-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Customize /traces response #3448
Comments
Thanks for coming by. You can use a collector to redact such information.
tir. 17. mai 2022, 19:49 skrev arun ***@***.***>:
… Zipkin traces api returns the ip and port in payload. We would like to
suppress this info as it is recognized as security vulnerability.
[image: image]
<https://user-images.githubusercontent.com/15619237/168877337-cdd6a036-b6e9-410e-833d-cc0e0edd8302.png>
Is there a way to suppress this info? We are ok with not having
remoteEndPoint or localEndPoint nodes as well.
—
Reply to this email directly, view it on GitHub
<#3448>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAXOYAUXL5OXDTP3YDPQFILVKPL3FANCNFSM5WFW7P5Q>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
Thanks Carlos, do you have a example/document how collector can be used for this issue? I was looking at https://zipkin.io/pages/architecture.html but couldn't find details around collector usage to redact info. |
You can use something like https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/processor/transformprocessor with an open telemetry collector but to be honest i looks like too much burden. You can also create your own processor where you redact those tags: receiver zipkin -> custom processor -> exporter zipkin. |
Thanks Carlos, where I find Zipkin documentation for creating custom processor. Any example/tutorial etc. will be very helpful. |
Zipkin traces api returns the ip and port in payload. We would like to suppress this info as it is recognized as security vulnerability.
Is there a way to suppress this info? We are ok with not having remoteEndPoint or localEndPoint nodes as well.
The text was updated successfully, but these errors were encountered: