-
Notifications
You must be signed in to change notification settings - Fork 264
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature/mask query 3 #506
base: master
Are you sure you want to change the base?
Feature/mask query 3 #506
Conversation
Hi, I saw the issue and understand the pb. That being said, the current solution is not safe either: |
chexporter has feature that allow using env variables in config, we used this approach to hide our s3 secrets
like so |
also i forgot to push commit with |
but maybe you're right and looking for patterns is better solution, clickhouse itself does so |
it's not only safer but also easier in terms of ops: the day the secrets change, there is only one place that needs to be modified. With the following implementation, it's the best way to forget to change it on chproxy (because it won't brake chproxy to use the previous secrets) then have new leaks. Ideally, all the infra part should be perfectly automated and a change of secrets should be automatically propagated to all subsystems, but I'm not sure many companies have reach this level. |
@kasimtj do you plan to do the pattern based solution? |
Description
Mask secrets in logs #505
Pull request type
Please check the type of change your PR introduces:
Checklist
Does this introduce a breaking change?
Further comments