Closed
Description
Is your feature request related to a problem? Please describe.
Using the 0.0.0.0 address exposes this server to every network interface,
which may facilitate Denial of Service attacks.
When running inside a container, binaries are expected to listen to 0.0.0.0, because they don't know any other IP and localhost
makes them inaccessible in many scenarios.
Describe the solution you'd like
I don't want this warning to appear when the 0.0.0.0 configuration is actually valid and expected.
I propose adding some environment variable that can be set in the Dockerfile
that will instruct the Collector not to log this warning.
Describe alternatives you've considered
To my knowledge there is no reliable way to determine if a binary is running inside a container.
Related issues
Metadata
Metadata
Assignees
Labels
No labels