Skip to content

Commit aaa57e6

Browse files
committed
fix: improve clarity and correctness in Jaeger V2 documentation
Signed-off-by: MyMirelHub <15373565+MyMirelHub@users.noreply.github.com>
1 parent c71db53 commit aaa57e6

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

daprdocs/content/en/operations/observability/tracing/otel-collector/open-telemetry-collector-jaeger.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ docker run -d --rm --name jaeger \
2929
cr.jaegertracing.io/jaegertracing/jaeger:2.11.0
3030
```
3131

32-
You can also view the logs the jaeger container using:
32+
You can also view the logs from the jaeger container using:
3333

3434
```bash
3535
docker logs jaeger
@@ -85,12 +85,9 @@ Jaeger V2 can be deployed using the OpenTelemetry Operator for simplified manage
8585

8686
#### Installation
8787

88-
> **Note:**In order for the API server to communicate with the webhook component of the operator, the webhook requires a TLS certificate that the API server is configured to trust. There are a few different ways you can use to generate/configure the required TLS certificate detailed in the [otel operator chart docs](https://github.com/open-telemetry/opentelemetry-helm-charts/tree/main/charts/opentelemetry-operator#tls-certificate-requirement)
88+
> **Note:** In order for the API server to communicate with the webhook component of the operator, the webhook requires a TLS certificate that the API server is configured to trust. There are a few different ways you can use to generate/configure the required TLS certificate detailed in the [otel operator chart docs](https://github.com/open-telemetry/opentelemetry-helm-charts/tree/main/charts/opentelemetry-operator#tls-certificate-requirement)
8989

9090
For simplicity you can use Helm to create an automatically generated self-signed certificate.
91-
92-
```bash
93-
```
9491

9592
1. **Install the OpenTelemetry Operator**:
9693

@@ -103,7 +100,7 @@ For simplicity you can use Helm to create an automatically generated self-signed
103100
Confirm that all resources in the `opentelemetry-operator-system` namespace are ready.
104101

105102
1. **Deploy a Jaeger V2 instance with in-memory storage**:
106-
Apply the following configuration to create a Jaeger V2 instance:
103+
Create a file named `jaeger-inmemory.yaml` with the following configuration:
107104
```yaml
108105
apiVersion: opentelemetry.io/v1beta1
109106
kind: OpenTelemetryCollector
@@ -152,7 +149,7 @@ For simplicity you can use Helm to create an automatically generated self-signed
152149

153150
Create a Dapr configuration file to enable tracing and export the sidecar traces directly to the Jaeger V2 instance.
154151

155-
1. Create a configuration file (e.g., `tracing.yaml`) with the following content, updating the `namespace` and `otel.endpointAddress` to match your Jaeger V2 instance:
152+
1. Create a configuration file (for example `tracing.yaml`) with the following content, updating the `namespace` and `otel.endpointAddress` to match your Jaeger V2 instance:
156153
```yaml
157154
apiVersion: dapr.io/v1alpha1
158155
kind: Configuration
@@ -203,7 +200,7 @@ That’s it! There’s no need to include the OpenTelemetry SDK or instrument yo
203200
To view Dapr sidecar traces, port-forward the Jaeger V2 service and open the UI:
204201

205202
```bash
206-
kubectl port-forward svc/jaeger-inmemory-instance-collector 16686 -n observability
203+
kubectl port-forward svc/jaeger-inmemory-instance-collector 16686:16686 -n observability
207204
```
208205

209206
In your browser, go to `http://localhost:16686` to see the Jaeger V2 UI.

0 commit comments

Comments
 (0)