Revert audit log args redaction to restore CloudWatch visibility #21039
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Problem
Customer reported that commit b007b1d broke their audit monitoring setup by redacting args in CloudWatch logs (
/aws/containerinsights/meta/audit
). This has created security concerns as they've lost visibility into admin actions.Root Cause
Commit b007b1d redacted args in the container logs (via
log.info()
) to prevent sensitive data exposure, but this affected customers who rely on CloudWatch for audit trail monitoring.Solution
Revert the args redaction to restore audit visibility in CloudWatch logs. The original audit database logs were never affected and continue to work properly.
Impact
Fixes customer complaint about missing args in CloudWatch audit logs.
Co-authored-by: Ona no-reply@ona.com