You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm currently trying to set up the OpenTelemetry integration with Elasticsearch (according to this tutorial). We're using the tyk-stack Helm chart, and a managed Elasticsearch service.
Our OTel Collector requires clients to send an Authorization header with a secret Bearer token. The only way to configure this in the tyk-stack Helm chart is to supply the header via the tyk-gateway.gateway.opentelemetry.headers value:
Our issue with this approach is that the Bearer token is now visible to anyone that has either access to our values.yaml, or to anyone who has sufficient permissions to inspect the deployment via K8s API. It would be much better if we could supply the Bearer token via a K8s secret. This way, the Tyk gateway deployment could source the token from that secret, which could look something like this:
Hi!
I'm currently trying to set up the OpenTelemetry integration with Elasticsearch (according to this tutorial). We're using the tyk-stack Helm chart, and a managed Elasticsearch service.
Our OTel Collector requires clients to send an
Authorization
header with a secret Bearer token. The only way to configure this in the tyk-stack Helm chart is to supply the header via thetyk-gateway.gateway.opentelemetry.headers
value:Our issue with this approach is that the Bearer token is now visible to anyone that has either access to our values.yaml, or to anyone who has sufficient permissions to inspect the deployment via K8s API. It would be much better if we could supply the Bearer token via a K8s secret. This way, the Tyk gateway deployment could source the token from that secret, which could look something like this:
I'll prepare a pull request with a possible solution to discuss.
The text was updated successfully, but these errors were encountered: