<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Permissions on /var/log in Security</title>
    <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25641#M847</link>
    <description>&lt;P&gt;I downvoted this post because running any applications as root is considered a severe security risk and most organisations with any sense will laugh at this recommendation. use acls on the host or add the splunk user to a group that has read access&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2016 15:42:18 GMT</pubDate>
    <dc:creator>quixand</dc:creator>
    <dc:date>2016-05-24T15:42:18Z</dc:date>
    <item>
      <title>Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25632#M838</link>
      <description>&lt;P&gt;To maintain correct permissions how do you allow for splunk to read /var/log?  I keep getting the following error&lt;BR /&gt;
06-08-2011 16:17:16.355 -0400 WARN  FilesystemChangeWatcher - error reading directory "/var/log": Permission denied&lt;/P&gt;

&lt;P&gt;I am very reluctant to change /var/log to 640.  Any help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 20:25:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25632#M838</guid>
      <dc:creator>rmcook84</dc:creator>
      <dc:date>2011-06-08T20:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25633#M839</link>
      <description>&lt;P&gt;This is on rhel 5.6&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 20:25:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25633#M839</guid>
      <dc:creator>rmcook84</dc:creator>
      <dc:date>2011-06-08T20:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25634#M840</link>
      <description>&lt;P&gt;You need to run splunk as the root user in order to read files that only root has access to, as well as to listen on privileged network ports.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 20:57:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25634#M840</guid>
      <dc:creator>mw</dc:creator>
      <dc:date>2011-06-08T20:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25635#M841</link>
      <description>&lt;P&gt;Could you describe the best way to present access to the splunk account to do this.  I would + security would prefer if it ran as splunk.  I was thinking possibly make a modification to sudoers but I am unsure if it does a cat or a tail or other to the logs.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 21:50:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25635#M841</guid>
      <dc:creator>rmcook84</dc:creator>
      <dc:date>2011-06-08T21:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25636#M842</link>
      <description>&lt;P&gt;I don't know of any way to use sudo to only provide read permissions to the splunk process.  You could add the splunk user to various groups that have read permission of the files.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2011 22:18:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25636#M842</guid>
      <dc:creator>mw</dc:creator>
      <dc:date>2011-06-08T22:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25637#M843</link>
      <description>&lt;P&gt;Ok for all future purposes or anyone needing to use splunk without running it as root.  You will need to set acls on the /var/log directory.  You only need to set read for the splunk user which will still keep you in a very secure setup as long as you keep splunk as a /sbin/nologin account also.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2011 01:35:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25637#M843</guid>
      <dc:creator>rmcook84</dc:creator>
      <dc:date>2011-06-09T01:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25638#M844</link>
      <description>&lt;P&gt;See also &lt;A href="http://answers.splunk.com/answers/60388/recommended-permissions-on-varlog-for-splunk_ta_nix"&gt;http://answers.splunk.com/answers/60388/recommended-permissions-on-varlog-for-splunk_ta_nix&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2014 19:16:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25638#M844</guid>
      <dc:creator>tfpblanchard</dc:creator>
      <dc:date>2014-06-27T19:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25639#M845</link>
      <description>&lt;P&gt;See also &lt;A href="http://answers.splunk.com/answers/60388/recommended-permissions-on-varlog-for-splunk_ta_nix"&gt;http://answers.splunk.com/answers/60388/recommended-permissions-on-varlog-for-splunk_ta_nix&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2014 19:16:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25639#M845</guid>
      <dc:creator>tfpblanchard</dc:creator>
      <dc:date>2014-06-27T19:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25640#M846</link>
      <description>&lt;P&gt;I would recommend adding the ID that splunk runs as to a group which has read permissions to those logs. Running splunk as root is usually not worth the risk/scrutiny that it will come under from most organizations.&lt;/P&gt;

&lt;P&gt;example: the following log has read permissions for the owner root and the group root. Adding the splunk id to the group root should allow the splunk id to read a log with 640 permissions as shown below.&lt;BR /&gt;
    ls -l /var/log/messages&lt;BR /&gt;
    -rw-r----- 1 root root      2500271 Dec 15 15:03 messages&lt;/P&gt;

&lt;P&gt;Another option would be to have the log set to world readable. ie. permissions of 644.&lt;/P&gt;

&lt;P&gt;Ultimately, you will need to speak to the sys admin as permissions may have higher/lower security levels at different companies.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 19:30:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25640#M846</guid>
      <dc:creator>bandit</dc:creator>
      <dc:date>2015-12-22T19:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25641#M847</link>
      <description>&lt;P&gt;I downvoted this post because running any applications as root is considered a severe security risk and most organisations with any sense will laugh at this recommendation. use acls on the host or add the splunk user to a group that has read access&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2016 15:42:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25641#M847</guid>
      <dc:creator>quixand</dc:creator>
      <dc:date>2016-05-24T15:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25642#M848</link>
      <description>&lt;P&gt;see: &lt;A href="https://answers.splunk.com/answers/4253/how-to-monitor-root-owned-logs-while-running-splunk-as-a-non-root-user.html#answer-408258"&gt;https://answers.splunk.com/answers/4253/how-to-monitor-root-owned-logs-while-running-splunk-as-a-non-root-user.html#answer-408258&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 15:31:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25642#M848</guid>
      <dc:creator>quixand</dc:creator>
      <dc:date>2016-06-01T15:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25643#M849</link>
      <description>&lt;P&gt;Use ACL command to grant permission to 'splunk' user only.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sudo setfacl -R -m u:splunk:r-x /var/log
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 May 2019 02:32:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25643#M849</guid>
      <dc:creator>jawaharas</dc:creator>
      <dc:date>2019-05-01T02:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions on /var/log</title>
      <link>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25644#M850</link>
      <description>&lt;P&gt;For privileged ports, I prefer either a reverse proxy server or an iptables redirect &lt;A href="https://www.cyberciti.biz/faq/linux-port-redirection-with-iptables"&gt;https://www.cyberciti.biz/faq/linux-port-redirection-with-iptables&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 19:52:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Permissions-on-var-log/m-p/25644#M850</guid>
      <dc:creator>bandit</dc:creator>
      <dc:date>2019-11-20T19:52:49Z</dc:date>
    </item>
  </channel>
</rss>

