Bug 2006217 - [RFE] Add the role being assumed by the user to the RGW opslogs when using STS assumerole
Summary: [RFE] Add the role being assumed by the user to the RGW opslogs when using ST...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: RGW
Version: 5.1
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
: 5.1
Assignee: Pritha Srivastava
QA Contact: Vidushi Mishra
Ranjini M N
URL:
Whiteboard:
Depends On: 1965540
Blocks: 2031073
TreeView+ depends on / blocked
 
Reported: 2021-09-21 08:18 UTC by Pritha Srivastava
Modified: 2022-04-04 10:22 UTC (History)
15 users (show)

Fixed In Version: ceph-16.2.6-2.el8cp
Doc Type: Enhancement
Doc Text:
.The role name and role session fields are now available in ops log for temporary credentials Previously, the role name and role session were not available and it was difficult for the administrator to know which role was being assumed and which session was active for the temporary credentials being used. With this release, role name and role session to ops log are available for temporary credentials, returned by AssumeRole* APIs, to perform S3 operations.
Clone Of: 1965540
Environment:
Last Closed: 2022-04-04 10:21:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHCEPH-1837 0 None None None 2021-09-21 08:18:50 UTC
Red Hat Product Errata RHSA-2022:1174 0 None None None 2022-04-04 10:22:07 UTC

Comment 12 errata-xmlrpc 2022-04-04 10:21:43 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat Ceph Storage 5.1 Security, Enhancement, and Bug Fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:1174


Note You need to log in before you can comment on or make changes to this bug.