Skip to content

Conversation

Sovietaced
Copy link
Contributor

@Sovietaced Sovietaced commented Sep 14, 2025

Closes #3516

redisotel can generate traces for Redis commands that include sensitive data (ie. hello command). There currently exists an option to disable the db.statement attribute in traces but this is a global setting.

This pull request adds support for a configurable command filter that will omit traces for commands that filter returns true for. It also adds a basic command filter to filter out sensitive data by default which I feel like should be the correct behavior to prevent security incidents.

Signed-off-by: Jason Parraga <sovietaced@gmail.com>
@Sovietaced Sovietaced marked this pull request as ready for review September 14, 2025 17:46
@Sovietaced Sovietaced changed the title Add support for filtering commands when tracing Add support for filtering traces for certain commands Sep 14, 2025
Signed-off-by: Jason Parraga <sovietaced@gmail.com>
@ndyakov
Copy link
Member

ndyakov commented Sep 15, 2025

Hello @Sovietaced and thank you for your contribution. Maybe @vmihailenco can take a look at this. If he doesn't I will around the end of the month.

@ndyakov
Copy link
Member

ndyakov commented Sep 17, 2025

@Sovietaced I can see we have #3481 opened as well, I personally prefer the filtering approach in this PR, but let's discuss with @vmihailenco.

@htemelski-redis feel free to decide which one you prefer when you are back from vacation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

redisotel leaks passwords in traces
2 participants