Hiding secrets in logs #314
Unanswered
FooBarTrixibell
asked this question in
Q&A
Replies: 2 comments 5 replies
-
Hi @FooBarTrixibell , are you referring to a lookup plugin or a module? |
Beta Was this translation helpful? Give feedback.
4 replies
-
ok, thanks for pointing me there. For hiding the sensitive information, ansible would have to know, that it's sensitive first. And as long as there's no machenism for the module to mark returned information as "sensitive", we're back to no_log. I think I might implement a custom ansible_lint rule, to check if no_log is active for some relevant modules. Thanks so far. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I don't know if I am just missing something, but is there a way, other than setting no_log on the play, to hide secrets in the hashi_vault collection?
With non-debug output in AWX, whenever you use an AWX credential it hides the passwords in the logs -
But reading and writing secrets with the hashi_vault plugin, the secret by default is written in plain text to the log. I assume there is a setting I am missing?
Beta Was this translation helpful? Give feedback.
All reactions