Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conceal sensitive data in container logs #434

Closed
Hursofid opened this issue Jun 6, 2024 · 1 comment
Closed

Conceal sensitive data in container logs #434

Hursofid opened this issue Jun 6, 2024 · 1 comment

Comments

@Hursofid
Copy link

Hursofid commented Jun 6, 2024

Hello,
I'd like to know if there is a way to hide user passwords and PSK from being logged to stdout.
I've specified all necessary variables in the env file:

VPN_IPSEC_PSK=redacted
VPN_USER=redacted
VPN_PASSWORD=redacted
RANGE="redacted"
SUBNET=redacted
VPN_L2TP_NET="redacted"
VPN_L2TP_LOCAL=redacted
VPN_L2TP_POOL="redacted"
VPN_ADDL_USERS=redacted
VPN_ADDL_PASSWORDS=redacted
VPN_ANDROID_MTU_FIX=yes
VPN_PUBLIC_IP=redacted

The problem is that passwords, usernames are being exported to and stored in the Graylog in plaintext. I ship there all my containers logs using filebeat. It is transferred with TLS, but still, it's better to not store it anywhere.

I'll happy to provide any additional information if necessary.

Thank you

@hwdsl2
Copy link
Owner

hwdsl2 commented Jun 7, 2024

@Hursofid Hello! For your use case, while it is not currently supported in this project, you can build your own customized Docker image from source code, based on this project. Please refer to build from source code. For example, you can customize run.sh to remove the output of usernames and passwords.

@hwdsl2 hwdsl2 closed this as completed Jun 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants