HTTP Calls and SQL Queries
The Blackfire Enterprise Edition gives you more detailed information about HTTP calls and SQL queries happening in your code.
A couple of months ago, we introduced the Blackfire Enterprise Edition and support for teams. The response has been great so far, and since the launch, we packed a lot of other features. One of them is the ability to understand which HTTP web services or APIs have been called during an HTTP request, and also the exact SQL queries that were executed on your database. It helps a lot when optimizing performance as those are almost always the main bottlenecks.
For each SQL or URL, you get the number of calls, the time it took for the server to respond, and the amount of transferred data (only for HTTP calls):
The information is also available directly from the call graph to make it easier to trace where the calls come from:
Recorded SQL queries and URLs are anonymized by the Blackfire agent before they are sent back to the Blackfire servers as they can contain sensitive data.
HTTP calls and SQL queries is one of the features that you get with the Blackfire Enterprise Edition. If you are interested, don’t hesitate to get in touch and contact us at sales [at] blackfire.io.
Happy profiling!