-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[receiver/statsdreceiver] Add ability to customize permissions of socket when using UDS server #37807
Labels
enhancement
New feature or request
needs triage
New item requiring triage
receiver/statsd
statsd related issues
Comments
Pinging code owners: See Adding Labels via Comments if you do not have permissions to add labels yourself. |
This was referenced Feb 11, 2025
Looks good to me, please go ahead! |
Sorry for my late response @jmacd, missed the notification! Will open the PR 👍 |
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 6, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 6, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 7, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 7, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 10, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 10, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 11, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
thomas-gouveia
added a commit
to thomas-gouveia/opentelemetry-collector-contrib
that referenced
this issue
Mar 11, 2025
… when transport is unixgram (open-telemetry#37807) Signed-off-by: thomas-gouveia <thomas.gouveia@contentsquare.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
enhancement
New feature or request
needs triage
New item requiring triage
receiver/statsd
statsd related issues
Component(s)
receiver/statsd
Is your feature request related to a problem? Please describe.
We have some apps deployed in Kubernetes configured to send metrics to Datadog through the unix datagram socket managed by the Datadog agent in
/var/run/datadog/dsd.socket
. We're currently exploring a solution to deploy a drop-in replacement of the Datadog agent using a combination ofstatsdreceiver
anddatadogreceiver
in the collector.We have a PoC deployed and that works properly, but we have a little issue with the permissions of the socket bind by the
statsdreceiver
. If the application doesn't run with the same user than the collector, it won't be able to write to the socket because of the following permissions on the socket (default one I assume):So only owner of the socket is able to write (in that case,
root
). In comparison the Datadog agent socket has the following permissions:Describe the solution you'd like
To solve the issue, I propose to call a chmod with
0622
right after the bind call to ensure permissions of the socket are managed by the receiver itself.If needed, we can also introduce in the configuration a new attribute to allow customization of permissions, and make
0622
as default :Describe alternatives you've considered
initContainers
running as root to runchmod/chown
: it works but if the collector restarts, permissions are reset when it binds again.fsGroup
, not workingAdditional context
I can propose a fix for this issue 👍
The text was updated successfully, but these errors were encountered: