ProGuard & DexGuard

If you want to see de-obfuscated stack traces, you'll need to use ProGuard with Sentry. To do so, upload the ProGuard mapping files by either the recommended method of using our Gradle integration or manually by using sentry-cli.

Support for Guardsquare's ProGuard and DexGuard was added in version 3.0.0 of the Sentry Android Gradle Plugin.

In-app Frames

If you have an deobfuscated build, the Android SDK will automatically set all frames coming from the app as in-app, based on the applicationId/packageName. This is not possible on the client side for obfuscated builds. However, you can define server-side rules for identifying the in-app frames, for example:

Copied
stack.module:com.mycompany.** +app

For more information see StackTrace Rules.

Help improve this content
Our documentation is open source and available on GitHub. Your contributions are welcome, whether fixing a typo (drat!) to suggesting an update ("yeah, this would be better").