Skip to content
This repository has been archived by the owner on Dec 6, 2024. It is now read-only.

Scope and roadmap for bringing the existing HTTP semantic conventions for tracing to an initial stable state #174

Conversation

denisivan0v
Copy link
Contributor

Semantic conventions for tracing for HTTP are available, but are in an experimental state.

A workgroup focusing on HTTP conventions is requested and will work on bringing the existing semantic conventions for HTTP to a stable state once established.

This documents proposes a scope for an initial stable version of HTTP semantic conventions, as well as a roadmap. It should serve as a starting point for initial discussions in the workgroup and, once agreed on, define the further agenda of the workgroup.

@denisivan0v denisivan0v requested review from a team September 10, 2021 14:34
@linux-foundation-easycla

This comment has been minimized.

@WillsonHG

This comment has been minimized.

@denisivan0v denisivan0v changed the title Scope and roadmap for bringing the existing semantic conventions for HTTP to an initial stable state Scope and roadmap for bringing the existing HTTP semantic conventions for tracing to an initial stable state Sep 28, 2021
@lmolkova
Copy link
Contributor

Adding security concerns to the scope: http.target has a query string that may have credentials, by default web frameworks/http clients should not expose potentially sensitive information.

@Oberon00
Copy link
Member

Oberon00 commented Sep 29, 2021

@lmolkova

http.target has a query string that may have credentials

I have never heard of anybody including credentials in a query string. HTTP basic auth (user:password@hostname) is already addressed in the spec.

On the other hand, Java frameworks have been using the otherwise very obscure "matrix param" format with semicolons to include a session ID: https://stackoverflow.com/a/23600711/2128694 (URLs like http://www.example.com/context;JSESSIONID=12345?query_param1=ABC may look familiar).

In any case, http.target is security-sensitive even if you remove the query string. Nowadays, things that would previously have been put into query strings are often included in the path through HTTP route templates like /search/<term> instead of /search?q=<term>. User IDs, etc. are also often included.

Hostnames (subdomains) may also be user-specific or tenant-specific (common example are AWS login URLs like 1234567891011.signin.aws.amazon.com/console where the first part is the account ID). IPs are PII. Probably there is more.

@lmolkova
Copy link
Contributor

I have never heard of anybody including credentials in a query string. HTTP basic auth (user:password@hostname) is already addressed in the spec.

https://docs.microsoft.com/en-us/azure/storage/common/storage-sas-overview#sas-token
https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth

Should we make the target a required attribute if it's sensitive? Perhaps we should define the default level of sanitization and how it can be customzed?

I don't want to go into the technical discussion here. This otep currently summarizes gaps/concerns on current spec on the way to stability, not proposes solutions.

@tedsuo
Copy link
Contributor

tedsuo commented Nov 2, 2021

just FYI, changing 4xx responses to no longer create error status codes on the server has already happened. I'd suggest putting "Error status default" as in-scope, and leave "configuration" as vNext.

@denisivan0v
Copy link
Contributor Author

I'd suggest putting "Error status default" as in-scope, and leave "configuration" as vNext.

@tedsuo I've updated the OTEP adding the following in-scope for v1:

4xx responses are no longer create error status codes in case of `SpanKind.SERVER`. 
It seems reasonable to define the same/similar behavior for `SpanKind.CLIENT`.

An the following for the vNext:

In many cases 4xx error criteria depends on the app (e.g., for 404/409). As an
end user, I might want to have an ability to override existing defaults and
define what HTTP status codes count as errors.

@MovieStoreGuy
Copy link
Contributor

So far this addition makes sense as an initial steps towards a first stable release with vNext incrementally adding more improvements.

Copy link
Contributor

@tedsuo tedsuo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for organizing this!

@yurishkuro
Copy link
Member

Within this PR/OTEP I'm aiming to outline the scope for v1.0 (and for vNext), so it's mostly about "we need to decide..."

This is not how the PR is written though. You have specific section that contain very concrete (and not yet agreed to) prescriptions like "these are required attributes" or "this is how retries must be handled". They do not at all read like "these are things we need to decide in other tickets". To me it's a blocker for approving this OTEP.

@denisivan0v
Copy link
Contributor Author

@yurishkuro Fair enough. I've re-phrased sentences to avoid providing concrete prescriptions in this OTEP. Do you now see any section that might be improved further?

@denisivan0v
Copy link
Contributor Author

@lmolkova Should the span suppression topic be added in scope for v1.0? /cc @tedsuo

Copy link

@jamesmoessis jamesmoessis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My prior concerns have been resolved. After SIG discussion, I am happy with what this PR proposes as an initial stable state.

@lmolkova
Copy link
Contributor

lmolkova commented Jan 5, 2022

@lmolkova Should the span suppression topic be added in scope for v1.0

I don't think suppression is a blocker for HTTP semantic conventions.

Copy link
Contributor

@jmacd jmacd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks ready to merge.

Copy link
Member

@tigrannajaryan tigrannajaryan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good to me as a roadmap. I assume the actual semantic conventions will be fleshed out in the specification repo.

@denisivan0v
Copy link
Contributor Author

@tigrannajaryan that's right, items in scope are going to be addressed via separate PRs in the specification repo.

@tedsuo can you please help to merge this PR?

@carlosalberto carlosalberto merged commit 218be9e into open-telemetry:main Jan 27, 2022
tigrannajaryan pushed a commit to open-telemetry/opentelemetry-specification that referenced this pull request Mar 9, 2022
This PR clarifies semantic conventions for HTTP retries and redirects and defines a span structure and linking as well as span attributes for retries. Changes were discussed recently at Instrumentation SIG meetings.

This change addresses a scenario which is in the scope for bringing the existing HTTP semantic conventions for tracing to an initial stable state, see related [otep #174](open-telemetry/oteps#174).
ChengJinbao added a commit to ChengJinbao/opentelemetry-specification that referenced this pull request Nov 16, 2022
This PR clarifies semantic conventions for HTTP retries and redirects and defines a span structure and linking as well as span attributes for retries. Changes were discussed recently at Instrumentation SIG meetings.

This change addresses a scenario which is in the scope for bringing the existing HTTP semantic conventions for tracing to an initial stable state, see related [otep #174](open-telemetry/oteps#174).
jsuereth pushed a commit to jsuereth/otel-semconv-test that referenced this pull request Apr 19, 2023
This PR clarifies semantic conventions for HTTP retries and redirects and defines a span structure and linking as well as span attributes for retries. Changes were discussed recently at Instrumentation SIG meetings.

This change addresses a scenario which is in the scope for bringing the existing HTTP semantic conventions for tracing to an initial stable state, see related [otep #174](open-telemetry/oteps#174).
jsuereth pushed a commit to open-telemetry/semantic-conventions that referenced this pull request May 11, 2023
This PR clarifies semantic conventions for HTTP retries and redirects and defines a span structure and linking as well as span attributes for retries. Changes were discussed recently at Instrumentation SIG meetings.

This change addresses a scenario which is in the scope for bringing the existing HTTP semantic conventions for tracing to an initial stable state, see related [otep #174](open-telemetry/oteps#174).
joaopgrassi pushed a commit to dynatrace-oss-contrib/semantic-conventions that referenced this pull request Mar 21, 2024
This PR clarifies semantic conventions for HTTP retries and redirects and defines a span structure and linking as well as span attributes for retries. Changes were discussed recently at Instrumentation SIG meetings.

This change addresses a scenario which is in the scope for bringing the existing HTTP semantic conventions for tracing to an initial stable state, see related [otep open-telemetry#174](open-telemetry/oteps#174).
carlosalberto pushed a commit to carlosalberto/oteps that referenced this pull request Oct 23, 2024
carlosalberto pushed a commit to carlosalberto/oteps that referenced this pull request Oct 23, 2024
carlosalberto pushed a commit to carlosalberto/oteps that referenced this pull request Oct 30, 2024
carlosalberto pushed a commit to open-telemetry/opentelemetry-specification that referenced this pull request Nov 8, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.