Reviewing and fixing mobile app crashes is vital to improving mobile-app user experience. Dynatrace collects all crash reports generated by your instrumented applications and presents them in a list that's sorted based on impact to real users.
To access crash reports for a mobile app:
- Select Applications from the navigation menu.
- On the Applications page, select the app you want to analyze.
- On the Mobile application details page, click the Crashes portion of the infographic to display the Crashes list on the right-hand side of the page.
The Crashes list aggregates all similar crash types. Dynatrace aggregates crashes based on crash reason (such as failure or exception type), source code location, and line number. The list is automatically sorted based on the number of crashes and the number of affected users so that you can quickly get an overview of the crashes that are most critical.
Click a specific crash report to view detailed occurrence statistics, including date and time of the last occurrence, most affected device, most affected firmware version, and most affected screen resolution.
Crash details provide a code-level stack trace that enables you to review the root causes of crashes at the source-code level. Click Download to download a stack trace for integration into your 3rd party incident management system, such as JIRA or Bugzilla.
If you've instrumented more than one app version, use the All app version list to filter the list according to your apps' release versions.
Crashes/Affected users chart
Review the total number of crashes during the selected timeframe by referring to the Crashes / Affected users chart at the bottom of the page. This chart visualizes both crashes and the total number of users that were affected by crashes during the timeframe.
Note: While crash metrics remain available within the chart for an unlimited period of time, detailed code-level analysis is only available for 10 days.
Symbolication and deobfuscation converts the hexcodes and stack traces captured by Dynatrace into human-readable formats.
The following example is an Android stack trace, before and after deobfuscation:
With Mobile Symbolication API, you can manage iOS dSYM and Proguard mapping files.