-
Notifications
You must be signed in to change notification settings - Fork 438
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically mask passwords #257
Comments
Pinging @elastic/integrations-services (Team:Services) |
There is password field which masks the phrase with |
Oracle events contain sensitive information that customers consider as a risk
|
Elastic Agent uses Metricbeat and Filebeat to generate such data, so it's not the Integrations issue, but rather Metricbeat/Filebeat. Field definitions stored in Integrations are used mostly to generate Kibana UI and config files. I suppose this should be fixed on the events collector level to strip it and do not leak passwords anywhere. |
In Metricbeat it looks like diff --git a/metricbeat/mb/module/wrapper.go b/metricbeat/mb/module/wrapper.go
index 2ea0d2b60..f0d1552c8 100644
--- a/metricbeat/mb/module/wrapper.go
+++ b/metricbeat/mb/module/wrapper.go
@@ -392,7 +392,7 @@ func (r reporterV2) Event(event mb.Event) bool {
}
if event.Host == "" {
- event.Host = r.msw.Host()
+ event.Host = r.msw.HostData().SanitizedURI
}
if event.Error == nil { |
Provide an automatic way to identify and mask sensitive information such as a password when used with the SQL based database integrations, such as Oracle module.
The text was updated successfully, but these errors were encountered: