Skip to content

nginx-ingress: strip inbound OpenTelemetry traceparent/tracestate headers#4882

Draft
delthas wants to merge 1 commit intodevelopment/133.0from
improvement/MK8S-239/nginx-ingress-otel-strip
Draft

nginx-ingress: strip inbound OpenTelemetry traceparent/tracestate headers#4882
delthas wants to merge 1 commit intodevelopment/133.0from
improvement/MK8S-239/nginx-ingress-otel-strip

Conversation

@delthas
Copy link
Copy Markdown

@delthas delthas commented Apr 15, 2026

Not human-reviewed yet. Not asking for reviews at the moment!

Summary

Both MetalK8s nginx ingress controllers (nginx-ingress and nginx-ingress-control-plane) sit at the trust boundary between the customer/internet side and internal cluster services. Prior to this change, attacker-supplied W3C OpenTelemetry trace-context headers (traceparent / tracestate) were forwarded as-is to OTEL-instrumented backends (cloudserver, vault, backbeat, pensieve-api, scuba, ...).

Why

Forwarding those headers lets a hostile caller:

  • spoof trace IDs to pollute our observability data
  • force sampled=1 on every request and DoS-amplify the tracing backend
  • correlate user requests with our internal span structure

What

Add a location-snippet under spec.config on both controllers that unsets the two headers before proxying upstream:

location-snippet: |
  proxy_set_header traceparent "";
  proxy_set_header tracestate "";

Internal pod-to-pod traffic uses .svc.cluster.local and bypasses nginx entirely, so legitimate internal trace propagation is unaffected.

Scope

  • salt/metalk8s/addons/nginx-ingress/config/ingress-controller.yaml.j2
  • salt/metalk8s/addons/nginx-ingress-control-plane/config/ingress-controller.yaml.j2

6 lines total.

Notes

Verified on artesca-1: 70+ requests carrying a crafted traceparent: 00-deadbeef…-01 through both ingresses produced no spans with the attacker trace ID in Jaeger, while cloudserver continued generating its own traces normally. The override ConfigMaps in the running cluster were also patched with the same snippet so the current environment already reflects the change; nginx reloaded cleanly.

Context: this is Part A of a cross-repo OTEL trust-boundary plan. Backend services still implement their own egress policy separately (tracked in per-repo OTEL.md files).

Issue: MK8S-239

Both ingress controllers sit at the trust boundary between the
customer/internet side and internal cluster services. Forwarding
client-supplied W3C OpenTelemetry trace context to OTEL-instrumented
backends (cloudserver, vault, backbeat, pensieve-api, scuba...) lets
a hostile caller spoof trace IDs, force sampled=1 to DoS-amplify the
tracing backend, or correlate user requests to internal span
structure.

Add a location-snippet that unsets traceparent and tracestate before
proxying upstream. Internal pod-to-pod traffic uses .svc.cluster.local
and bypasses nginx entirely, so legitimate internal trace propagation
is unaffected.
@bert-e
Copy link
Copy Markdown
Contributor

bert-e commented Apr 15, 2026

Hello delthas,

My role is to assist you with the merge of this
pull request. Please type @bert-e help to get information
on this process, or consult the user documentation.

Available options
name description privileged authored
/after_pull_request Wait for the given pull request id to be merged before continuing with the current one.
/bypass_author_approval Bypass the pull request author's approval
/bypass_build_status Bypass the build and test status
/bypass_commit_size Bypass the check on the size of the changeset TBA
/bypass_incompatible_branch Bypass the check on the source branch prefix
/bypass_jira_check Bypass the Jira issue check
/bypass_peer_approval Bypass the pull request peers' approval
/bypass_leader_approval Bypass the pull request leaders' approval
/approve Instruct Bert-E that the author has approved the pull request. ✍️
/create_pull_requests Allow the creation of integration pull requests.
/create_integration_branches Allow the creation of integration branches.
/no_octopus Prevent Wall-E from doing any octopus merge and use multiple consecutive merge instead
/unanimity Change review acceptance criteria from one reviewer at least to all reviewers
/wait Instruct Bert-E not to run until further notice.
Available commands
name description privileged
/help Print Bert-E's manual in the pull request.
/status Print Bert-E's current status in the pull request TBA
/clear Remove all comments from Bert-E from the history TBA
/retry Re-start a fresh build TBA
/build Re-start a fresh build TBA
/force_reset Delete integration branches & pull requests, and restart merge process from the beginning.
/reset Try to remove integration branches unless there are commits on them which do not appear on the source branch.

Status report is not available.

@bert-e
Copy link
Copy Markdown
Contributor

bert-e commented Apr 15, 2026

Waiting for approval

The following approvals are needed before I can proceed with the merge:

  • the author

  • 2 peers

Peer approvals must include at least 1 approval from the following list:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants