Bug 2039282 - ovnkube-node log spam (and security token leak?)
Summary: ovnkube-node log spam (and security token leak?)
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Networking
Version: 4.9
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: 4.7.z
Assignee: Riccardo Ravaioli
QA Contact: Anurag saxena
URL:
Whiteboard:
Depends On: 2039279
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-01-11 12:20 UTC by Riccardo Ravaioli
Modified: 2022-03-31 02:53 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 2039279
Environment:
Last Closed: 2022-02-03 05:18:57 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift ovn-kubernetes pull 906 0 None open [release-4.8][backport] Bug 2039282: filter out KubeAPIAuth when logging CNI requests 2022-01-14 10:26:04 UTC
Red Hat Product Errata RHSA-2022:0283 0 None None None 2022-02-03 05:19:15 UTC

Comment 6 errata-xmlrpc 2022-02-03 05:18:57 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.7.42 security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0283


Note You need to log in before you can comment on or make changes to this bug.