Enhancement request: Ability to mask pillar output in state.apply output #67367
Replies: 5 comments
-
|
If you add |
Beta Was this translation helpful? Give feedback.
-
|
@Akm0d That is what I call a workaround, not a solution. ;-) |
Beta Was this translation helpful? Give feedback.
-
|
Regarding the outputs Ansible has a Which is very useful. I wish it'd be possible to do something like this to arbitrary Salt state. |
Beta Was this translation helpful? Give feedback.
-
|
Also the ability to mask this in the /var/log/salt/events would be great, this would allow external log gathering systems to intake this log for monitoring. |
Beta Was this translation helpful? Give feedback.
-
|
Thank you all for the feedback and patience on this! We are officially moving forward with this enhancement. We are tracking this work internally and plan to implement a context-aware masking wrapper. This will automatically mask sensitive pillar data in both state.apply outputs and Salt event logs (/var/log/salt/events), allowing you to retain detailed state outputs safely without resorting to terse mode. We are also exploring the addition of granular, no_log-style controls based on the feedback here. This feature is currently targeted for the 3008 release. I am going to close this discussion now as we transition to tracking the active implementation. Thanks again for the great input! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
He ability to secure secrets using
gpgand using them in templates with{{ pillar['secret-squirrel'] }}"is great.However the problem is, that it shows up in logs and outputs, e.g. calling
salt 'foobar' state.applyMaybe we can have a special alias, e.g.
pillar-secretwhich would have identical behaviour topillarexcept it would also cause the output to be automagically masked in output fromstate.applyand similar.Beta Was this translation helpful? Give feedback.
All reactions