Fix array attribute examples (#1325)
This commit is contained in:
parent
1e34b57b9f
commit
231528e8fd
|
|
@ -16,7 +16,7 @@ A container instance.
|
|||
| Attribute | Type | Description | Examples | Stability |
|
||||
| ------------------------------ | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------- |
|
||||
| `container.command` | string | The command used to run the container (i.e. the command name). [1] | `otelcontribcol` |  |
|
||||
| `container.command_args` | string[] | All the command arguments (including the command/executable itself) run by the container. [2] | `["otelcontribcol, --config, config.yaml"]` |  |
|
||||
| `container.command_args` | string[] | All the command arguments (including the command/executable itself) run by the container. [2] | `["otelcontribcol", "--config", "config.yaml"]` |  |
|
||||
| `container.command_line` | string | The full command run by the container as a single string representing the full command. [2] | `otelcontribcol --config config.yaml` |  |
|
||||
| `container.id` | string | Container ID. Usually a UUID, as for example used to [identify Docker containers](https://docs.docker.com/engine/reference/run/#container-identification). The UUID might be abbreviated. | `a3bf90e006b2` |  |
|
||||
| `container.image.id` | string | Runtime specific image identifier. Usually a hash algorithm followed by a UUID. [2] | `sha256:19c92d0a00d1b66d897bceaa7319bee0dd38a10a851c60bcec9474aa3f01e50f` |  |
|
||||
|
|
|
|||
|
|
@ -26,7 +26,7 @@ This document defines the attributes used to describe telemetry in the context o
|
|||
| `gen_ai.request.temperature` | double | The temperature setting for the GenAI request. | `0.0` |  |
|
||||
| `gen_ai.request.top_k` | double | The top_k sampling setting for the GenAI request. | `1.0` |  |
|
||||
| `gen_ai.request.top_p` | double | The top_p sampling setting for the GenAI request. | `1.0` |  |
|
||||
| `gen_ai.response.finish_reasons` | string[] | Array of reasons the model stopped generating tokens, corresponding to each generation received. | `["stop"]` |  |
|
||||
| `gen_ai.response.finish_reasons` | string[] | Array of reasons the model stopped generating tokens, corresponding to each generation received. | `["stop"]`; `["stop", "length"]` |  |
|
||||
| `gen_ai.response.id` | string | The unique identifier for the completion. | `chatcmpl-123` |  |
|
||||
| `gen_ai.response.model` | string | The name of the model that generated the response. | `gpt-4-0613` |  |
|
||||
| `gen_ai.system` | string | The Generative AI product as identified by the client or server instrumentation. [4] | `openai` |  |
|
||||
|
|
|
|||
|
|
@ -13,36 +13,36 @@
|
|||
|
||||
This document defines semantic convention attributes in the TLS namespace.
|
||||
|
||||
| Attribute | Type | Description | Examples | Stability |
|
||||
| ------------------------------ | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------- | ---------------------------------------------------------------- |
|
||||
| `tls.cipher` | string | String indicating the [cipher](https://datatracker.ietf.org/doc/html/rfc5246#appendix-A.5) used during the current connection. [1] | `TLS_RSA_WITH_3DES_EDE_CBC_SHA`; `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256` |  |
|
||||
| `tls.client.certificate` | string | PEM-encoded stand-alone certificate offered by the client. This is usually mutually-exclusive of `client.certificate_chain` since this value also exists in that list. | `MII...` |  |
|
||||
| `tls.client.certificate_chain` | string[] | Array of PEM-encoded certificates that make up the certificate chain offered by the client. This is usually mutually-exclusive of `client.certificate` since that value should be the first certificate in the chain. | `["MII...", "MI..."]` |  |
|
||||
| `tls.client.hash.md5` | string | Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0F76C7F2C55BFD7D8E8B8F4BFBF0C9EC` |  |
|
||||
| `tls.client.hash.sha1` | string | Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. | `9E393D93138888D288266C2D915214D1D1CCEB2A` |  |
|
||||
| `tls.client.hash.sha256` | string | Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0687F666A054EF17A08E2F2162EAB4CBC0D265E1D7875BE74BF3C712CA92DAF0` |  |
|
||||
| `tls.client.issuer` | string | Distinguished name of [subject](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6) of the issuer of the x.509 certificate presented by the client. | `CN=Example Root CA, OU=Infrastructure Team, DC=example, DC=com` |  |
|
||||
| `tls.client.ja3` | string | A hash that identifies clients based on how they perform an SSL/TLS handshake. | `d4e5b18d6b55c71272893221c96ba240` |  |
|
||||
| `tls.client.not_after` | string | Date/Time indicating when client certificate is no longer considered valid. | `2021-01-01T00:00:00.000Z` |  |
|
||||
| `tls.client.not_before` | string | Date/Time indicating when client certificate is first considered valid. | `1970-01-01T00:00:00.000Z` |  |
|
||||
| `tls.client.subject` | string | Distinguished name of subject of the x.509 certificate presented by the client. | `CN=myclient, OU=Documentation Team, DC=example, DC=com` |  |
|
||||
| `tls.client.supported_ciphers` | string[] | Array of ciphers offered by the client during the client hello. | `["TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "..."]` |  |
|
||||
| `tls.curve` | string | String indicating the curve used for the given cipher, when applicable | `secp256r1` |  |
|
||||
| `tls.established` | boolean | Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel. | `true` |  |
|
||||
| `tls.next_protocol` | string | String indicating the protocol being tunneled. Per the values in the [IANA registry](https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids), this string should be lower case. | `http/1.1` |  |
|
||||
| `tls.protocol.name` | string | Normalized lowercase protocol name parsed from original string of the negotiated [SSL/TLS protocol version](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES) | `ssl`; `tls` |  |
|
||||
| `tls.protocol.version` | string | Numeric part of the version parsed from the original string of the negotiated [SSL/TLS protocol version](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES) | `1.2`; `3` |  |
|
||||
| `tls.resumed` | boolean | Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation. | `true` |  |
|
||||
| `tls.server.certificate` | string | PEM-encoded stand-alone certificate offered by the server. This is usually mutually-exclusive of `server.certificate_chain` since this value also exists in that list. | `MII...` |  |
|
||||
| `tls.server.certificate_chain` | string[] | Array of PEM-encoded certificates that make up the certificate chain offered by the server. This is usually mutually-exclusive of `server.certificate` since that value should be the first certificate in the chain. | `["MII...", "MI..."]` |  |
|
||||
| `tls.server.hash.md5` | string | Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0F76C7F2C55BFD7D8E8B8F4BFBF0C9EC` |  |
|
||||
| `tls.server.hash.sha1` | string | Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. | `9E393D93138888D288266C2D915214D1D1CCEB2A` |  |
|
||||
| `tls.server.hash.sha256` | string | Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0687F666A054EF17A08E2F2162EAB4CBC0D265E1D7875BE74BF3C712CA92DAF0` |  |
|
||||
| `tls.server.issuer` | string | Distinguished name of [subject](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6) of the issuer of the x.509 certificate presented by the client. | `CN=Example Root CA, OU=Infrastructure Team, DC=example, DC=com` |  |
|
||||
| `tls.server.ja3s` | string | A hash that identifies servers based on how they perform an SSL/TLS handshake. | `d4e5b18d6b55c71272893221c96ba240` |  |
|
||||
| `tls.server.not_after` | string | Date/Time indicating when server certificate is no longer considered valid. | `2021-01-01T00:00:00.000Z` |  |
|
||||
| `tls.server.not_before` | string | Date/Time indicating when server certificate is first considered valid. | `1970-01-01T00:00:00.000Z` |  |
|
||||
| `tls.server.subject` | string | Distinguished name of subject of the x.509 certificate presented by the server. | `CN=myserver, OU=Documentation Team, DC=example, DC=com` |  |
|
||||
| Attribute | Type | Description | Examples | Stability |
|
||||
| ------------------------------ | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------- | ---------------------------------------------------------------- |
|
||||
| `tls.cipher` | string | String indicating the [cipher](https://datatracker.ietf.org/doc/html/rfc5246#appendix-A.5) used during the current connection. [1] | `TLS_RSA_WITH_3DES_EDE_CBC_SHA`; `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256` |  |
|
||||
| `tls.client.certificate` | string | PEM-encoded stand-alone certificate offered by the client. This is usually mutually-exclusive of `client.certificate_chain` since this value also exists in that list. | `MII...` |  |
|
||||
| `tls.client.certificate_chain` | string[] | Array of PEM-encoded certificates that make up the certificate chain offered by the client. This is usually mutually-exclusive of `client.certificate` since that value should be the first certificate in the chain. | `["MII...", "MI..."]` |  |
|
||||
| `tls.client.hash.md5` | string | Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0F76C7F2C55BFD7D8E8B8F4BFBF0C9EC` |  |
|
||||
| `tls.client.hash.sha1` | string | Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. | `9E393D93138888D288266C2D915214D1D1CCEB2A` |  |
|
||||
| `tls.client.hash.sha256` | string | Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0687F666A054EF17A08E2F2162EAB4CBC0D265E1D7875BE74BF3C712CA92DAF0` |  |
|
||||
| `tls.client.issuer` | string | Distinguished name of [subject](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6) of the issuer of the x.509 certificate presented by the client. | `CN=Example Root CA, OU=Infrastructure Team, DC=example, DC=com` |  |
|
||||
| `tls.client.ja3` | string | A hash that identifies clients based on how they perform an SSL/TLS handshake. | `d4e5b18d6b55c71272893221c96ba240` |  |
|
||||
| `tls.client.not_after` | string | Date/Time indicating when client certificate is no longer considered valid. | `2021-01-01T00:00:00.000Z` |  |
|
||||
| `tls.client.not_before` | string | Date/Time indicating when client certificate is first considered valid. | `1970-01-01T00:00:00.000Z` |  |
|
||||
| `tls.client.subject` | string | Distinguished name of subject of the x.509 certificate presented by the client. | `CN=myclient, OU=Documentation Team, DC=example, DC=com` |  |
|
||||
| `tls.client.supported_ciphers` | string[] | Array of ciphers offered by the client during the client hello. | `["TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"]` |  |
|
||||
| `tls.curve` | string | String indicating the curve used for the given cipher, when applicable | `secp256r1` |  |
|
||||
| `tls.established` | boolean | Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel. | `true` |  |
|
||||
| `tls.next_protocol` | string | String indicating the protocol being tunneled. Per the values in the [IANA registry](https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids), this string should be lower case. | `http/1.1` |  |
|
||||
| `tls.protocol.name` | string | Normalized lowercase protocol name parsed from original string of the negotiated [SSL/TLS protocol version](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES) | `ssl`; `tls` |  |
|
||||
| `tls.protocol.version` | string | Numeric part of the version parsed from the original string of the negotiated [SSL/TLS protocol version](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES) | `1.2`; `3` |  |
|
||||
| `tls.resumed` | boolean | Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation. | `true` |  |
|
||||
| `tls.server.certificate` | string | PEM-encoded stand-alone certificate offered by the server. This is usually mutually-exclusive of `server.certificate_chain` since this value also exists in that list. | `MII...` |  |
|
||||
| `tls.server.certificate_chain` | string[] | Array of PEM-encoded certificates that make up the certificate chain offered by the server. This is usually mutually-exclusive of `server.certificate` since that value should be the first certificate in the chain. | `["MII...", "MI..."]` |  |
|
||||
| `tls.server.hash.md5` | string | Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0F76C7F2C55BFD7D8E8B8F4BFBF0C9EC` |  |
|
||||
| `tls.server.hash.sha1` | string | Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. | `9E393D93138888D288266C2D915214D1D1CCEB2A` |  |
|
||||
| `tls.server.hash.sha256` | string | Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. | `0687F666A054EF17A08E2F2162EAB4CBC0D265E1D7875BE74BF3C712CA92DAF0` |  |
|
||||
| `tls.server.issuer` | string | Distinguished name of [subject](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6) of the issuer of the x.509 certificate presented by the client. | `CN=Example Root CA, OU=Infrastructure Team, DC=example, DC=com` |  |
|
||||
| `tls.server.ja3s` | string | A hash that identifies servers based on how they perform an SSL/TLS handshake. | `d4e5b18d6b55c71272893221c96ba240` |  |
|
||||
| `tls.server.not_after` | string | Date/Time indicating when server certificate is no longer considered valid. | `2021-01-01T00:00:00.000Z` |  |
|
||||
| `tls.server.not_before` | string | Date/Time indicating when server certificate is first considered valid. | `1970-01-01T00:00:00.000Z` |  |
|
||||
| `tls.server.subject` | string | Distinguished name of subject of the x.509 certificate presented by the server. | `CN=myserver, OU=Documentation Team, DC=example, DC=com` |  |
|
||||
|
||||
**[1]:** The values allowed for `tls.cipher` MUST be one of the `Descriptions` of the [registered TLS Cipher Suits](https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#table-tls-parameters-4).
|
||||
|
||||
|
|
|
|||
|
|
@ -61,7 +61,7 @@ These attributes track input data and metadata for a request to an GenAI model.
|
|||
| [`gen_ai.request.temperature`](/docs/attributes-registry/gen-ai.md) | double | The temperature setting for the GenAI request. | `0.0` | `Recommended` |  |
|
||||
| [`gen_ai.request.top_k`](/docs/attributes-registry/gen-ai.md) | double | The top_k sampling setting for the GenAI request. | `1.0` | `Recommended` |  |
|
||||
| [`gen_ai.request.top_p`](/docs/attributes-registry/gen-ai.md) | double | The top_p sampling setting for the GenAI request. | `1.0` | `Recommended` |  |
|
||||
| [`gen_ai.response.finish_reasons`](/docs/attributes-registry/gen-ai.md) | string[] | Array of reasons the model stopped generating tokens, corresponding to each generation received. | `["stop"]` | `Recommended` |  |
|
||||
| [`gen_ai.response.finish_reasons`](/docs/attributes-registry/gen-ai.md) | string[] | Array of reasons the model stopped generating tokens, corresponding to each generation received. | `["stop"]`; `["stop", "length"]` | `Recommended` |  |
|
||||
| [`gen_ai.response.id`](/docs/attributes-registry/gen-ai.md) | string | The unique identifier for the completion. | `chatcmpl-123` | `Recommended` |  |
|
||||
| [`gen_ai.response.model`](/docs/attributes-registry/gen-ai.md) | string | The name of the model that generated the response. [6] | `gpt-4-0613` | `Recommended` |  |
|
||||
| [`gen_ai.usage.input_tokens`](/docs/attributes-registry/gen-ai.md) | int | The number of tokens used in the GenAI input (prompt). | `100` | `Recommended` |  |
|
||||
|
|
|
|||
|
|
@ -25,7 +25,7 @@
|
|||
| [`container.runtime`](/docs/attributes-registry/container.md) | string | The container runtime managing this container. | `docker`; `containerd`; `rkt` | `Recommended` |  |
|
||||
| [`oci.manifest.digest`](/docs/attributes-registry/oci.md) | string | The digest of the OCI image manifest. For container images specifically is the digest by which the container image is known. [3] | `sha256:e4ca62c0d62f3e886e684806dfe9d4e0cda60d54986898173c1083856cfda0f4` | `Recommended` |  |
|
||||
| [`container.command`](/docs/attributes-registry/container.md) | string | The command used to run the container (i.e. the command name). [4] | `otelcontribcol` | `Opt-In` |  |
|
||||
| [`container.command_args`](/docs/attributes-registry/container.md) | string[] | All the command arguments (including the command/executable itself) run by the container. [2] | `["otelcontribcol, --config, config.yaml"]` | `Opt-In` |  |
|
||||
| [`container.command_args`](/docs/attributes-registry/container.md) | string[] | All the command arguments (including the command/executable itself) run by the container. [2] | `["otelcontribcol", "--config", "config.yaml"]` | `Opt-In` |  |
|
||||
| [`container.command_line`](/docs/attributes-registry/container.md) | string | The full command run by the container as a single string representing the full command. [2] | `otelcontribcol --config config.yaml` | `Opt-In` |  |
|
||||
|
||||
**[1]:** Docker defines a sha256 of the image id; `container.image.id` corresponds to the `Image` field from the Docker container inspect [API](https://docs.docker.com/engine/api/v1.43/#tag/Container/operation/ContainerInspect) endpoint.
|
||||
|
|
|
|||
|
|
@ -23,38 +23,37 @@ groups:
|
|||
stability: experimental
|
||||
brief: The keys in the `RequestItems` object field.
|
||||
examples:
|
||||
- Users
|
||||
- Cats
|
||||
- [Users, Cats]
|
||||
- id: aws.dynamodb.consumed_capacity
|
||||
type: string[]
|
||||
stability: experimental
|
||||
brief: "The JSON-serialized value of each item in the `ConsumedCapacity` response field."
|
||||
examples:
|
||||
- '{
|
||||
- ['{
|
||||
"CapacityUnits": number,
|
||||
"GlobalSecondaryIndexes": {
|
||||
"string" : {
|
||||
"string" : {
|
||||
"CapacityUnits": number,
|
||||
"ReadCapacityUnits": number,
|
||||
"WriteCapacityUnits": number
|
||||
}
|
||||
}
|
||||
},
|
||||
"LocalSecondaryIndexes": {
|
||||
"string" : {
|
||||
"string" : {
|
||||
"CapacityUnits": number,
|
||||
"ReadCapacityUnits": number,
|
||||
"WriteCapacityUnits": number
|
||||
}
|
||||
}
|
||||
},
|
||||
"ReadCapacityUnits": number,
|
||||
"Table": {
|
||||
"CapacityUnits": number,
|
||||
"ReadCapacityUnits": number,
|
||||
"WriteCapacityUnits": number
|
||||
"CapacityUnits": number,
|
||||
"ReadCapacityUnits": number,
|
||||
"WriteCapacityUnits": number
|
||||
},
|
||||
"TableName": "string",
|
||||
"WriteCapacityUnits": number
|
||||
}'
|
||||
}']
|
||||
- id: aws.dynamodb.item_collection_metrics
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
@ -62,29 +61,29 @@ groups:
|
|||
examples:
|
||||
- '{
|
||||
"string" : [
|
||||
{
|
||||
{
|
||||
"ItemCollectionKey": {
|
||||
"string" : {
|
||||
"string" : {
|
||||
"B": blob,
|
||||
"BOOL": boolean,
|
||||
"BS": [ blob ],
|
||||
"L": [
|
||||
"AttributeValue"
|
||||
"AttributeValue"
|
||||
],
|
||||
"M": {
|
||||
"string" : "AttributeValue"
|
||||
"string" : "AttributeValue"
|
||||
},
|
||||
"N": "string",
|
||||
"NS": [ "string" ],
|
||||
"NULL": boolean,
|
||||
"S": "string",
|
||||
"SS": [ "string" ]
|
||||
}
|
||||
}
|
||||
},
|
||||
"SizeEstimateRangeGB": [ number ]
|
||||
}
|
||||
}
|
||||
]
|
||||
}'
|
||||
}'
|
||||
- id: aws.dynamodb.provisioned_read_capacity
|
||||
type: double
|
||||
stability: experimental
|
||||
|
|
@ -122,8 +121,7 @@ groups:
|
|||
stability: experimental
|
||||
brief: "The value of the `AttributesToGet` request parameter."
|
||||
examples:
|
||||
- lives
|
||||
- id
|
||||
- [lives, id]
|
||||
- id: aws.dynamodb.index_name
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
@ -142,7 +140,7 @@ groups:
|
|||
stability: experimental
|
||||
brief: "The JSON-serialized value of each item of the `GlobalSecondaryIndexes` request field"
|
||||
examples:
|
||||
- '{
|
||||
- ['{
|
||||
"IndexName": "string",
|
||||
"KeySchema": [
|
||||
{
|
||||
|
|
@ -158,13 +156,13 @@ groups:
|
|||
"ReadCapacityUnits": number,
|
||||
"WriteCapacityUnits": number
|
||||
}
|
||||
}'
|
||||
}']
|
||||
- id: aws.dynamodb.local_secondary_indexes
|
||||
type: string[]
|
||||
stability: experimental
|
||||
brief: "The JSON-serialized value of each item of the `LocalSecondaryIndexes` request field."
|
||||
examples:
|
||||
- '{
|
||||
- ['{
|
||||
"IndexArn": "string",
|
||||
"IndexName": "string",
|
||||
"IndexSizeBytes": number,
|
||||
|
|
@ -179,14 +177,12 @@ groups:
|
|||
"NonKeyAttributes": [ "string" ],
|
||||
"ProjectionType": "string"
|
||||
}
|
||||
}'
|
||||
}']
|
||||
- id: aws.dynamodb.exclusive_start_table
|
||||
type: string
|
||||
stability: experimental
|
||||
brief: "The value of the `ExclusiveStartTableName` request parameter."
|
||||
examples:
|
||||
- Users
|
||||
- CatsTable
|
||||
examples: [Users, CatsTable]
|
||||
- id: aws.dynamodb.table_count
|
||||
type: int
|
||||
stability: experimental
|
||||
|
|
@ -226,16 +222,16 @@ groups:
|
|||
stability: experimental
|
||||
brief: "The JSON-serialized value of each item in the `AttributeDefinitions` request field."
|
||||
examples:
|
||||
- '{
|
||||
- ['{
|
||||
"AttributeName": "string",
|
||||
"AttributeType": "string"
|
||||
}'
|
||||
}']
|
||||
- id: aws.dynamodb.global_secondary_index_updates
|
||||
type: string[]
|
||||
stability: experimental
|
||||
brief: "The JSON-serialized value of each item in the `GlobalSecondaryIndexUpdates` request field."
|
||||
examples:
|
||||
- '{
|
||||
- ['{
|
||||
"Create": {
|
||||
"IndexName": "string",
|
||||
"KeySchema": [
|
||||
|
|
@ -252,7 +248,7 @@ groups:
|
|||
"ReadCapacityUnits": number,
|
||||
"WriteCapacityUnits": number
|
||||
}
|
||||
}'
|
||||
}']
|
||||
- id: registry.aws.ecs
|
||||
type: attribute_group
|
||||
display_name: Amazon ECS Attributes
|
||||
|
|
@ -335,7 +331,8 @@ groups:
|
|||
stability: experimental
|
||||
brief: >
|
||||
The name(s) of the AWS log group(s) an application is writing to.
|
||||
examples: ['/aws/lambda/my-function', 'opentelemetry-service']
|
||||
examples:
|
||||
- ['/aws/lambda/my-function', 'opentelemetry-service']
|
||||
note: >
|
||||
Multiple log groups must be supported for cases like multi-container applications,
|
||||
where a single application has sidecar containers, and each write to their own log
|
||||
|
|
@ -345,7 +342,8 @@ groups:
|
|||
stability: experimental
|
||||
brief: >
|
||||
The Amazon Resource Name(s) (ARN) of the AWS log group(s).
|
||||
examples: ['arn:aws:logs:us-west-1:123456789012:log-group:/aws/my/group:*']
|
||||
examples:
|
||||
- ['arn:aws:logs:us-west-1:123456789012:log-group:/aws/my/group:*']
|
||||
note: >
|
||||
See the
|
||||
[log group ARN format documentation](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/iam-access-control-overview-cwl.html#CWL_ARN_Format).
|
||||
|
|
@ -354,13 +352,15 @@ groups:
|
|||
stability: experimental
|
||||
brief: >
|
||||
The name(s) of the AWS log stream(s) an application is writing to.
|
||||
examples: ['logs/main/10838bed-421f-43ef-870a-f43feacbbb5b']
|
||||
examples:
|
||||
- ['logs/main/10838bed-421f-43ef-870a-f43feacbbb5b']
|
||||
- id: aws.log.stream.arns
|
||||
type: string[]
|
||||
stability: experimental
|
||||
brief: >
|
||||
The ARN(s) of the AWS log stream(s).
|
||||
examples: ['arn:aws:logs:us-west-1:123456789012:log-group:/aws/my/group:log-stream:logs/main/10838bed-421f-43ef-870a-f43feacbbb5b']
|
||||
examples:
|
||||
- ['arn:aws:logs:us-west-1:123456789012:log-group:/aws/my/group:log-stream:logs/main/10838bed-421f-43ef-870a-f43feacbbb5b']
|
||||
note: >
|
||||
See the
|
||||
[log stream ARN format documentation](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/iam-access-control-overview-cwl.html#CWL_ARN_Format).
|
||||
|
|
|
|||
|
|
@ -13,7 +13,8 @@ groups:
|
|||
This value is intended to be taken from the
|
||||
[UA client hints API](https://wicg.github.io/ua-client-hints/#interface)
|
||||
(`navigator.userAgentData.brands`).
|
||||
examples: [ " Not A;Brand 99", "Chromium 99", "Chrome 99" ]
|
||||
examples:
|
||||
- [ ' Not A;Brand 99', 'Chromium 99', 'Chrome 99' ]
|
||||
- id: browser.platform
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
|
|||
|
|
@ -39,7 +39,8 @@ groups:
|
|||
[Docker Image Inspect](https://docs.docker.com/engine/api/v1.43/#tag/Image/operation/ImageInspect).
|
||||
Should be only the `<tag>` section of the full name for example
|
||||
from `registry.example.com/my-org/my-image:<tag>`.
|
||||
examples: ['v1.27.1', '3.5.7-0']
|
||||
examples:
|
||||
- ['v1.27.1', '3.5.7-0']
|
||||
- id: container.image.id
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
@ -67,8 +68,10 @@ groups:
|
|||
[CRI](https://github.com/kubernetes/cri-api/blob/c75ef5b473bbe2d0a4fc92f82235efd665ea8e9f/pkg/apis/runtime/v1/api.proto#L1237-L1238)
|
||||
report those under the `RepoDigests` field.
|
||||
examples:
|
||||
- 'example@sha256:afcc7f1ac1b49db317a7196c902e61c6c3c4607d63599ee1a82d702d249a0ccb'
|
||||
- 'internal.registry.example.com:5000/example@sha256:b69959407d21e8a062e0416bf13405bb2b71ed7a84dde4158ebafacfa06f5578'
|
||||
- [
|
||||
'example@sha256:afcc7f1ac1b49db317a7196c902e61c6c3c4607d63599ee1a82d702d249a0ccb',
|
||||
'internal.registry.example.com:5000/example@sha256:b69959407d21e8a062e0416bf13405bb2b71ed7a84dde4158ebafacfa06f5578'
|
||||
]
|
||||
- id: container.command
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
@ -88,7 +91,8 @@ groups:
|
|||
stability: experimental
|
||||
brief: >
|
||||
All the command arguments (including the command/executable itself) run by the container. [2]
|
||||
examples: [ 'otelcontribcol, --config, config.yaml' ]
|
||||
examples:
|
||||
- [ 'otelcontribcol', '--config', 'config.yaml' ]
|
||||
- id: container.label
|
||||
type: template[string]
|
||||
stability: experimental
|
||||
|
|
|
|||
|
|
@ -66,7 +66,8 @@ groups:
|
|||
stability: experimental
|
||||
type: string[]
|
||||
brief: List of sequences that the model will use to stop generating further tokens.
|
||||
examples: ['forest', 'lived']
|
||||
examples:
|
||||
- [forest, lived]
|
||||
- id: gen_ai.request.frequency_penalty
|
||||
stability: experimental
|
||||
type: double
|
||||
|
|
@ -91,7 +92,9 @@ groups:
|
|||
stability: experimental
|
||||
type: string[]
|
||||
brief: Array of reasons the model stopped generating tokens, corresponding to each generation received.
|
||||
examples: ['stop']
|
||||
examples:
|
||||
- [stop]
|
||||
- [stop, length]
|
||||
- id: gen_ai.usage.input_tokens
|
||||
stability: experimental
|
||||
type: int
|
||||
|
|
|
|||
|
|
@ -92,7 +92,8 @@ groups:
|
|||
note: >
|
||||
IPv4 Addresses MUST be specified in dotted-quad notation. IPv6 addresses
|
||||
MUST be specified in the [RFC 5952](https://www.rfc-editor.org/rfc/rfc5952.html) format.
|
||||
examples: ["192.168.1.140", "fe80::abc2:4a28:737a:609e"]
|
||||
examples:
|
||||
- ["192.168.1.140", "fe80::abc2:4a28:737a:609e"]
|
||||
- id: host.mac
|
||||
stability: experimental
|
||||
type: string[]
|
||||
|
|
@ -101,7 +102,8 @@ groups:
|
|||
note: >
|
||||
MAC Addresses MUST be represented in [IEEE RA hexadecimal form](https://standards.ieee.org/wp-content/uploads/import/documents/tutorials/eui.pdf):
|
||||
as hyphen-separated octets in uppercase hexadecimal form from most to least significant.
|
||||
examples: ['AC-DE-48-23-45-67', 'AC-DE-48-23-45-67-01-9F']
|
||||
examples:
|
||||
- ['AC-DE-48-23-45-67', 'AC-DE-48-23-45-67-01-9F']
|
||||
- id: host.cpu.vendor.id
|
||||
stability: experimental
|
||||
type: string
|
||||
|
|
|
|||
|
|
@ -287,7 +287,8 @@ groups:
|
|||
stability: experimental
|
||||
brief: >
|
||||
Key(s) of message, another way to mark message besides message id.
|
||||
examples: ['keyA', 'keyB']
|
||||
examples:
|
||||
- [keyA, keyB]
|
||||
- id: messaging.rocketmq.message.tag
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
|
|||
|
|
@ -83,7 +83,8 @@ groups:
|
|||
systems supporting procfs), can be set according to the list of
|
||||
null-delimited strings extracted from `proc/[pid]/cmdline`. For libc-based
|
||||
executables, this would be the full argv vector passed to `main`.
|
||||
examples: ['cmd/otecol', '--config=config.yaml']
|
||||
examples:
|
||||
- ['cmd/otecol', '--config=config.yaml']
|
||||
- id: args_count
|
||||
type: int
|
||||
stability: experimental
|
||||
|
|
|
|||
|
|
@ -29,7 +29,8 @@ groups:
|
|||
brief: >
|
||||
Array of PEM-encoded certificates that make up the certificate chain offered by the client.
|
||||
This is usually mutually-exclusive of `client.certificate` since that value should be the first certificate in the chain.
|
||||
examples: ["MII...", "MI..."]
|
||||
examples:
|
||||
- ['MII...', 'MI...']
|
||||
- id: tls.client.hash.md5
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
@ -83,9 +84,7 @@ groups:
|
|||
stability: experimental
|
||||
brief: Array of ciphers offered by the client during the client hello.
|
||||
examples:
|
||||
[
|
||||
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "..."
|
||||
]
|
||||
- [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384]
|
||||
- id: tls.curve
|
||||
brief: "String indicating the curve used for the given cipher, when applicable"
|
||||
type: string
|
||||
|
|
@ -139,7 +138,8 @@ groups:
|
|||
brief: >
|
||||
Array of PEM-encoded certificates that make up the certificate chain offered by the server.
|
||||
This is usually mutually-exclusive of `server.certificate` since that value should be the first certificate in the chain.
|
||||
examples: ["MII...", "MI..."]
|
||||
examples:
|
||||
- ["MII...", "MI..."]
|
||||
- id: tls.server.hash.md5
|
||||
type: string
|
||||
stability: experimental
|
||||
|
|
|
|||
|
|
@ -41,4 +41,5 @@ groups:
|
|||
stability: experimental
|
||||
brief: >
|
||||
Array of user roles at the time of the event.
|
||||
examples: ["admin", "reporting_user"]
|
||||
examples:
|
||||
- [admin, reporting_user]
|
||||
|
|
|
|||
Loading…
Reference in New Issue