Skip to main content
Skip table of contents

Configuring IronTap OpenTelemetry integration

Created:  | Updated: 


Supported exporters

  • OTLP via gRPC


OTLP via gRPC

You must provide an OTLP endpoint via the irontap.apm.otel.exporter.otlp.endpoint property.

Example
CODE
-Dirontap.apm.otel.exporter.otlp.endpoint=http://localhost:4317

Enable TLS

To establish an encrypted connection with an OTLP endpoint, it is necessary to employ one or more trusted certificates to verify the server's TLS credentials.

The OTLP endpoint should also be configured to enable TLS.

The property irontap.apm.otel.exporter.otlp.certificate is utilized to indicate the file path that contains the trusted certificates to be used. The file should contain one or more X.509 certificates in PEM format.

If no certificate is provided and a secure (HTTPS) endpoint is specified the host platform’s trusted root certificates are used.

Example
CODE
-Dirontap.apm.otel.exporter.otlp.certificate="path/to/certificate"

Enable mTLS (mutual TLS)

In addition to TLS, it is necessary to also provide one or more trusted client certificates which will be sent to an OTLP endpoint to verify the client’s TLS credentials and to enable mTLS.

The OTLP endpoint should also be configured to enable mTLS.

The properties irontap.apm.otel.exporter.otlp.client.certificate and irontap.apm.otel.exporter.otlp.client.key are utilized to indicate the file paths that contain the client certificates and client key to use. The client certificates file should contain one or more X.509 certificates in PEM format. The client key should contain the corresponding private key in PKCS8 PEM format.

Example
CODE
-Dirontap.apm.otel.exporter.otlp.client.certificate="path/to/clientCertificate"
-Dirontap.apm.otel.exporter.otlp.client.key="path/to/clientKey"
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.