From 3a074f83a778ce195159777ab3320c187282f674 Mon Sep 17 00:00:00 2001 From: Julien Mailleret Date: Wed, 13 Nov 2019 11:24:24 +0100 Subject: [PATCH] add security notice to github issue template --- .github/ISSUE_TEMPLATE/bug_report.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md index dc4801407..f57c28413 100644 --- a/.github/ISSUE_TEMPLATE/bug_report.md +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -11,10 +11,15 @@ about: Create a report to help us improve **Helm Version:** + **`helm get release` output** e.g. `helm get elasticsearch` (replace `elasticsearch` with the name of your helm release) +*Be careful to obfuscate every secrets (credentials, token, public IP, ...) that could be visible in the output before copy-pasting.* + +*If you find some secrets in plain text in `helm get release` output you should use [Kubernetes Secrets](https://kubernetes.io/docs/concepts/configuration/secret/) to managed them is a secure way (see [Security Example](https://github.com/elastic/helm-charts/blob/master/elasticsearch/examples/security/security.yml#L23-L38)).* + ``` ``` @@ -30,4 +35,9 @@ e.g. `helm get elasticsearch` (replace `elasticsearch` with the name of your hel **Provide logs and/or server output (if relevant):** +*Be careful to obfuscate every secrets (credentials, token, public IP, ...) that could be visible in the output before copy-pasting* + +``` +``` + **Any additional context:**