Skip to content

Add config schemas for comp/otelcol components#50408

Merged
gh-worker-dd-mergequeue-cf854d[bot] merged 6 commits intomainfrom
jaime/otel_config
May 7, 2026
Merged

Add config schemas for comp/otelcol components#50408
gh-worker-dd-mergequeue-cf854d[bot] merged 6 commits intomainfrom
jaime/otel_config

Conversation

@truthbk
Copy link
Copy Markdown
Member

@truthbk truthbk commented May 6, 2026

What does this PR do?

Adds upstream-style config.schema.yaml files for the OpenTelemetry Collector components living under comp/otelcol/, mirroring the JSON-Schema-as-YAML format used by opentelemetry-collector-contrib (with $defs / $ref / x-pointer / x-optional extensions).

Components covered:

Component Source
comp/otelcol/otlp/components/exporter/serializerexporter generated
comp/otelcol/otlp/components/exporter/logsagentexporter generated
comp/otelcol/otlp/components/processor/infraattributesprocessor generated
comp/otelcol/ddflareextension/impl hand-written (see Additional Notes)
comp/otelcol/ddprofilingextension/impl generated
comp/otelcol/dogtelextension/impl generated

For comp/otelcol/otlp/components/exporter/datadogexporter, which has no local Config struct and consumes the upstream pkg/datadog/config.Config directly, a README.md is added pointing to the upstream schema as the source of truth.

A metadata.yaml is also added next to each component's config.go so the generator can be re-run, and a comp/otelcol/.schemagen.yaml settings file declares our namespace, type mappings (time.Durationstring/format: duration, etc.) and allowedRefs (go.opentelemetry.io/collector, opentelemetry-collector-contrib, DataDog/datadog-agent).

Motivation

Provide machine-readable, human-readable specifications of the YAML configuration accepted by each Datadog-authored OTel Collector component. This unblocks downstream tooling (validation, documentation generation, IDE support) and keeps the format in lockstep with how upstream OTel components advertise their config surface.

Describe how you validated your changes

  • Generated five of the six schemas using upstream's cmd/schemagen tool, with the settings file at comp/otelcol/.schemagen.yaml.
  • Verified all six emitted YAML files parse with yaml.safe_load (Python).
  • Sanity-checked field coverage and \$ref targets against each component's Config struct.
  • Confirmed schemagen re-runs from the new settings location produce byte-identical output for an already-generated component.

Additional Notes

  • ddflareextension's schema is hand-written because schemagen's addEmbeddedField only handles *ast.Ident and *ast.SelectorExpr — it errors on *ast.StarExpr (i.e. embedded pointer fields with mapstructure:\",squash\"). The local Config embeds *confighttp.ServerConfig in that shape. The four-line schema \$refs go.opentelemetry.io/collector/config/confighttp.server_config via allOf. A small upstream patch to schemagen would let us regenerate this in future.
  • \$ref paths to upstream OTel types use the fully qualified form (e.g. github.com/open-telemetry/opentelemetry-collector-contrib/pkg/datadog/config.api_config) rather than the slash-prefixed form upstream uses internally. This is correct: from this repo's namespace those types are external, and schemagen produces the full path automatically. Both forms are valid JSON Schema URI references per RFC 3986.
  • metricsclient/, statsprocessor/, and the now-empty connector/datadogconnector/ directory are intentionally not covered: the first two are internal helper libraries (no component.Config), and the third no longer hosts a registered component (moved upstream in DDOT imports datadogconnector from OSS #43479; only a stale module_test_output.json remains).
  • Fields without mapstructure tags are correctly omitted from the generated schemas (per schemagen's contract). For logsagentexporter this means OtelSource, LogSourceName, and OrchestratorConfig do not appear — they are runtime-injected, not user-configurable via YAML.

@truthbk truthbk requested a review from a team as a code owner May 6, 2026 07:56
@truthbk truthbk requested review from agagniere and removed request for a team May 6, 2026 07:56
@dd-octo-sts dd-octo-sts Bot added the internal Identify a non-fork PR label May 6, 2026
@github-actions github-actions Bot added the long review PR is complex, plan time to review it label May 6, 2026
@truthbk truthbk added qa/no-code-change No code change in Agent code requiring validation documentation team/opentelemetry-agent labels May 6, 2026
@truthbk truthbk added this to the 7.80.0 milestone May 6, 2026
Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 89e6f9823f

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

allOf:
- $ref: go.opentelemetry.io/collector/exporter/exporterhelper.timeout_config
- $ref: go.opentelemetry.io/collector/config/confighttp.client_config
- $ref: go.opentelemetry.io/collector/config/configtls.client_config
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Represent serializer TLS options under tls

This schema exposes configtls.client_config at the root via allOf, but ExporterConfig decodes that struct from mapstructure:"tls" (see comp/otelcol/otlp/components/exporter/serializerexporter/config.go), so TLS keys are expected under a nested tls: block. As written, schema-based validation can incorrectly accept top-level TLS keys (for example insecure) that the real config loader does not map the same way, which makes the schema inaccurate for downstream validation and editor tooling.

Useful? React with 👍 / 👎.

allow_hostname_override:
type: boolean
cardinality:
$ref: /comp/core/tagger/types.tag_cardinality
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Remove unresolved local $ref for cardinality

The new cardinality field points to /comp/core/tagger/types.tag_cardinality, but this repo does not provide a generated schema document for that target path, so consumers that resolve refs will hit a dangling local reference when validating infraattributesprocessor config. This breaks the stated goal of machine-validatable schemas for this component unless the referenced schema is also generated/published or the field is inlined.

Useful? React with 👍 / 👎.

@datadog-prod-us1-5
Copy link
Copy Markdown
Contributor

datadog-prod-us1-5 Bot commented May 6, 2026

🎯 Code Coverage (details)
Patch Coverage: 100.00%
Overall Coverage: 50.09% (-0.16%)

This comment will be updated automatically if new data arrives.
🔗 Commit SHA: 9862911 | Docs | Datadog PR Page | Give us feedback!

@dd-octo-sts
Copy link
Copy Markdown
Contributor

dd-octo-sts Bot commented May 6, 2026

Files inventory check summary

File checks results against ancestor eb7778b2:

Results for datadog-agent_7.80.0~devel.git.527.9862911.pipeline.111949569-1_amd64.deb:

No change detected

@dd-octo-sts
Copy link
Copy Markdown
Contributor

dd-octo-sts Bot commented May 6, 2026

Static quality checks

✅ Please find below the results from static quality gates
Comparison made with ancestor eb7778b
📊 Static Quality Gates Dashboard
🔗 SQG Job

32 successful checks with minimal change (< 2 KiB)
Quality gate Current Size
agent_deb_amd64 742.291 MiB
agent_deb_amd64_fips 700.350 MiB
agent_heroku_amd64 309.217 MiB
agent_rpm_amd64 742.275 MiB
agent_rpm_amd64_fips 700.334 MiB
agent_rpm_arm64 720.197 MiB
agent_rpm_arm64_fips 681.358 MiB
agent_suse_amd64 742.275 MiB
agent_suse_amd64_fips 700.334 MiB
agent_suse_arm64 720.197 MiB
agent_suse_arm64_fips 681.358 MiB
docker_agent_amd64 802.530 MiB
docker_agent_arm64 805.296 MiB
docker_agent_jmx_amd64 993.450 MiB
docker_agent_jmx_arm64 984.994 MiB
docker_cluster_agent_amd64 206.615 MiB
docker_cluster_agent_arm64 220.634 MiB
docker_cws_instrumentation_amd64 7.142 MiB
docker_cws_instrumentation_arm64 6.689 MiB
docker_host_profiler_amd64 301.579 MiB
docker_host_profiler_arm64 313.059 MiB
docker_dogstatsd_amd64 39.496 MiB
docker_dogstatsd_arm64 37.690 MiB
dogstatsd_deb_amd64 30.149 MiB
dogstatsd_deb_arm64 28.279 MiB
dogstatsd_rpm_amd64 30.149 MiB
dogstatsd_suse_amd64 30.149 MiB
iot_agent_deb_amd64 44.474 MiB
iot_agent_deb_arm64 41.454 MiB
iot_agent_deb_armhf 42.190 MiB
iot_agent_rpm_amd64 44.474 MiB
iot_agent_suse_amd64 44.474 MiB

@cit-pr-commenter-54b7da
Copy link
Copy Markdown

cit-pr-commenter-54b7da Bot commented May 6, 2026

Regression Detector

Regression Detector Results

Metrics dashboard
Target profiles
Run ID: f7536f44-40e1-4523-b775-573b71155d3a

Baseline: 18ff3c1
Comparison: 6d20614
Diff

Optimization Goals: ✅ No significant changes detected

Experiments ignored for regressions

Regressions in experiments with settings containing erratic: true are ignored.

perf experiment goal Δ mean % Δ mean % CI trials links
docker_containers_cpu % cpu utilization -1.72 [-4.61, +1.17] 1 Logs

Fine details of change detection per experiment

perf experiment goal Δ mean % Δ mean % CI trials links
quality_gate_metrics_logs memory utilization +1.24 [+0.98, +1.50] 1 Logs bounds checks dashboard
quality_gate_logs % cpu utilization +0.57 [-0.41, +1.54] 1 Logs bounds checks dashboard
otlp_ingest_metrics memory utilization +0.38 [+0.23, +0.53] 1 Logs
ddot_metrics_sum_delta memory utilization +0.34 [+0.16, +0.53] 1 Logs
quality_gate_security_idle memory utilization +0.33 [+0.26, +0.40] 1 Logs bounds checks dashboard
ddot_logs memory utilization +0.25 [+0.19, +0.31] 1 Logs
docker_containers_memory memory utilization +0.24 [+0.14, +0.34] 1 Logs
quality_gate_idle memory utilization +0.14 [+0.10, +0.19] 1 Logs bounds checks dashboard
file_to_blackhole_100ms_latency egress throughput +0.03 [-0.10, +0.15] 1 Logs
quality_gate_security_no_fs_load memory utilization +0.02 [-0.09, +0.12] 1 Logs bounds checks dashboard
file_to_blackhole_0ms_latency egress throughput +0.01 [-0.46, +0.49] 1 Logs
uds_dogstatsd_to_api ingress throughput +0.01 [-0.19, +0.21] 1 Logs
tcp_dd_logs_filter_exclude ingress throughput -0.00 [-0.09, +0.09] 1 Logs
uds_dogstatsd_to_api_v3 ingress throughput -0.01 [-0.21, +0.20] 1 Logs
file_to_blackhole_1000ms_latency egress throughput -0.04 [-0.50, +0.43] 1 Logs
file_to_blackhole_500ms_latency egress throughput -0.07 [-0.46, +0.32] 1 Logs
uds_dogstatsd_20mb_12k_contexts_20_senders memory utilization -0.07 [-0.12, -0.02] 1 Logs
otlp_ingest_logs memory utilization -0.08 [-0.18, +0.01] 1 Logs
quality_gate_security_mean_fs_load memory utilization -0.10 [-0.15, -0.06] 1 Logs bounds checks dashboard
ddot_metrics_sum_cumulativetodelta_exporter memory utilization -0.13 [-0.37, +0.11] 1 Logs
tcp_syslog_to_blackhole ingress throughput -0.18 [-0.36, -0.00] 1 Logs
ddot_metrics memory utilization -0.36 [-0.56, -0.17] 1 Logs
quality_gate_idle_all_features memory utilization -0.46 [-0.51, -0.42] 1 Logs bounds checks dashboard
ddot_metrics_sum_cumulative memory utilization -0.94 [-1.10, -0.79] 1 Logs
docker_containers_cpu % cpu utilization -1.72 [-4.61, +1.17] 1 Logs

Bounds Checks: ✅ Passed

perf experiment bounds_check_name replicates_passed observed_value links
docker_containers_cpu simple_check_run 10/10 741 ≥ 26
docker_containers_memory memory_usage 10/10 244.96MiB ≤ 370MiB
docker_containers_memory simple_check_run 10/10 550 ≥ 26
file_to_blackhole_0ms_latency memory_usage 10/10 0.16GiB ≤ 1.20GiB
file_to_blackhole_0ms_latency missed_bytes 10/10 0B = 0B
file_to_blackhole_1000ms_latency memory_usage 10/10 0.20GiB ≤ 1.20GiB
file_to_blackhole_1000ms_latency missed_bytes 10/10 0B = 0B
file_to_blackhole_100ms_latency memory_usage 10/10 0.17GiB ≤ 1.20GiB
file_to_blackhole_100ms_latency missed_bytes 10/10 0B = 0B
file_to_blackhole_500ms_latency memory_usage 10/10 0.18GiB ≤ 1.20GiB
file_to_blackhole_500ms_latency missed_bytes 10/10 0B = 0B
quality_gate_idle intake_connections 10/10 3 ≤ 4 bounds checks dashboard
quality_gate_idle memory_usage 10/10 142.27MiB ≤ 147MiB bounds checks dashboard
quality_gate_idle_all_features intake_connections 10/10 3 ≤ 4 bounds checks dashboard
quality_gate_idle_all_features memory_usage 10/10 470.15MiB ≤ 495MiB bounds checks dashboard
quality_gate_logs intake_connections 10/10 4 ≤ 6 bounds checks dashboard
quality_gate_logs memory_usage 10/10 175.28MiB ≤ 195MiB bounds checks dashboard
quality_gate_logs missed_bytes 10/10 0B = 0B bounds checks dashboard
quality_gate_metrics_logs cpu_usage 10/10 345.74 ≤ 2000 bounds checks dashboard
quality_gate_metrics_logs intake_connections 10/10 3 ≤ 6 bounds checks dashboard
quality_gate_metrics_logs memory_usage 10/10 373.51MiB ≤ 430MiB bounds checks dashboard
quality_gate_metrics_logs missed_bytes 10/10 0B = 0B bounds checks dashboard
quality_gate_security_idle cpu_usage 10/10 25.46 ≤ 40 bounds checks dashboard
quality_gate_security_idle memory_usage 10/10 290.46MiB ≤ 330MiB bounds checks dashboard
quality_gate_security_mean_fs_load cpu_usage 10/10 49.67 ≤ 70 bounds checks dashboard
quality_gate_security_mean_fs_load memory_usage 10/10 267.67MiB ≤ 320MiB bounds checks dashboard
quality_gate_security_no_fs_load cpu_usage 10/10 18.87 ≤ 40 bounds checks dashboard
quality_gate_security_no_fs_load memory_usage 10/10 273.69MiB ≤ 320MiB bounds checks dashboard

Explanation

Confidence level: 90.00%
Effect size tolerance: |Δ mean %| ≥ 5.00%

Performance changes are noted in the perf column of each table:

  • ✅ = significantly better comparison variant performance
  • ❌ = significantly worse comparison variant performance
  • ➖ = no significant change in performance

A regression test is an A/B test of target performance in a repeatable rig, where "performance" is measured as "comparison variant minus baseline variant" for an optimization goal (e.g., ingress throughput). Due to intrinsic variability in measuring that goal, we can only estimate its mean value for each experiment; we report uncertainty in that value as a 90.00% confidence interval denoted "Δ mean % CI".

For each experiment, we decide whether a change in performance is a "regression" -- a change worth investigating further -- if all of the following criteria are true:

  1. Its estimated |Δ mean %| ≥ 5.00%, indicating the change is big enough to merit a closer look.

  2. Its 90.00% confidence interval "Δ mean % CI" does not contain zero, indicating that if our statistical model is accurate, there is at least a 90.00% chance there is a difference in performance between baseline and comparison variants.

  3. Its configuration does not mark it "erratic".

CI Pass/Fail Decision

Passed. All Quality Gates passed.

  • quality_gate_idle, bounds check intake_connections: 10/10 replicas passed. Gate passed.
  • quality_gate_idle, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_security_no_fs_load, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_security_no_fs_load, bounds check cpu_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_security_idle, bounds check cpu_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_security_idle, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_idle_all_features, bounds check intake_connections: 10/10 replicas passed. Gate passed.
  • quality_gate_idle_all_features, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check intake_connections: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check missed_bytes: 10/10 replicas passed. Gate passed.
  • quality_gate_metrics_logs, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_metrics_logs, bounds check cpu_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_metrics_logs, bounds check intake_connections: 10/10 replicas passed. Gate passed.
  • quality_gate_metrics_logs, bounds check missed_bytes: 10/10 replicas passed. Gate passed.
  • quality_gate_security_mean_fs_load, bounds check cpu_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_security_mean_fs_load, bounds check memory_usage: 10/10 replicas passed. Gate passed.

kubernetes_kubelet_host:
description: Kubernetes / kubelet settings for K8s tag enrichment (standalone mode). When the otel-agent runs on a Kubernetes node these allow the workloadmeta kubelet collector and the local tagger to reach the kubelet API without needing a separate datadog.yaml.
type: string
metadata_interval:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not yet familiar with used schema generation tool like cmd/schemagen
Just noticed that fields specified in schema has no comments, while in source code there are:

MetadataInterval // seconds; 0 = use agent default (1800) no description
TaggerServerPort // 0 = auto-assign no description
TaggerServerAddr // Default: localhost no description
TaggerMaxMessageSize // Default: 4MB no description
TaggerMaxConcurrentSync // Default: 5 no description
SecretBackendTimeout // seconds; 0 = agent default (30s) no description
SecretBackendOutputMaxSize // bytes; 0 = agent default no description

unf. schemagen reads field.Doc only — that's the Go AST's doc comment (the comment block above the field). It does not read field.Comment, which is the inline/trailing comment on the same line.

So for code like this:

MetadataInterval int mapstructure:"metadata_interval" // seconds; 0 = use agent default (1800)

The // seconds; 0 = ... is field.Comment (inline), not field.Doc — schemagen ignores it entirely. But if it were written as:

// MetadataInterval in seconds. 0 = use agent default (1800).
MetadataInterval int mapstructure:"metadata_interval"

That becomes field.Doc and schemagen would pick it up.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't really want to make changes to the go code here; but you're right, it's a good opportunity to allow the tool to pick up on this valuable configuration context.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed your feedback.

truthbk and others added 3 commits May 6, 2026 17:39
Introduce upstream-style config.schema.yaml files for OTel Collector
components living under comp/otelcol/, mirroring the format used in
opentelemetry-collector-contrib (JSON Schema serialised as YAML, with
$defs/$ref/x-pointer/x-optional extensions).

Components covered:
  - exporter/serializerexporter
  - exporter/logsagentexporter
  - processor/infraattributesprocessor
  - ddflareextension (hand-written; schemagen does not support
    embedded *pointer fields with mapstructure:",squash")
  - ddprofilingextension
  - dogtelextension

Schemas were generated using upstream's cmd/schemagen tool, with one
exception noted above. A metadata.yaml is added to each component dir
so schemagen can be re-run, and a comp/otelcol/.schemagen.yaml settings
file declares the namespace, type mappings, and allowed external $refs
(go.opentelemetry.io/collector, opentelemetry-collector-contrib,
DataDog/datadog-agent).

For datadogexporter, which has no local Config struct (it accepts
upstream's pkg/datadog/config.Config), a README is added pointing to
the upstream schema as the source of truth.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
- serializerexporter schema: move configtls.client_config from root
  allOf to properties.tls. Schemagen incorrectly squashes every Go-
  embedded field, ignoring the explicit mapstructure:"tls" tag.

- ddprofilingextension: fix copy-pasted Endpoint comment ("Default:
  BuildInfo.Version" belongs to Version, not Endpoint). The field is
  the local port the profiling HTTP server listens on; default "7501".
  Regenerate the schema to pick up the corrected description.

- logsagentexporter Config: add mapstructure:"-" to OtelSource,
  LogSourceName, and OrchestratorConfig. These are runtime-injected
  (constants set at factory wiring; OrchestratorConfig.Hostname is an
  Fx Component) and were being silently bound from lowercased YAML
  keys, drifting from the schema. Inner OrchestratorConfig fields
  remain untagged: closed at the parent and may yet be exposed
  to users in the future.

- metadata.yaml across all 6 components: add display_name and drop
  empty distributions: [] to match upstream conventions.

- ddprofilingextension metadata.yaml: align stability with factory.go,
  which returns component.StabilityLevelDevelopment, not Beta.

- .schemagen.yaml: add a header comment documenting how to regenerate
  schemas (build command, invocation, walk-up lookup) and the two
  known schemagen quirks that require hand-tuning (embedded pointer
  fields and embedded fields with non-squash mapstructure keys).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@truthbk truthbk force-pushed the jaime/otel_config branch from 89e6f98 to 245086a Compare May 6, 2026 16:01
@truthbk truthbk requested a review from a team as a code owner May 6, 2026 16:01
truthbk and others added 2 commits May 7, 2026 11:38
The generated config.schema.yaml referenced /comp/core/tagger/types.tag_cardinality,
but no schema is published for that package and we don't want to publish
one (it has many unrelated types). Schemagen emitted the ref because
github.com/DataDog/datadog-agent is in allowedRefs.

Map types.TagCardinality to a primitive integer in .schemagen.yaml so
the schema mirrors the YAML decode behaviour today (TagCardinality is a
typed int with iota constants; there is no UnmarshalText hook). Add a
Go doc-comment on Config.Cardinality enumerating the accepted values
(0=low, 1=orchestrator, 2=high), which schemagen now picks up as the
field description so it survives regeneration.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Schemagen reads field.Doc (leading comments) but ignores field.Comment
(trailing inline comments), so per-field annotations like
"// seconds; 0 = use agent default (1800)" were invisible to the
generator. The previous schema also misplaced group-header descriptions
because schemagen alphabetises fields, leaving most properties without
any description and the headers ("Tagger server settings", etc.)
attached to the wrong field.

Rewrite each field's documentation as a self-contained leading godoc
comment so schemagen picks it up and group-ordering no longer matters.
The regenerated schema now has a description on every property.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@truthbk truthbk added the changelog/no-changelog No changelog entry needed label May 7, 2026
@truthbk
Copy link
Copy Markdown
Member Author

truthbk commented May 7, 2026

/merge

@gh-worker-devflow-routing-ef8351
Copy link
Copy Markdown

gh-worker-devflow-routing-ef8351 Bot commented May 7, 2026

View all feedbacks in Devflow UI.

2026-05-07 11:41:53 UTC ℹ️ Start processing command /merge


2026-05-07 11:41:57 UTC ℹ️ MergeQueue: pull request added to the queue

The expected merge time in main is approximately 2h (p90).


2026-05-07 12:30:19 UTC ℹ️ MergeQueue: This merge request was merged

@gh-worker-dd-mergequeue-cf854d gh-worker-dd-mergequeue-cf854d Bot merged commit 6d20614 into main May 7, 2026
235 checks passed
@gh-worker-dd-mergequeue-cf854d gh-worker-dd-mergequeue-cf854d Bot deleted the jaime/otel_config branch May 7, 2026 12:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

changelog/no-changelog No changelog entry needed documentation internal Identify a non-fork PR long review PR is complex, plan time to review it qa/no-code-change No code change in Agent code requiring validation team/agent-build team/opentelemetry-agent

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants