[doc] Document using *_nolog variables in OpenStack-Ansible
Clarify that disabling them can expose sensitive data in logs and should only be done with caution during debugging. Change-Id: I21fae9cb7e1e3e720ae03e68ad4456b9577d6bf1 Signed-off-by: Dmitriy Chubinidze <dcu995@gmail.com>
This commit is contained in:
@@ -62,3 +62,19 @@ during runtime, for example:
|
||||
Including the deployment host can be useful to reduce its attack surface
|
||||
and ensure that the host running OpenStack-Ansible follows the same security
|
||||
best practices as your other nodes.
|
||||
|
||||
Hiding Secrets in OpenStack-Ansible
|
||||
-----------------------------------
|
||||
|
||||
OpenStack-Ansible roles use variables like ``_oslodb_setup_nolog``,
|
||||
``_service_setup_nolog``, and ``_oslomsg_nolog`` to control whether
|
||||
task output is hidden in logs.
|
||||
|
||||
By default, this prevents sensitive values (such as passwords) from being
|
||||
written to log files. Disabling these variables can make debugging easier,
|
||||
but it also risks exposing secrets in plain text.
|
||||
|
||||
.. warning::
|
||||
|
||||
Use them with caution: keep logging enabled for troubleshooting, but remember
|
||||
that passwords may appear in the logs if protection is turned off.
|
||||
|
||||
Reference in New Issue
Block a user