Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sidecar injection: Include the admin-http port #922

Merged
merged 1 commit into from
Feb 25, 2020

Conversation

jrockway
Copy link
Contributor

@jrockway jrockway commented Feb 24, 2020

Judging from the code, at some point the jaeger-agent accepted metrics scrapes on the other HTTP port (config-rest), but that is no longer the case. So this change exposes the admin-http port, which does accept metric scrapes.

(It appears that the 1.12.0 release changed this port, see jaegertracing/jaeger#1442 )

I am actually confused as to why any of the other ports are exposed; the idea of the sidecar is that these ports only show up to other containers in the pod on 127.0.0.1 and it would be somewhat harmful if other applications started sending traces to the pod address. But they're there, so I didn't touch them.

@jpkrohling
Copy link
Contributor

Looks like GitHub CI is having some problems at the moment. I tried to re-run the jobs, but it kept failing. Would you be able to run a git commit --amend and update this PR? Hopefully this would bypass GitHub's issues...

… scrape it

Signed-off-by: Jonathan Rockway <jrockway@users.noreply.github.com>
@jrockway
Copy link
Contributor Author

I did that, let's see how it goes!

@jpkrohling
Copy link
Contributor

Thanks for your PR!

@jpkrohling jpkrohling merged commit d80bd24 into jaegertracing:master Feb 25, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants