Public bug reported:
Example:
2014-07-25 22:28:25.352 1458 INFO eventlet.wsgi.server [-]
10.241.1.50,10.241.1.80 - - [25/Jul/2014 22:28:25] "GET
/v2.0/tokens/d5036612660543a3a9b8054c79dea8d3 HTTP/1.1" 200 3174
0.021630
We've found that this regex can catch all of these messages:
/v2.0/tokens/[\
Public bug reported:
Example:
2014-07-25 21:50:12.987 4750 DEBUG nova.openstack.common.processutils
[req-251c525c-b92e-4638-89a0-c77ee887ff17 119a4280aa594405aabc31b4fc0f640c
ae356b4961204701ae7e89b7495c28bb] Running cmd (subprocess): sudo nova-rootwrap
/etc/nova/rootwrap.conf iscsiadm -m node
Public bug reported:
Example:
2014-07-25 20:03:36.346 780 DEBUG glance.registry.api.v1.images
[1c66afef-0bc9-4413-b63a-c81585c2a981 2eae458f42e64420af5e3a2cab07e03a
9bc19f6aabc944c382bf553cb8131b17 - - -] Updating image dfd7e14c-
eb02-487e-8112-d1881ae031d9 with metadata: {u'status': u'active',
'
Public bug reported:
``keystoneclient/middleware/auth_token.py`` contains a bunch of places
where auth tokens are logged out. This could be useful for debugging,
but log files are the kinds of things that users often forget to secure.
We should make them not contain sensitive data.
** Affects: k
4 matches
Mail list logo