-
Notifications
You must be signed in to change notification settings - Fork 895
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is it ok for http.scheme to factor in forwarded "proto" field / x-forwarded-proto headers? #2338
Comments
I think other users can "panic" if they see that their servers behind the API gateway are accessed with https and not http. In my opinion, it is best to report what actually happened as it is easier to understand and implement. If the gateway itself is instrumented, that could result in client/server couple where one end is
I support recording this data. Since we already have the http-request-and-response-headers speced and implemented, it could make sense to capture it to |
maybe
|
This makes sense as well. I think the benefits of recording it into the
Recording it to the
|
one concern about |
But the parsing still needs to be done, right? It's just being done at instrumentation time vs doing it at collector / backend / viewer on demand |
Some thoughts here: each header requires explicit enablement to be populated, so duplication would only happen if user needs the contents of the parsing seems to be one pass over the string and in the worst case getting a substring. It can be optimized to do nothing at all when forwarded proto matches So, neither duplication nor parsing don't seem like a problem in this case. Assuming we introduce an attribute for forwarded protocol, we might eventually introduce attributes for other
So I suggest to remove namespace depends on results of ECS conversation, but I'd suggest
We don't need to spec all of them out right away, but probably just start with |
I think we have resolution on the question asked by this issue, so I have created a new issue specifically about the remaining question: Where to capture HTTP forwarded proto (original url.scheme)? |
What are you trying to achieve?
Reduce user confusion/panic about why we report a server request as
http
when it was "really"https
.This happens commonly when terminating SSL in front of the process that is capturing telemetry.
I'd like to respect the forwarded/x-forwarded-proto headers when capturing
http.scheme
.But if that is not acceptable, it would be helpful to introduce a new attribute to capture the forwarded "proto" field / x-forwarded field so that backends can decide to display that instead if they prefer.
The text was updated successfully, but these errors were encountered: