-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
-
Quality / Stability / Reliability
-
False
-
-
False
-
-
-
Tracing Sprint # 285
Scenario: TempoMonolithic with `multitenancy.enabled: true` (gateway enabled) and `ingestion.otlp.http.tls.enabled: true`.
Problem: The gateway always forwards OTLP HTTP traffic to the tempo receiver using plain HTTP, regardless of whether receiver TLS is enabled:
// internal/manifests/monolithic/statefulset.go:478 args = append(args, fmt.Sprintf("--traces.write.otlphttp.endpoint=http://localhost:%d", manifestutils.PortOtlpHttp))
When `ingestion.otlp.http.tls.enabled: true` is set, `build.go` configures the receiver with a serving cert (via `configureReceiverTLS` in `configmap.go`), so it expects TLS connections. But the gateway still connects with `http://localhost:4318`, causing `connection reset by peer`:
level=warn name=observatorium caller=reverseproxy.go:675 msg="httputil: ReverseProxy read error during body copy: read tcp 127.0.0.1:50434->127.0.0.1:4318: read: connection reset by peer"
OTLP gRPC ingestion through the gateway works fine (port 4317). Only the OTLP HTTP path (port 4318) is affected.