Vadym Zhytkevych created KAFKA-18371:
----------------------------------------

             Summary: TopicBasedRemoteLogMetadataManagerConfig exposes 
sensitive configuration data in logs
                 Key: KAFKA-18371
                 URL: https://issues.apache.org/jira/browse/KAFKA-18371
             Project: Kafka
          Issue Type: Bug
          Components: core
    Affects Versions: 3.1.0
            Reporter: Vadym Zhytkevych


{code:java}
[2024-12-20 14:52:56,805] INFO Successfully configured topic-based RLMM with 
config: 
TopicBasedRemoteLogMetadataManagerConfig{clientIdPrefix='__remote_log_metadata_client_6',
 metadataTopicPartitionsCount=50, consumeWaitMs=120000, 
metadataTopicRetentionMs=-1, metadataTopicReplicationFactor=3, 
initializationRetryMaxTimeoutMs=120000, initializationRetryIntervalMs=100, 
commonProps={request.timeout.ms=10000, ssl.client.auth=none, 
ssl.keystore.location=/etc/kafka/ssl/keystore.p12, 
bootstrap.servers:9094=server1, security.protocol=SASL_SSL, password=CLEARTEXT, 
ssl.truststore.location=/etc/pki/java/cacerts, ssl.keystore.password=CLEARTEXT, 
sasl.mechanism=SCRAM-SHA-512, ssl.key.password=CLEARTEXT, 
sasl.jaas.config=org.apache.kafka.common.security.scram.ScramLoginModule 
required username="username" password="CLEARTEXT";, 
ssl.truststore.password=CLEARTEXT, …{code}
 

Issue is related to using toString() method of 
TopicBasedRemoteLogMetadataManagerConfig, that prints maps of consumerProps and 
producerProps withou masking.

 

Current workaround: logger for class TopicBasedRemoteLogMetadataManagerConfig 
can be disabled to not expose sensitive data.

Expected behavior:  sensitive configuration data masked automatically in logs.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to