Done
Details
Assignee
Former userFormer user(Deactivated)Reporter
Former userFormer user(Deactivated)Labels
Fix versions
Affects versions
Priority
Highest
Details
Details
Assignee
Former user
Former user(Deactivated)Reporter
Former user
Former user(Deactivated)Labels
Fix versions
Affects versions
Priority
Created December 28, 2018 at 3:22 PM
Updated August 12, 2023 at 4:50 AM
Resolved January 16, 2019 at 9:07 PM
It was discussed that what ND -> OpenStack query happens, logging should not expose any username and / or password credentials
However in the logs, I can see the tenant that is being used to ask
2018-12-28T15:06:20.704Z discovery-worker-2 INFO org.onap.sdnc.apps.pomba.networkdiscovery.service.rs.RestService request at url = http://10.69.100.11:5000/v3/auth/tokens resulted in http response: {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "994226a77a7049ae82dd3f9ded966a56", "name": "admin"}, {"id": "9fe2ff9ee4384b1894a90878d3e92bab", "name": "member"}, {"id": "d271d1dc2c914bce9915e05ac0f1829f", "name": "heat_stack_owner"}], "expires_at": "2018-12-28T16:03:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e52a2a0310084b7b90fac1cfa07ff79f", "name": "jbalasub"}, "catalog": [{"endpoints": [{"region_id": "RegionOne", "url": "http://10.69.100.11:8778/placement", "region": "RegionOne", "interface": "internal", "id": "2d76f97ce0fe4cf692f07c3e6efd44f7"}, {"region_id": "RegionOne", "url": "http://10.69.100.11:8778/placement", "region": "RegionOne", "interface": "admin", "id": "c62ca03b18644a6fa89323dc7cddc3bb"}, {"region_id": "RegionOne", "url": "http://10.69.100.11:8778/placement"
How to reproduce
============
Ensure POMBA/ND is configured to talk to Openstack
Run a orchestration-event to the DR
Monitor logs in ND