You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For our situation, <api_key_value> is considered a sensitive value and shouldn't be printed out in the logs, which can be viewed in observability tools such as Datadog. We would like to have the ability to have that value redacted for security concerns.
Describe the solution you'd like
One possibility
authentication:
router:
jwt:
jwks:
- url: <jwk_url>
headers:
- name: x-api-key
value: <api_key_value>
is_sensitive: true # (default value is false)
Is your feature request related to a problem? Please describe.
Currently, once JWT is configured and the router spin up, the following info log will be printed out at startup:
For our situation, <api_key_value> is considered a sensitive value and shouldn't be printed out in the logs, which can be viewed in observability tools such as Datadog. We would like to have the ability to have that value redacted for security concerns.
Describe the solution you'd like
One possibility
Then the output will look like
Describe alternatives you've considered
A clear and concise description of any alternative solutions or features you've considered.
Additional context
Add any other context or screenshots about the feature request here.
The text was updated successfully, but these errors were encountered: