How to connect Jaeger v2 to OpenSearch with self-signed certificates? #8050
Replies: 1 comment
-
|
Hi @CptOrange16! I'm Dosu and I’m helping the jaeger team. I see a potential issue with your configuration. In Jaeger v2, the correct TLS field is Try this configuration: jaeger_storage:
backends:
primary_store:
opensearch:
server_urls: ["https://opensearch-cluster-master:9200"]
tls:
insecure: true # This is the correct field name
auth:
basic:
username: "admin"
password: "password"Note: Remove For production with CA certificates, the better approach is: tls:
insecure: false
ca_file: /path/to/ca-cert.pemYou'll need to mount your OpenSearch CA certificate into the Jaeger pod and reference the path. The Helm chart's lack of
One more thing to check: There's a known issue where To reply, just mention @dosu. How did I do? Good | Irrelevant | Incorrect | Verbose | Hallucination | Report 🐛 | Other |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone! 👋I'm trying to deploy Jaeger v2 (Helm chart 4.4.7, app version 2.12.0) with OpenSearch storage, but I'm hitting TLS certificate verification errors and can't find a working configuration.
The problem
OpenSearch is running with a self-signed certificate that's valid for node-0.example.com and localhost, but not for the Kubernetes service name opensearch-cluster-master.
When Jaeger tries to connect, it fails with:
failed to initialize storage 'primary_store': failed to create Elasticsearch client: health check timeout: Head "https://opensearch-cluster-master:9200": tls: failed to verify certificate: x509: certificate is valid for node-0.example.com, localhost, not opensearch-cluster-master: no Elasticsearch node availableWhat I've Tried
1. Adding TLS skip verification in userconfig:
Result: The tls block appears to be ignored - same error occurs.
I created my configuration based on the values provided here https://github.com/jaegertracing/jaeger/blob/main/cmd/jaeger/config-opensearch.yaml
Full Jaeger Configuration (click to expand)
2. Using the ClusterIP directly:
Result: Error changes to show certificate is valid for ::1, 127.0.0.1 but not the ClusterIP.
3. Using HTTP:
Result: Connection refused (OpenSearch requires HTTPS).
Related Issues
I found several related issues:
extraSecretMountssupport (opened Feb 2026, still open)My Questions
Why This Matters
Internal Kubernetes clusters commonly use self-signed certificates for services like OpenSearch/Elasticsearch. If Jaeger v2 doesn't support either:
...then it's unusable in these very common environments. This creates a significant blocker for migrating from v1 to v2.
Is this functionality planned?
What's the expected timeline?
Should I deploy Jaeger v1 (even though EOL) as a temporary solution?
Any guidance would be really appreciated!
Beta Was this translation helpful? Give feedback.
All reactions