-
Feature Request
-
Resolution: Duplicate
-
Undefined
-
None
-
2.5, 2.6
-
False
-
-
False
As usage of our platform grows, we're seeing more and more users accidentally or unknowingly exposing sensitive information in their playbook output. This information is automatically logged and made available to a wider audience. Therefore, deleting the work has no benefit.
While educational, leaving it to the user will always lead to something being missed or information being exposed by enabling debug flags.
We needed this at the platform level and the main goal of this is to put in some platform level mitigation or controls to protect customers or badly written code which accidentally exposes sensitive information and put the control at the source, rather than looking at ways to modify it outside the platform.
For example, you can use regular expressions to obfuscate sensitive data like password: xxxxxxxx before checking for it in logs.
fyi...Found there's a similar RFE on Git, but it doesn't seem to have made any progress.
https://github.com/ansible/proposals/issues/209
- is related to
-
AAPRFE-1757 Redaction of Secret Variables in Ansible Output
-
- Backlog
-