Co-authored-by: Joao Grassi <joao.grassi@dynatrace.com>
This commit is contained in:
parent
002ace1b08
commit
12e49ad056
|
|
@ -127,12 +127,12 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin
|
||||||
|
|
||||||
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
||||||
|
|
@ -196,12 +196,12 @@ Tracing instrumentations that do so, MUST also set `http.request.method_original
|
||||||
|
|
||||||
**[2]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[2]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[3]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[3]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
`http.request.method` has the following list of well-known values. If one of them applies, then the respective value MUST be used, otherwise a custom value MAY be used.
|
`http.request.method` has the following list of well-known values. If one of them applies, then the respective value MUST be used, otherwise a custom value MAY be used.
|
||||||
|
|
@ -288,12 +288,12 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin
|
||||||
|
|
||||||
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
||||||
|
|
@ -388,12 +388,12 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin
|
||||||
|
|
||||||
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[6]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
**[7]:** See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
**[8]:** The scheme of the original client request, if known (e.g. from [Forwarded](https://developer.mozilla.org/docs/Web/HTTP/Headers/Forwarded), [X-Forwarded-Proto](https://developer.mozilla.org/docs/Web/HTTP/Headers/X-Forwarded-Proto), or a similar header). Otherwise, the scheme of the immediate peer request.
|
||||||
|
|
|
||||||
|
|
@ -9,14 +9,14 @@ groups:
|
||||||
note: |
|
note: |
|
||||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
- ref: server.port
|
- ref: server.port
|
||||||
requirement_level: opt_in
|
requirement_level: opt_in
|
||||||
note: |
|
note: |
|
||||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
- id: metric_attributes.http.client
|
- id: metric_attributes.http.client
|
||||||
type: attribute_group
|
type: attribute_group
|
||||||
|
|
@ -54,7 +54,7 @@ groups:
|
||||||
note: |
|
note: |
|
||||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
- ref: server.port
|
- ref: server.port
|
||||||
requirement_level: opt_in
|
requirement_level: opt_in
|
||||||
|
|
@ -63,7 +63,7 @@ groups:
|
||||||
note: |
|
note: |
|
||||||
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
See [Setting `server.address` and `server.port` attributes](/docs/http/http-spans.md#setting-serveraddress-and-serverport-attributes).
|
||||||
> **Warning**
|
> **Warning**
|
||||||
> Since this attribute may be based on HTTP headers, opting in to it may allow an attacker
|
> Since this attribute is based on HTTP headers, opting in to it may allow an attacker
|
||||||
> to trigger cardinality limits, degrading the usefulness of the metric.
|
> to trigger cardinality limits, degrading the usefulness of the metric.
|
||||||
|
|
||||||
- id: metric.http.server.request.body.size
|
- id: metric.http.server.request.body.size
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue