DirectorySecurity AdvisoriesPricing
/
Sign in
Directory
opentelemetry-collector logo

opentelemetry-collector

Last changed

Request a free trial

Contact our team to test out this image for free. Please also indicate any other images you would like to evaluate.

Tags
Overview
Comparison
Provenance
Specifications
SBOM
Vulnerabilities
Advisories

OpenTelemetry Collector

Chainguard's redistribution of the OpenTelemetry Collector Helm chart, pre-configured with hardened Chainguard Images.

Prerequisites

Authentication is required to access this chart and its images. First, authenticate with Chainguard and configure your environment:

chainctl auth login
chainctl auth configure-docker --pull-token --save
helm registry login cgr.dev

Create an image pull secret for the cluster:

kubectl create secret docker-registry cgr-pull-secret \
  --docker-server=cgr.dev \
  --docker-username="$(echo cgr.dev | docker-credential-cgr get | jq -r '.Username')" \
  --docker-password="$(echo cgr.dev | docker-credential-cgr get | jq -r '.Secret')"

Installation

The chart requires specifying a deployment mode:

# DaemonSet mode (recommended for node-level collection)
helm install otel-collector oci://cgr.dev/chainguard-private/charts/opentelemetry-collector \
  --set mode=daemonset \
  --set imagePullSecrets[0].name=cgr-pull-secret

# Deployment mode (for cluster-level collection)
helm install otel-collector oci://cgr.dev/chainguard-private/charts/opentelemetry-collector \
  --set mode=deployment \
  --set imagePullSecrets[0].name=cgr-pull-secret

About This Chart

This is a redistribution of the upstream OpenTelemetry Collector Helm chart. All upstream configuration options and documentation apply.

For full documentation, see: https://opentelemetry.io/docs/platforms/kubernetes/helm/collector/

Licenses

Chainguard's container images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" tag of this image:

  • Apache-2.0

  • GCC-exception-3.1

  • GPL-3.0-or-later

  • LGPL-2.1-or-later

  • MIT

  • MPL-2.0

For a complete list of licenses, please refer to this Image's SBOM.

Software license agreement

Compliance

Chainguard Containers are SLSA Level 3 compliant with detailed metadata and documentation about how it was built. We generate build provenance and a Software Bill of Materials (SBOM) for each release, with complete visibility into the software supply chain.

SLSA compliance at Chainguard

This image helps reduce time and effort in establishing PCI DSS 4.0 compliance with low-to-no CVEs.

PCI DSS at Chainguard

A FIPS validated version of this image is available for FedRAMP compliance. STIG is included with FIPS image.


Related images
opentelemetry-collector-fips logoFIPS
opentelemetry-collector-fips

Category
Application

The trusted source for open source

Talk to an expert
© 2025 Chainguard. All Rights Reserved.
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing