-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
reload_interval TLS option not working for otlphttp exporter #11265
Comments
@Morgan-Li I see seperate cert files receiver and exporter in the config, |
@shivanthzen Yes, both |
Apparently we can only hotreload server and client key/certificates, not opentelemetry-collector/config/configtls/configtls.go Lines 205 to 213 in 2278eed
|
This is a known issue in golang. There is no way to reload ca certificates for tls connections in golang as of now. |
Describe the bug
The
reload_interval
TLS option is not working for the otlphttp exporter. I am seeing this on an OpenShift Kubernetes environment where I have an Open Liberty pod exporting logs and metrics to an OpenTelemetry collector which in turn exports to a fluentbit pod. And I am using cert-manager operator created certificates to set up TLS between the two.Steps to reproduce
To test hot reloading certificates I am manually deleting the certificate secrets mounted to the open liberty server, the otel collector, and fluent bit pods to regenerate them. I then restart the open liberty pod, but not the otelcol or fluent bit pod. This works as expected, and logs can still flow from openliberty->otelcol->fluentbit. But, when I restart the fluent bit pod I get these errors on otelcol:
Indicating that the exporter is still using the old certificates. Even though I set the reload_interval option in the exporter config. The receiver seems to be reloading the certificate though as restarting the liberty pod and not otelcol (to get new certs on liberty pod) works. And after restarting the otelcol pod to get the exporter to use the new certificates, the exporter errors go away.
What did you expect to see?
I expect to see otel collector hot reloading the certificate without a restart when exporting logs and metrics using otlphttp exporter.
What did you see instead?
The otel collector was still exporting logs using the old certificates and the exporting failed with errors until the pod was restarted.
What version did you use?
Open Telemetry Collector v0.105.0
Fluent Bit v3.1.8
What config did you use?
Environment
OpenShift kubernetes based environment v4.16.7
Additional context
The text was updated successfully, but these errors were encountered: