Skip to content

ENGTAI-67042: adding identifying attributes config#44

Merged
thugrock7 merged 1 commit intomainfrom
identifying-attributes
Aug 22, 2025
Merged

ENGTAI-67042: adding identifying attributes config#44
thugrock7 merged 1 commit intomainfrom
identifying-attributes

Conversation

@thugrock7
Copy link
Contributor

No description provided.

Copy link
Contributor

@varkey98 varkey98 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pls link a ticket to the pr title

// Agent identification attributes config
message AgentIdentity {
// path of the agent ID file
google.protobuf.StringValue id_file = 1;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What's gonna be inside the identity file?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the ID of agent, for the cases to preserve same ID for agent even on restarts we use this

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh okay, thanks

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the ID itself automatically generated or does this need to be set by the customer?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For this I think the idea is that we make our bootstrap logic (deb or rpm scripts for VMs & helm or tf for k8s) populate. Not sure what we can do for docker though. Although if its used by external services ECS, we can again make the ecs template put this value in so that it doesnt change for a deployment.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the ID itself automatically generated or does this need to be set by the customer?

ID itself should be automatically generated. This config just exposes file path of optional configuring where to store that ID file. The responsibility of generating that ID still lies with agent (like in goagent).

For this I think the idea is that we make our bootstrap logic (deb or rpm scripts for VMs & helm or tf for k8s) populate. Not sure what we can do for docker though. Although if its used by external services ECS, we can again make the ecs template put this value in so that it doesnt change for a deployment.

Yup, we will be populating this value in our bootstrap logic for VM/k8's(helm/tf) deployments with a default value and will not involve customer unless they want to place this file on some different location.

varkey98
varkey98 previously approved these changes Aug 19, 2025
@tim-mwangi
Copy link
Contributor

tim-mwangi commented Aug 19, 2025

Pls link a ticket to the pr title

+1
Avoid NO-TICKET as much as possible.

// path of the agent ID file
google.protobuf.StringValue id_file = 1;
// deployment_name is used as a part of Agent Identifying attributes to group the agents
google.protobuf.StringValue deployment_name = 2;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this optional or can it be inferred from config the customer already sets? eg cluster-name. It's good to have it configurable but would love to avoid customers adding even more config especially for telemetry.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1. I always thought this would be just internal use. In that case, maybe we can wire this in as options pattern instead of adding it as a config

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this optional or can it be inferred from config the customer already sets?

This is optional and will be provided by customer if they want to group/identify the specific agent. One of the use case is like, say if customer have multiple TPA deployments in different regions, and say they want to update config / perform some debug initiatives on TPA/TPA's of one region, then configuring this field would come into play.

I always thought this would be just internal use.

Nope, this is set by the customer.

Discussion over this can be found in 1st page https://docs.google.com/document/d/1IdgmQJDA0bAL9uqjc6w3cILHGDRMaqs1k77HnQBVTzQ/edit?tab=t.0

@varkey98 varkey98 dismissed their stale review August 20, 2025 04:53

Will wait for Tim's approval

@thugrock7 thugrock7 changed the title NO-TICKET: adding identifying attributes config ENGTAI-67042: adding identifying attributes config Aug 20, 2025
@thugrock7 thugrock7 merged commit c8d86e1 into main Aug 22, 2025
1 check passed
@thugrock7 thugrock7 deleted the identifying-attributes branch August 22, 2025 08:03
@thugrock7 thugrock7 restored the identifying-attributes branch August 26, 2025 08:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants