected timeout from process 1. Process will no longer be monitored" While Egressing Trace in Kubernetes (DM 8)
Mar 9, 2023
Let's check if the 7.1 image exhibits the same issue; if it does, it's likely due to some change in the NETCore.Client library from dotnet/diagnostics. |
kkeirstead
changed the title
"Unexpected timeout from process 1. Process will no longer be monitored" While Egressing Trace in Kubernetes (DM 8)
"Unexpected timeout from process 1. Process will no longer be monitored" While Egressing Trace in Kubernetes
Mar 17, 2023
Confirming that the 7.1 image does have this issue. |
This has been fixed in the 8.0 Preview 3 and 7.1.1 releases. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
When egressing a trace in Kubernetes using .NET Monitor 8, the following messages show up in the logs:
2023-03-09T19:43:27.5549626Zwarn: Microsoft.Diagnostics.Tools.Monitor.ServerEndpointInfoSource[52] Unexpected timeout from process 1. Process will no longer be monitored. 2023-03-09T19:43:27.5581934Zinfo: Microsoft.Diagnostics.Tools.Monitor.CollectionRules.CollectionRuleService[44] => TargetProcessId:1 TargetRuntimeInstanceCookie:f29dfb3c42de421eb8cdbb65fec4b124 Stopping collection rules. 2023-03-09T19:43:27.5588928Zinfo: Microsoft.Diagnostics.Tools.Monitor.CollectionRules.CollectionRuleService[45] => TargetProcessId:1 TargetRuntimeInstanceCookie:f29dfb3c42de421eb8cdbb65fec4b124 All collection rules have stopped.
Checking the
/processes
route while egressing shows that there are no processes present - after completing the egress operation, if there aren't collection rules, the/processes
route once again shows the default process (with a persistent UUID). If there are collection rules, these will fail to resume, and the/processes
route will not show the default process again.It's also worth noting that the egress is successful, and that
dotnet-monitor
continues to work as expected after this issue.Configuration
DM -
image: mcr.microsoft.com/dotnet/monitor:8.0-preview
Target -
image: mcr.microsoft.com/dotnet/samples:aspnetapp
ConnectionMode -
Listen
API Operation -
curl.exe -v "http://localhost:52323/trace?pid=1&durationSeconds=5&egressProvider=monitorBlob"
Regression?
This issue appears to be a regression - the .NET Monitor 7.0.x image in Kubernetes with the exact same configuration does not have this issue.
The .NET Monitor 7.1 image does have this issue.
Other information
The text was updated successfully, but these errors were encountered: