Class TlsIncubatingAttributes
java.lang.Object
io.opentelemetry.semconv.incubating.TlsIncubatingAttributes
-
Nested Class Summary
Nested Classes -
Field Summary
FieldsModifier and TypeFieldDescriptionstatic final io.opentelemetry.api.common.AttributeKey<String>String indicating the cipher used during the current connection.static final io.opentelemetry.api.common.AttributeKey<String>PEM-encoded stand-alone certificate offered by the client.Array of PEM-encoded certificates that make up the certificate chain offered by the client.static final io.opentelemetry.api.common.AttributeKey<String>Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client.static final io.opentelemetry.api.common.AttributeKey<String>Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client.static final io.opentelemetry.api.common.AttributeKey<String>Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client.static final io.opentelemetry.api.common.AttributeKey<String>Distinguished name of subject of the issuer of the x.509 certificate presented by the client.static final io.opentelemetry.api.common.AttributeKey<String>A hash that identifies clients based on how they perform an SSL/TLS handshake.static final io.opentelemetry.api.common.AttributeKey<String>Date/Time indicating when client certificate is no longer considered valid.static final io.opentelemetry.api.common.AttributeKey<String>Date/Time indicating when client certificate is first considered valid.static final io.opentelemetry.api.common.AttributeKey<String>Deprecated.static final io.opentelemetry.api.common.AttributeKey<String>Distinguished name of subject of the x.509 certificate presented by the client.Array of ciphers offered by the client during the client hello.static final io.opentelemetry.api.common.AttributeKey<String>String indicating the curve used for the given cipher, when applicablestatic final io.opentelemetry.api.common.AttributeKey<Boolean>Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel.static final io.opentelemetry.api.common.AttributeKey<String>String indicating the protocol being tunneled.static final io.opentelemetry.api.common.AttributeKey<String>Normalized lowercase protocol name parsed from original string of the negotiated SSL/TLS protocol versionstatic final io.opentelemetry.api.common.AttributeKey<String>Numeric part of the version parsed from the original string of the negotiated SSL/TLS protocol versionstatic final io.opentelemetry.api.common.AttributeKey<Boolean>Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation.static final io.opentelemetry.api.common.AttributeKey<String>PEM-encoded stand-alone certificate offered by the server.Array of PEM-encoded certificates that make up the certificate chain offered by the server.static final io.opentelemetry.api.common.AttributeKey<String>Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server.static final io.opentelemetry.api.common.AttributeKey<String>Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server.static final io.opentelemetry.api.common.AttributeKey<String>Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server.static final io.opentelemetry.api.common.AttributeKey<String>Distinguished name of subject of the issuer of the x.509 certificate presented by the client.static final io.opentelemetry.api.common.AttributeKey<String>A hash that identifies servers based on how they perform an SSL/TLS handshake.static final io.opentelemetry.api.common.AttributeKey<String>Date/Time indicating when server certificate is no longer considered valid.static final io.opentelemetry.api.common.AttributeKey<String>Date/Time indicating when server certificate is first considered valid.static final io.opentelemetry.api.common.AttributeKey<String>Distinguished name of subject of the x.509 certificate presented by the server. -
Method Summary
-
Field Details
-
TLS_CIPHER
String indicating the cipher used during the current connection.Notes:
The values allowed for
tls.cipherMUST be one of theDescriptionsof the registered TLS Cipher Suits. -
TLS_CLIENT_CERTIFICATE
PEM-encoded stand-alone certificate offered by the client. This is usually mutually-exclusive ofclient.certificate_chainsince this value also exists in that list. -
TLS_CLIENT_CERTIFICATE_CHAIN
public static final io.opentelemetry.api.common.AttributeKey<List<String>> TLS_CLIENT_CERTIFICATE_CHAINArray of PEM-encoded certificates that make up the certificate chain offered by the client. This is usually mutually-exclusive ofclient.certificatesince that value should be the first certificate in the chain. -
TLS_CLIENT_HASH_MD5
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. -
TLS_CLIENT_HASH_SHA1
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. -
TLS_CLIENT_HASH_SHA256
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client. For consistency with other hash values, this value should be formatted as an uppercase hash. -
TLS_CLIENT_ISSUER
Distinguished name of subject of the issuer of the x.509 certificate presented by the client. -
TLS_CLIENT_JA3
A hash that identifies clients based on how they perform an SSL/TLS handshake. -
TLS_CLIENT_NOT_AFTER
Date/Time indicating when client certificate is no longer considered valid. -
TLS_CLIENT_NOT_BEFORE
Date/Time indicating when client certificate is first considered valid. -
TLS_CLIENT_SERVER_NAME
@Deprecated public static final io.opentelemetry.api.common.AttributeKey<String> TLS_CLIENT_SERVER_NAMEDeprecated.Replaced byserver.address.Deprecated, useserver.addressinstead. -
TLS_CLIENT_SUBJECT
Distinguished name of subject of the x.509 certificate presented by the client. -
TLS_CLIENT_SUPPORTED_CIPHERS
public static final io.opentelemetry.api.common.AttributeKey<List<String>> TLS_CLIENT_SUPPORTED_CIPHERSArray of ciphers offered by the client during the client hello. -
TLS_CURVE
String indicating the curve used for the given cipher, when applicable -
TLS_ESTABLISHED
Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel. -
TLS_NEXT_PROTOCOL
String indicating the protocol being tunneled. Per the values in the IANA registry, this string should be lower case. -
TLS_PROTOCOL_NAME
Normalized lowercase protocol name parsed from original string of the negotiated SSL/TLS protocol version -
TLS_PROTOCOL_VERSION
Numeric part of the version parsed from the original string of the negotiated SSL/TLS protocol version -
TLS_RESUMED
Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation. -
TLS_SERVER_CERTIFICATE
PEM-encoded stand-alone certificate offered by the server. This is usually mutually-exclusive ofserver.certificate_chainsince this value also exists in that list. -
TLS_SERVER_CERTIFICATE_CHAIN
public static final io.opentelemetry.api.common.AttributeKey<List<String>> TLS_SERVER_CERTIFICATE_CHAINArray of PEM-encoded certificates that make up the certificate chain offered by the server. This is usually mutually-exclusive ofserver.certificatesince that value should be the first certificate in the chain. -
TLS_SERVER_HASH_MD5
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. -
TLS_SERVER_HASH_SHA1
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. -
TLS_SERVER_HASH_SHA256
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server. For consistency with other hash values, this value should be formatted as an uppercase hash. -
TLS_SERVER_ISSUER
Distinguished name of subject of the issuer of the x.509 certificate presented by the client. -
TLS_SERVER_JA3S
A hash that identifies servers based on how they perform an SSL/TLS handshake. -
TLS_SERVER_NOT_AFTER
Date/Time indicating when server certificate is no longer considered valid. -
TLS_SERVER_NOT_BEFORE
Date/Time indicating when server certificate is first considered valid. -
TLS_SERVER_SUBJECT
Distinguished name of subject of the x.509 certificate presented by the server.
-
server.address.