-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support TLS config for Zipkin Collector #3668
Comments
Hi @yurishkuro, What do you think ? |
Zipkin port - yes, admin ports - probably not. Most deployment platforms today do not automatically expose ports until explicitly requested (we even had requests to run Jaeger admin services on the same port as business services because of that), so you already have some control over who can see the admin port. Admin ports can be used for things like health checks, where TLS might actually get in the way. |
For grpc and http TLS is an option so it's up to the user to decide if he wants to use it or not but with admin the option is not available so it doesn't let any choice to the user. In my context every software is deployed on virtual machines and not containers. |
I'm not opposed to adding it, since we factored it out into a package that is easy to compose. |
Great! I can make another PR once the Zipkin's one is merged |
Requirement - what kind of business use case are you trying to solve?
TLS configuration options in jaeger-zipkin-collector - for reporting zipkin traces
Problem - what in Jaeger blocks you from solving the requirement?
TLS configuration options like tls.cert or tls.key are not available in jaeger-collector
The text was updated successfully, but these errors were encountered: