Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Customize /traces response #3448

Open
pamposh123 opened this issue May 17, 2022 · 4 comments
Open

Customize /traces response #3448

pamposh123 opened this issue May 17, 2022 · 4 comments
Labels

Comments

@pamposh123
Copy link

Zipkin traces api returns the ip and port in payload. We would like to suppress this info as it is recognized as security vulnerability.
image
Is there a way to suppress this info? We are ok with not having remoteEndPoint or localEndPoint nodes as well.

@pamposh123 pamposh123 added the bug label May 17, 2022
@jcchavezs
Copy link
Contributor

jcchavezs commented May 17, 2022 via email

@pamposh123
Copy link
Author

Thanks Carlos, do you have a example/document how collector can be used for this issue? I was looking at https://zipkin.io/pages/architecture.html but couldn't find details around collector usage to redact info.

@jcchavezs
Copy link
Contributor

You can use something like https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/processor/transformprocessor with an open telemetry collector but to be honest i looks like too much burden. You can also create your own processor where you redact those tags: receiver zipkin -> custom processor -> exporter zipkin.

@pamposh123
Copy link
Author

Thanks Carlos, where I find Zipkin documentation for creating custom processor. Any example/tutorial etc. will be very helpful.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants