Comments (8)
- { "client":"", "method":"", "username":"", "timestamp":"", "host":"", "upstream":"", "url":, "protocol":"", "user_agent":, "status":"", "length":"", "response-time":"", }
maybe the problem is the lack of space between the quotes #
from oauth2-proxy.
@AlexSins Unfortunately, it's not an input problem. The code itself isn't written to support JSON logging because there's no way to tell it to do the required escaping (e.g. double quotes). The problem is tracked here: #1057
from oauth2-proxy.
Logging has recently been improved with logging formats that will allow users to define their own structure, closing this
from oauth2-proxy.
I don't think this should be closed. json logging seems to be pretty standard these days and should be supported by oauth2-proxy
from oauth2-proxy.
We solved it in a hacky way for now, but using this logging format. Maybe this helps somebody, as long as this is not offically supported.
auth_logging_format = '{"client": "{{.Client}}", "username": "{{.Username}}", "timestamp": "{{.Timestamp}}", "status": {{.Status}}, "message": "{{.Message}}"}'
request_logging_format = '{"client": "{{.Client}}", "username": "{{.Username}}", "timestamp": "{{.Timestamp}}", "host": "{{.Host}}", "request_method": "{{.RequestMethod}}", "upstream": "{{.Upstream}}", "request_uri": {{.RequestURI}}, "protocol": "{{.Protocol}}", "user_agent": {{.UserAgent}}, "status_code": {{.StatusCode}}, "response_size": {{.ResponseSize}}, "request_duration": {{.RequestDuration}}}'
standard_logging_format = '{"timestamp": "{{.Timestamp}}", "file": "{{.File}}", "message": "{{.Message}}"}'
from oauth2-proxy.
One of the primary goals of introducing customisable logging formats was to allow people to use structured logging in exactly the way you have done in your comment above.
I can't recall if we have an example of a JSON logging template in the docs, but if not, perhaps we could update it to I could your example
from oauth2-proxy.
@max-wittig Thank you for this example. I'm trying to figure this out right now. The format you provide looks good, but I deploy oauth2-proxy with the helm chart and helm is choking on a value like that... I think because the format string is using the same variable syntax as helm. Have you (or anyone else, @JoelSpeed) configured structured log formatting using the Helm chart?
from oauth2-proxy.
For anyone coming along in the future, I actually figured out how to set this up in the Helm chart. Here's an example of what I'm doing in my values.yaml:
extraArgs:
request-logging-format: >-
{
"client":"{{.Client}}",
"method":"{{.RequestMethod}}",
"username":"{{.Username}}",
"timestamp":"{{.Timestamp}}",
"host":"{{.Host}}",
"upstream":"{{.Upstream}}",
"url":{{.RequestURI}},
"protocol":"{{.Protocol}}",
"user_agent":{{.UserAgent}},
"status":"{{.StatusCode}}",
"length":"{{.ResponseSize}}",
"response-time":"{{.RequestDuration}}",
}
from oauth2-proxy.
Related Issues (20)
- [Support]: Can not get X-Auth-Request-Email and X-Auth-Request-User
- [Support]: Synology basic reverse proxy and sso server => oauth2-proxy => another docker application to protect by auth HOT 1
- [Support]: Getting CRSF cookie or cookie limit 4kb error HOT 2
- [Feature]: auto refresh token HOT 5
- "403: You do not have permission to access this resource." but only for some users HOT 1
- [Bug]: Docs - htpasswd-file description does not mention SHA1 encryption HOT 2
- [Bug]: 500 (Internal Server Error) on invalid cookie
- [Bug]: Infinite loop if the Csrf cookie is set twice
- [Support]: nginx + oauth2-proxy, logout configuration
- [Feature]: options for add files in /oauth2/static/ HOT 4
- [Feature]: Guides for rauthy and/or authelia
- [Bug]: Unable to use hyphen in JSON path for oidc-groups-claim option
- [Bug]: Invalid authentication via OAuth2 via Github for the owner of the organisation HOT 6
- [Bug]: Possible typo in source code for static upstreams HOT 2
- [Bug]: Incomplete source of request urls for skip_auth_routes feature
- [Bug]: Redirect after second google login to home page not working
- [Support]: 401 Authorization Required even finished authentication HOT 1
- [Feature]: use username (or any other attribute from the provider) in basic auth header instead of the ID
- [Feature]: JWT validation only mode HOT 8
- [Bug]: An invalid redirect to a non-whitelisted domain creates a valid session cookie after redirecting to "/"
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from oauth2-proxy.