-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault Audit Logs include javascript as field name #10441
Comments
You mentioned this happens sometimes. Do you have any more data on what might make it happen or not happen? State, series of actions, etc? And thanks for pointing this out! |
When I was initially testing I was having a hard time reproducing consistently, but could make it happen by clicking around the auth configuration pages as mentioned. I've looked further and now I notice that there is actually a request being made by the browser, copied as curl from chrome devtools:
So it looks like this might actually be a bug with the frontend javascript itself perhaps? |
I'm also experiencing this issue. It's making logstash crash when it tries to parse the json message with a field name like that. |
This should be fixed as of #14966 (versions 1.11.0, 1.10.1, 1.9.5, 1.8.10) Feel free to re-open if you see it come up again! |
Describe the bug
Vault audit logs for
sys/capabilities-self
sometimes includes an invalid javascript based field name.To Reproduce
Steps to reproduce the behavior:
ui/vault/access/gcp/configuration
)Expected behavior
Vault Audit logs do not include invalid JSON fields. This causes major headaches with ELK centralized logging infrastructure.
Environment:
vault status
): v1.5.4vault version
): v1.5.4The text was updated successfully, but these errors were encountered: