Skip to content

Commit d2ac6fe

Browse files
authored
Merge pull request kubernetes#3114 from PurelyApplied/update-1933-for-deprecated-1753
KEP-1933: Update references to deprecated KEP-1753.
2 parents ff71f81 + 39fd74a commit d2ac6fe

File tree

1 file changed

+3
-6
lines changed
  • keps/sig-security/1933-secret-logging-static-analysis

1 file changed

+3
-6
lines changed

keps/sig-security/1933-secret-logging-static-analysis/README.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,6 @@ It can be use used to harden the boundaries for those data which require special
173173

174174
This Kubernetes Enhancement Proposal (KEP) proposes such analysis to be used
175175
during testing to prevent various types of sensitive information from leaking via logs.
176-
For a complimentary efforts at runtime, see [KEP-1753: Kubernetes system components logs sanitization](https://github.com/kubernetes/enhancements/pull/1754).
177176

178177
## Motivation
179178

@@ -251,8 +250,8 @@ Taint propagation analysis gives additional consideration is given to how data
251250
See the `go-flow-levee` documentation for details.
252251

253252
While configuration of source identification can be done via manually configured regexp,
254-
this KEP would benefit from a set of standard Kubernetes go lang struct tags indicating which fields are expected to contain secrets,
255-
as proposed in [KEP-1753](https://github.com/kubernetes/enhancements/pull/1754).
253+
this KEP benefits from a set of standard Kubernetes go lang struct tags indicating which fields are expected to contain secrets.
254+
See [KEP-1753](/keps/sig-instrumentation/1753-logs-sanitization/README.md) for more information on data policy tags.
256255

257256
### Notes/Constraints/Caveats
258257

@@ -576,9 +575,7 @@ However, such additional testing has not proven necessary given the rarity of bo
576575
As this analysis depends on project-specific considerations of what constitutes
577576
a secret or a sink, periodic review is required to ensure configuration is kept up-to-date.
578577
This is mitigated somewhat with a consistent use of field tags,
579-
as proposed in [KEP-1753](https://github.com/kubernetes/enhancements/pull/1754),
580-
though correct application of field tags would also be subject to periodic review.
581-
578+
as introduced in [KEP-1753](/keps/sig-instrumentation/1753-logs-sanitization/README.md).
582579

583580
## Alternatives
584581

0 commit comments

Comments
 (0)