Can't generate a trace from envoy after configuring proxyDefaults custom resource definition

I have deployed consul to K8s cluster via helm chart hashicorp/consul-0.30.0 and am trying to cfg the envoy sidecars to send traces to the jaeger tracing frontend deployed to the same cluster & namespace. I cannot generate a trace. Need help!

This is the spec of the proxyDefaults global:
Spec:
Config:
envoy_extra_static_clusters_json: {“name”:“jaeger_9411”,“type”:“STRICT_DNS”,“connect_timeout”:“1s”,“dns_lookup_family”:“V4_ONLY”,“hosts”:[{“socket_address”:{“address”:“zipkin.default”,“port_value”:9411}}],“http2_protocol_options”:{}}
envoy_tracing_json: {“http”:{“name”:“envoy.tracers.zipkin”,“typed_config”:{"@type":“type.googleapis.com/envoy.config.trace.v3.ZipkinConfig",“collector_cluster”:“jaeger_9411”,“collector_endpoint”:"/api/v2/spans",“collector_endpoint_version”:“HTTP_JSON”,"trace_id_128bit”: true,“shared_span_context”: false}}}
Expose:
Mesh Gateway:

This is the envoy container bootstrap generated by the proxyDefaults CRD.
< tcpdump port 9411> from the container shows no traces outgoing during activity.
no traces registered to the tracing UI either (jaeger all-in-one pod).

/ # cat /consul/connect-inject/envoy-bootstrap.yaml
{
“admin”: {
“access_log_path”: “/dev/null”,
“address”: {
“socket_address”: {
“address”: “127.0.0.1”,
“port_value”: 19000
}
}
},
“node”: {
“cluster”: “productpage”,
“id”: “productpage-v1-5d9b4c9849-dmljf-productpage-sidecar-proxy”,
“metadata”: {
“namespace”: “default”,
“envoy_version”: “1.16.0”
}
},
“static_resources”: {
“clusters”: [
{
“name”: “local_agent”,
“connect_timeout”: “1s”,
“type”: “STATIC”,
“http2_protocol_options”: {},
“hosts”: [
{
“socket_address”: {
“address”: “10.115.1.5”,
“port_value”: 8502
}
}
]
},
{
“name”: “jaeger_9411”,
“type”: “STRICT_DNS”,
“connect_timeout”: “1s”,
“dns_lookup_family”: “V4_ONLY”,
“hosts”: [
{
“socket_address”: {
“address”: “zipkin.default”,
“port_value”: 9411
}
}
],
“http2_protocol_options”: {}
}
]
},
“stats_config”: {
“stats_tags”: [
{
“regex”: “^cluster\.((?:([^.]+)~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.custom_hash”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:([^.]+)\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.service_subset”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?([^.]+)\.[^.]+\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.service”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.([^.]+)\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.namespace”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.([^.]+)\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.datacenter”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.([^.]+)\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.routing_type”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.([^.]+)\.consul\.)”,
“tag_name”: “consul.destination.trust_domain”
},
{
“regex”: “^cluster\.(((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+)\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.destination.target”
},
{
“regex”: “^cluster\.(((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.[^.]+)\.consul\.)”,
“tag_name”: “consul.destination.full_target”
},
{
“regex”: “^(?:tcp|http)\.upstream\.(([^.]+)(?:\.[^.]+)?\.[^.]+\.)”,
“tag_name”: “consul.upstream.service”
},
{
“regex”: “^(?:tcp|http)\.upstream\.([^.]+(?:\.[^.]+)?\.([^.]+)\.)”,
“tag_name”: “consul.upstream.datacenter”
},
{
“regex”: “^(?:tcp|http)\.upstream\.([^.]+(?:\.([^.]+))?\.[^.]+\.)”,
“tag_name”: “consul.upstream.namespace”
},
{
“regex”: “^cluster\.((?:([^.]+)~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.custom_hash”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:([^.]+)\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.service_subset”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?([^.]+)\.[^.]+\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.service”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.([^.]+)\.[^.]+\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.namespace”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.([^.]+)\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.datacenter”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.([^.]+)\.[^.]+\.consul\.)”,
“tag_name”: “consul.routing_type”
},
{
“regex”: “^cluster\.((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.([^.]+)\.consul\.)”,
“tag_name”: “consul.trust_domain”
},
{
“regex”: “^cluster\.(((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+)\.[^.]+\.[^.]+\.consul\.)”,
“tag_name”: “consul.target”
},
{
“regex”: “^cluster\.(((?:[^.]+~)?(?:[^.]+\.)?[^.]+\.[^.]+\.[^.]+\.[^.]+\.[^.]+)\.consul\.)”,
“tag_name”: “consul.full_target”
},
{
“tag_name”: “local_cluster”,
“fixed_value”: “productpage”
},
{
“tag_name”: “consul.source.service”,
“fixed_value”: “productpage”
},
{
“tag_name”: “consul.source.namespace”,
“fixed_value”: “default”
},
{
“tag_name”: “consul.source.datacenter”,
“fixed_value”: “fmy-consul-default”
}
],
“use_all_default_tags”: true
},
“tracing”: {
“http”: {
“name”: “envoy.tracers.zipkin”,
“typed_config”: {
@type”: “type.googleapis.com/envoy.config.trace.v3.ZipkinConfig”,
“collector_cluster”: “jaeger_9411”,
“collector_endpoint”: “/api/v2/spans”,
“collector_endpoint_version”: “HTTP_JSON”,
“trace_id_128bit”: true,
“shared_span_context”: false
}
}
},
“dynamic_resources”: {
“lds_config”: {
“ads”: {}
},
“cds_config”: {
“ads”: {}
},
“ads_config”: {
“api_type”: “GRPC”,
“grpc_services”: {
“initial_metadata”: [
{
“key”: “x-consul-token”,
“value”: “”
}
],
“envoy_grpc”: {
“cluster_name”: “local_agent”
}
}
}
},
“layered_runtime”: {
“layers”: [
{
“name”: “static_layer”,
“static_layer”: {
“envoy.deprecated_features:envoy.api.v2.Cluster.tls_context”: true,
“envoy.deprecated_features:envoy.config.trace.v2.ZipkinConfig.HTTP_JSON_V1”: true,
“envoy.deprecated_features:envoy.config.filter.network.http_connection_manager.v2.HttpConnectionManager.Tracing.operation_name”: true
}
}
]
}
}

We started answering you in your github issue so lets continue the convo there (Critical Error in K8s envoy sidecar log cause the container to fail init · Issue #825 · hashicorp/consul-helm · GitHub)