Uploaded image for project: 'Hadoop YARN'
  1. Hadoop YARN
  2. YARN-5549

AMLauncher#createAMContainerLaunchContext() should not log the command to be launched indiscriminately

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Critical
    • Resolution: Fixed
    • 2.7.2
    • 2.8.0, 3.0.0-alpha2
    • resourcemanager
    • None
    • Reviewed
    • Introduces a new configuration property, yarn.resourcemanager.amlauncher.log.command. If this property is set to true, then the AM command being launched will be masked in the RM log.

    Description

      The command could contain sensitive information, such as keystore passwords or AWS credentials or other. Instead of logging it as INFO, we should log it as DEBUG and include a property to disable logging it at all. Logging it to a different logger would also be viable and may create a smaller administrative footprint.

      Attachments

        1. YARN-5549.branch-2.001.patch
          5 kB
          Daniel Templeton
        2. YARN-5549.006.patch
          5 kB
          Daniel Templeton
        3. YARN-5549.005.patch
          7 kB
          Daniel Templeton
        4. YARN-5549.004.patch
          1 kB
          Daniel Templeton
        5. YARN-5549.003.patch
          7 kB
          Daniel Templeton
        6. YARN-5549.002.patch
          7 kB
          Daniel Templeton
        7. YARN-5549.001.patch
          7 kB
          Daniel Templeton

        Activity

          People

            templedf Daniel Templeton
            templedf Daniel Templeton
            Votes:
            0 Vote for this issue
            Watchers:
            9 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: