Co-authored-by: Joao Grassi <joao.grassi@dynatrace.com>
This commit is contained in:
parent
002ace1b08
commit
12e49ad056
|
|
@ -127,12 +127,12 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin
|
|||
|
||||
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
||||
|
|
@ -196,12 +196,12 @@ Tracing instrumentations that do so, MUST also set `http.request.method_original
|
|||
|
||||
**[2]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[3]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
`http.request.method` has the following list of well-known values. If one of them applies, then the respective value MUST be used, otherwise a custom value MAY be used.
|
||||
|
|
@ -288,12 +288,12 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin
|
|||
|
||||
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
||||
|
|
@ -388,12 +388,12 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin
|
|||
|
||||
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
||||
|
|
|
|||
|
|
@ -9,14 +9,14 @@ groups:
|
|||
note: |
|
||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
- ref: server.port
|
||||
requirement_level: opt_in
|
||||
note: |
|
||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
- id: metric_attributes.http.client
|
||||
type: attribute_group
|
||||
|
|
@ -54,7 +54,7 @@ groups:
|
|||
note: |
|
||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
- ref: server.port
|
||||
requirement_level: opt_in
|
||||
|
|
@ -63,7 +63,7 @@ groups:
|
|||
note: |
|
||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||
> **Warning**
|
||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
||||
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||
|
||||
- id: metric.http.server.request.body.size
|
||||
|
|
|
|||
Loading…
Reference in New Issue