-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Panic on collector start when using otlp exporter with tls: insecure: true
and headers_setter
extension
#16508
Comments
Pinging code owners:
See Adding Labels via Comments if you do not have permissions to add labels yourself. |
This is related (duplicate) to open-telemetry/opentelemetry-collector#6619. Work in progress. I will try to get the fix in as soon as I can. But please note that even after the fix, the collector will still refuse to communicate insecurely. |
@pavankrish123 That seems right, but a pain to require TLS for dynamic headers. Further background is that we use a linkerd service mesh to provide mTLS connections between kubernetes components, so the requirement of adding TLS inside the service mesh TLS, to use an auth extension seems extremely strict. |
@gburek-fastly, I think the behavior is expected from underlying grpc framework if we want to use any credentials. As I did mention above the fix I am working on will alleviate the panic but the collector still fails gracefully. Adding @jpkrohling for additional suggestions on how to go about modifying the |
Your comment sparked a thought and I have found the
|
/label -needs-triage |
The panic issue is fixed. We can close this now. |
While this might have the same underlying cause, I think this deserves a bit more attention: opentelemetry-collector-contrib/extension/headerssetterextension/extension.go Lines 93 to 95 in f19ae14
@kovrus, do you remember whether there's a reason for us to require secure transport here? The header setter is not necessarily sending auth data, so, it shouldn't require a secure transport, should it? |
Actually, I do not remember, it probably should be safe to not require a secure transport for this extension. I'll open a PR for it. |
Component(s)
extension/headerssetter
What happened?
Description
When using the headers_setter extension with an otlp exporter, configured with
tls: insecure: true
, the contrib collector panics on start. Removing thetls: insecure: true
or theheaders_setter
extension from the exporter config, allows start up to succeed.Steps to Reproduce
Using the attached config.yaml, run:
Expected Result
The collector starts and uses context to attach a header to all traces exported
Actual Result
The collector crashes and does not start
Collector version
v0.66.0
Environment information
Environment
OS: OSX 12.6.1
Docker Desktop 4.13.1
OpenTelemetry Collector configuration
Log output
Additional context
Context is that I am attempting to use the
headers_setter
extension to add a multi-tenancy header to the otlp grpc exporter pointing at a tempo backend, as mentioned in https://grafana.com/docs/tempo/latest/configuration/multitenancy/The text was updated successfully, but these errors were encountered: