-
Notifications
You must be signed in to change notification settings - Fork 181
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: AWS public IPv4 spec #3741
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@lzap - Thanks for contributing to insights-core. As mentioned in the #3732 (here) please submit MRs to the insights-core-assets to get these newly added specs approved first.
And, There is another important piece of information need to let you know: The Insights provides IP/Hostname obfuscation feature for the customer to protect their Personal Identifiable Information (PII), see this KCS-2047593. That is to say, when the customer enabled this feature on their hosts, the IP address
and hostname
that appeared in all the collected files/commands will be obfuscated to a fake one, including these 2 new specs. Please check if this obfuscation feature would affect you or not.
Rather than the two comments to the spec name, this PR looks good to me.
insights/parsers/aws_instance_id.py
Outdated
* ``curl -s http://169.254.169.254/latest/dynamic/instance-identity/pkcs7`` | ||
* ``curl -s http://169.254.169.254/latest/dynamic/instance-identity/pkcs7`` and | ||
* ``curl -s http://169.254.169.254/latest/meta-data/public-ipv4`` and | ||
* ``curl -s http://169.254.169.254/latest/meta-data/public-hostname`` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You may forget to add a parser for this AWSPublicHostname?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah right, yep.
Aha, I just saw your issue to the insights-core-assets, please ignore this noise. |
Thanks for the review, will update the patch shortly. So it looks like IP/hostname is identified as Personal Identifiable Information, what should I change in order to allow filtering. I am assuming that this needs to be added then: |
It's different from the |
I see but where do I define that these newly two added specs are in fact "obfuscte-able"? Is there some flag I need to set? Edit: Ah I see this is sort of "automatic search and replace" filter I guess? |
9433a22
to
a1a2251
Compare
A very easy way will be introduced by #3679 (see this sample to enable, disable by default), but before this PR#3679 , it's a bit complex to achieve this. Edit: not so complex, see here, but I recommend you get it approved (not the approval of the spec itself, but to approve it not being obfuscated) before adding it to the excluded list. |
Testing on EC2:
Data seems fine. |
To enable it, edit the following two options in the
|
I don’t think we want to exclude these new specs from being obfuscated, so I think we can proceed. |
Signed-off-by: Lukas Zapletal <[email protected]> (cherry picked from commit 2cbd09e)
Signed-off-by: Lukas Zapletal <[email protected]>
All Pull Requests:
Check all that apply:
Complete Description of Additions/Changes:
This tries to add an AWS public IP address, that is not known to the machine itself.
Issue: #3731
Replaces: #3732
Refs ESSNTL-4588
I would like to do the same for Azure and GCP too, would you prefer a single PR or multiple PRs?
This is my first contribution, review carefully and please guide me if I miss something. Thanks!