diff --git a/docs/attributes-registry/url.md b/docs/attributes-registry/url.md index 62d2ffcf9f..28dbc7cb53 100644 --- a/docs/attributes-registry/url.md +++ b/docs/attributes-registry/url.md @@ -40,7 +40,8 @@ In such case username and password SHOULD be redacted and attribute's value SHOU Sensitive content provided in `url.full` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) @@ -61,8 +62,8 @@ When a query string value is redacted, the query string key SHOULD still be pres **[6]:** Sensitive content provided in `url.query` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the -value `REDACTED`: +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) * [`Signature`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) diff --git a/docs/database/elasticsearch.md b/docs/database/elasticsearch.md index e86b03f9bc..a52ea69179 100644 --- a/docs/database/elasticsearch.md +++ b/docs/database/elasticsearch.md @@ -66,7 +66,8 @@ In such case username and password SHOULD be redacted and attribute's value SHOU Sensitive content provided in `url.full` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) diff --git a/docs/http/http-spans.md b/docs/http/http-spans.md index 0a141cc13c..be351ab107 100644 --- a/docs/http/http-spans.md +++ b/docs/http/http-spans.md @@ -192,7 +192,8 @@ In such case username and password SHOULD be redacted and attribute's value SHOU Sensitive content provided in `url.full` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) @@ -454,8 +455,8 @@ SHOULD include the [application root](/docs/http/http-spans.md#http-server-defin **[10]:** Sensitive content provided in `url.query` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the -value `REDACTED`: +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) * [`Signature`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) diff --git a/docs/url/url.md b/docs/url/url.md index b011553e3e..48675db95f 100644 --- a/docs/url/url.md +++ b/docs/url/url.md @@ -47,7 +47,8 @@ In such case username and password SHOULD be redacted and attribute's value SHOU Sensitive content provided in `url.full` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) @@ -65,8 +66,8 @@ When a query string value is redacted, the query string key SHOULD still be pres **[3]:** Sensitive content provided in `url.query` SHOULD be scrubbed when instrumentations can identify it. -In particular, query string values for the following keys SHOULD be redacted by default and replaced by the -value `REDACTED`: +![Experimental](https://img.shields.io/badge/-experimental-blue) +Query string values for the following keys SHOULD be redacted by default and replaced by the value `REDACTED`: * [`AWSAccessKeyId`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth) * [`Signature`](https://docs.aws.amazon.com/AmazonS3/latest/userguide/RESTAuthentication.html#RESTAuthenticationQueryStringAuth)