-
Notifications
You must be signed in to change notification settings - Fork 401
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PATRONI_LOG_* environment variables are ignored. #718
Comments
You can always inject part of Patroni configuration via {"log":{"level":"DEBUG", ...}} |
I am using the postgres kubernetes operator to manage the database. Unfortunately the operator does not provide a way to add custom config to |
Yes, these variables may have some sensitive data that will be visible to Postgres. Exactly this is written in the comment to lines you are referring at:
|
I see, does patroni not strip out ref patroni/patroni#1224 So shouldn't it be safe to be able to configure patroni using env vars (as is documented) and let it worry about removing them before starting postgres? |
Made a quick PR here (#719) @CyberDem0n, let me know what you think. |
@CyberDem0n any additional thoughts here? Are we unable to rely on patroni process to protect itself? |
any news to decrease log verbosity? |
It seems that most environment variables are removed before starting the patroni process. I was attempting to configure patroni to log to a directory (instead of stdout) by using the
PATRONI_LOG_DIR
environment variable, but therunit/patroni/run
script seems to be working against me here:ref: https://github.com/zalando/spilo/blob/master/postgres-appliance/runit/patroni/run#L24-L26
Would it be possible to add
|(PATRONI_LOG_.*=)
to the regex to allow PATRONI_LOG_* variables to be passed to the process?The text was updated successfully, but these errors were encountered: