[
https://issues.apache.org/jira/browse/FLINK-30306?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17643485#comment-17643485
]
Alexis Sarda-Espinosa commented on FLINK-30306:
-----------------------------------------------
In my case, there are some passwords that we encrypt and are then injected by
Argo CD, and I can see them in the {{AuditUtils}} logs. Moreover, we forward
logs from containers to other infrastructure to facilitate searching, so even
though that remains internal, it increases the "exposed area"; if someone could
access the searchable logs, that doesn't mean they have access to the
Kubernetes cluster.
> Audit utils can expose potentially sensitive information
> --------------------------------------------------------
>
> Key: FLINK-30306
> URL: https://issues.apache.org/jira/browse/FLINK-30306
> Project: Flink
> Issue Type: Bug
> Components: Kubernetes Operator
> Affects Versions: kubernetes-operator-1.2.0
> Reporter: Alexis Sarda-Espinosa
> Priority: Major
>
> I see events being logged by
> {{org.apache.flink.kubernetes.operator.listener.AuditUtils}} along the lines
> of ">>> Event | Info | SPECCHANGED | UPGRADE change(s) detected".
> This logs the entire new spec, which can contain sensitive information that
> has been injected from a Kubernetes secret.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)