-
Notifications
You must be signed in to change notification settings - Fork 893
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify TLS/Secure default behavior #2420
Comments
I believe the default connection to localhost should be insecure (I am not aware of any benefits of using encryption for localhost connections). If we agree on this then the spec needs to be clarified. |
There are still a couple open questions in open-telemetry/opentelemetry-js#2827 Specifically:
Would appreciate some clarification/guidance here. |
The spec says that "insecure" option is ignored for OTLP/HTTP. So, with the default protocol of |
This is specifically for the gRPC exporter |
For gRPC the spec says:
I think we need to modify it to say that if the "http" or "https" scheme is used in the endpoint then that takes precedence over the insecure configuration setting (so, not just the "https" as it says currently, but also "http"). I think that should remove the ambiguity. |
So the insecure config is only used if there is no scheme in the URL? |
Yes, I think so. |
Fixes #2420 ## Changes - Clarify the insecure option for gRPC exporters Related issues - open-telemetry/opentelemetry-js#2827
Fixes open-telemetry#2420 ## Changes - Clarify the insecure option for gRPC exporters Related issues - open-telemetry/opentelemetry-js#2827
The configuration options for the OTLP gRPC exporter are a little unclear what to do if no endpoint is configured. By a strict reading of the current spec it seems like a secure connection to localhost:4317 should be made, but it seems likely that certificate validation will fail in this case most of the time if a certificate is not supplied to the client. I would propose a secure connection is only the default here if a certificate is provided for validation, or we should specify that if no endpoint is provided TLS certificate validation should be disabled.
The text was updated successfully, but these errors were encountered: