Uploaded image for project: 'OpenShift API for Data Protection'
  1. OpenShift API for Data Protection
  2. OADP-157

Sensitive azure secret values are being logged in operator pod

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Undefined Undefined
    • OADP 1.0.0
    • None
    • None
    • None
    • False
    • False
    • Passed
    • 0
    • 0
    • 0
    • Untriaged
    • None

      When supplying an azure secret key to configure azure storage, sensitive data is being logged in plaintext in the operator pod. As example:
      ```
      2021-12-07T21:33:26.585Z INFO controller-runtime.manager.controller.dataprotectionapplication Azure storage key value after parsing: uvpY7CJ5BMjwWAIKh/TLcHLzlZ/FH+fvDS91SQ2kHa4uRDUqkHPVHCxP7fpbSGv+M8SRJ7gCQjMYaV2U+ydgYg== {"reconciler group": "oadp.openshift.io", "reconciler kind": "DataProtectionApplication", "name": "velero-sample", "namespace": "openshift-adp"}

      We will want to ensure all these logs are removed.

            sraghuna@redhat.com Savitha Raghunathan
            rhn-engineering-dymurray Dylan Murray
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved: