Configuring the Jaeger backend (Self-Hosted)
Version v1.35 of Jaeger introduced the ability to receive OpenTelemetry trace data via the OpenTelemetry Protocol (OTLP). This allows to create a new Jaeger backend by simply specifying the Jaeger OTLP gRPC unencrypted URL.
Supported Signals:
✅ Traces ❌ Metrics ❌ Logs
string
: Jaeger OTLP gRPC Endpoint. The format is host:port
, host is required, port is optional and defaults to the default OTLP gRPC port 4317
boolean
: Enable TLS. Secure connection
False
string
: Certificate Authority. When using TLS, provide the CA certificate in PEM format to verify the server. If empty uses system root CA
-----BEGIN CERTIFICATE-----
There are two primary methods for configuring destinations in Odigos:
Use the Odigos CLI to access the UI
Click on Add Destination
, select Jaeger
and follow the on-screen instructions
Save the YAML below to a file (e.g. jaeger.yaml
)
Apply the YAML using kubectl
Configuring the Jaeger backend (Self-Hosted)
Version v1.35 of Jaeger introduced the ability to receive OpenTelemetry trace data via the OpenTelemetry Protocol (OTLP). This allows to create a new Jaeger backend by simply specifying the Jaeger OTLP gRPC unencrypted URL.
Supported Signals:
✅ Traces ❌ Metrics ❌ Logs
string
: Jaeger OTLP gRPC Endpoint. The format is host:port
, host is required, port is optional and defaults to the default OTLP gRPC port 4317
boolean
: Enable TLS. Secure connection
False
string
: Certificate Authority. When using TLS, provide the CA certificate in PEM format to verify the server. If empty uses system root CA
-----BEGIN CERTIFICATE-----
There are two primary methods for configuring destinations in Odigos:
Use the Odigos CLI to access the UI
Click on Add Destination
, select Jaeger
and follow the on-screen instructions
Save the YAML below to a file (e.g. jaeger.yaml
)
Apply the YAML using kubectl