Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

remove full service account token from system log file #3012

Closed
jimangel opened this issue May 10, 2018 · 3 comments
Closed

remove full service account token from system log file #3012

jimangel opened this issue May 10, 2018 · 3 comments
Assignees

Comments

@jimangel
Copy link
Member

Environment
Dashboard version: v1.8.2
Kubernetes version: v1.9.6
Operating system: Ubuntu 16.04.4 LTS
Go version: v1.9.3
Steps to reproduce
  1. Login to dashboard using a service account token
  2. cat /var/log/containers/kubernetes-dashboard* | grep token
Observed result

You can see the full token stored in the logs

Expected result

The token should be redacted for security or only visible at a certain level of logging (eg: debug / verbose)

Comments

We ship our logs out to an external ELK server and support multi-tenancy for both ELK and k8s. As a result, anyone who has ELK access can see our admin service account.

I see value in the logs containing the token if you're troubleshooting, but I don't think it should be the default. A solution could be to accept an argument for the level of logging or change the log file path destination outside of the container logs getting shipped to ELK.

@jeefy
Copy link
Member

jeefy commented Jul 26, 2018

/assign

@mhobotpplnet
Copy link

I have same issue with this, and exposes greater security for someone with less privileges to be able to elevate the or impersonate admin login.
Yes there is a way for to lock it down and exclude it from being logged to services such as ELK, Splunk, Sumo etc.. however it is in best practice for any sensitive data such as usernames, passwords etc be retracted from logs.

@jeefy
Copy link
Member

jeefy commented Aug 4, 2018

Fixed in #3180 :)

/close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants