When the user enables "logspy", i.e. injects a logging interceptor, the entries are passed to the interceptor and do not go to the log file any more.
This makes any log entry disappear entirely. Including all the audit logging which is required for security purpose.
We must change the logspy / intercept mechanism to have "tee" behavior and let the entries continue to go to log files or other sinks.
Found by @miretskiy
cc @aaron-crl @tbg
When the user enables "logspy", i.e. injects a logging interceptor, the entries are passed to the interceptor and do not go to the log file any more.
This makes any log entry disappear entirely. Including all the audit logging which is required for security purpose.
We must change the logspy / intercept mechanism to have "tee" behavior and let the entries continue to go to log files or other sinks.
Found by @miretskiy
cc @aaron-crl @tbg