-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support secure OTLP exporter config for hotrod #4231
Conversation
except that now you broke the insecure mode, which is much more prevalent in demo setups go run ./examples/hotrod all -x otlp |
It doesn't break insecure mode, it changes the default on something user must opt into anyway. The original behavior is restored with:
or
The goal is to make the following work, which I suspect is the most likely way folks engage with
That said, if that's too big of an impact I'm fine to withdraw this. |
I suppose we could just look for an |
Updated PR to use secure connections when env var |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Please make sure all commits are signed (or squash into one, usually easier to fix DCO this way)
c95524a
to
19a3865
Compare
Signed-off-by: Gil Raphaelli <graphaelli@gmail.com>
19a3865
to
527608b
Compare
Codecov ReportBase: 97.11% // Head: 97.10% // Decreases project coverage by
Additional details and impacted files@@ Coverage Diff @@
## main #4231 +/- ##
==========================================
- Coverage 97.11% 97.10% -0.02%
==========================================
Files 302 302
Lines 17685 17685
==========================================
- Hits 17175 17173 -2
- Misses 411 412 +1
- Partials 99 100 +1
Flags with carried forward coverage won't be shown. Click here to find out more.
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
## Which problem is this PR solving? hotrod currently forces all connections to insecure in https://github.com/jaegertracing/jaeger/blob/fedeb4cab75399e4672b77efe6a067a7bd148ddf/examples/hotrod/pkg/tracing/init.go#L85 preventing SSL connections from succeeding. For example: ``` $ OTEL_EXPORTER_OTLP_ENDPOINT=https://hotrod.apm.us-east4.gcp.elastic-cloud.com:443 ./hotrod all -x otlp 2023/02/10 13:00:04 traces export: failed to send to http://hotrod.apm.us-east4.gcp.elastic-cloud.com:443/v1/traces: 400 Bad Request ``` ## Short description of the changes - use secure connections when env var `OTEL_EXPORTER_OTLP_ENDPOINT` uses `https` scheme or `OTEL_EXPORTER_OTLP_INSECURE=false` Signed-off-by: Gil Raphaelli <graphaelli@gmail.com>
## Which problem is this PR solving? hotrod currently forces all connections to insecure in https://github.com/jaegertracing/jaeger/blob/fedeb4cab75399e4672b77efe6a067a7bd148ddf/examples/hotrod/pkg/tracing/init.go#L85 preventing SSL connections from succeeding. For example: ``` $ OTEL_EXPORTER_OTLP_ENDPOINT=https://hotrod.apm.us-east4.gcp.elastic-cloud.com:443 ./hotrod all -x otlp 2023/02/10 13:00:04 traces export: failed to send to http://hotrod.apm.us-east4.gcp.elastic-cloud.com:443/v1/traces: 400 Bad Request ``` ## Short description of the changes - use secure connections when env var `OTEL_EXPORTER_OTLP_ENDPOINT` uses `https` scheme or `OTEL_EXPORTER_OTLP_INSECURE=false` Signed-off-by: Gil Raphaelli <graphaelli@gmail.com> Signed-off-by: shubbham1215 <sawaikershubham@gmail.com>
Which problem is this PR solving?
hotrod currently forces all connections to insecure in
jaeger/examples/hotrod/pkg/tracing/init.go
Line 85 in fedeb4c
preventing SSL connections from succeeding. For example:
Short description of the changes
OTEL_EXPORTER_OTLP_ENDPOINT
useshttps
scheme orOTEL_EXPORTER_OTLP_INSECURE=false