Uploaded image for project: 'Hadoop YARN'
  1. Hadoop YARN
  2. YARN-5549

AMLauncher#createAMContainerLaunchContext() should not log the command to be launched indiscriminately

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Critical
    • Resolution: Fixed
    • Affects Version/s: 2.7.2
    • Fix Version/s: 2.8.0, 3.0.0-alpha2
    • Component/s: resourcemanager
    • Labels:
      None
    • Target Version/s:
    • Hadoop Flags:
      Reviewed
    • Release Note:
      Introduces a new configuration property, yarn.resourcemanager.amlauncher.log.command. If this property is set to true, then the AM command being launched will be masked in the RM log.

      Description

      The command could contain sensitive information, such as keystore passwords or AWS credentials or other. Instead of logging it as INFO, we should log it as DEBUG and include a property to disable logging it at all. Logging it to a different logger would also be viable and may create a smaller administrative footprint.

        Attachments

        1. YARN-5549.branch-2.001.patch
          5 kB
          Daniel Templeton
        2. YARN-5549.006.patch
          5 kB
          Daniel Templeton
        3. YARN-5549.005.patch
          7 kB
          Daniel Templeton
        4. YARN-5549.004.patch
          1 kB
          Daniel Templeton
        5. YARN-5549.003.patch
          7 kB
          Daniel Templeton
        6. YARN-5549.002.patch
          7 kB
          Daniel Templeton
        7. YARN-5549.001.patch
          7 kB
          Daniel Templeton

          Activity

            People

            • Assignee:
              templedf Daniel Templeton
              Reporter:
              templedf Daniel Templeton
            • Votes:
              0 Vote for this issue
              Watchers:
              10 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: