In OpenTelemetry one of the ways for exchanging telemetry data between different services is using Protocol Buffers over HTTP, see OTLP/HTTP.
If it is needed to debug this sharing of information one can think about sniffing the traffic with a tool like Wireshark. For doing so Wireshark should be able to know which ProtoBuf message type to use for the decoding. Since there is no such a feature built in (only for ProtoBuf over UDP) we should use a custom dissector.
The custom dissector is a .lua script that should be saved in Wireshark config directory (personal or global), the contents are attached here. The mapping for the message type is based on the HTTP request path (but the dissector can be customized for having different behaviours), this mapping is exposed as a preference on the UI (see figure).
In order for