<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Permissions issue in Docker container in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/376857#M1172</link>
    <description>&lt;P&gt;When splunk starts it seems to try and chown the config files (ie. web.conf) to whatever user splunk is currently running as. This causes an issue with Kubernetes deployments.&lt;/P&gt;
&lt;P&gt;When you mount configuration files through a ConfigMap it mounts the volumes as read only owned by root. This would still allow non-root processes to read. However when splunk tries to start the chown fails, causing the container to fail as well.&lt;/P&gt;
&lt;P&gt;Is there a flag to disable chown-ing config files on start, or is this something than can be put in a change request and removed form startup all together?&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jun 2020 16:54:53 GMT</pubDate>
    <dc:creator>thoyt</dc:creator>
    <dc:date>2020-06-10T16:54:53Z</dc:date>
    <item>
      <title>Permissions issue in Docker container</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/376857#M1172</link>
      <description>&lt;P&gt;When splunk starts it seems to try and chown the config files (ie. web.conf) to whatever user splunk is currently running as. This causes an issue with Kubernetes deployments.&lt;/P&gt;
&lt;P&gt;When you mount configuration files through a ConfigMap it mounts the volumes as read only owned by root. This would still allow non-root processes to read. However when splunk tries to start the chown fails, causing the container to fail as well.&lt;/P&gt;
&lt;P&gt;Is there a flag to disable chown-ing config files on start, or is this something than can be put in a change request and removed form startup all together?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 16:54:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/376857#M1172</guid>
      <dc:creator>thoyt</dc:creator>
      <dc:date>2020-06-10T16:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions issue in Docker container</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/376858#M1173</link>
      <description>&lt;P&gt;See my response on this &lt;A href="https://answers.splunk.com/answers/739649/unable-to-run-splunk-forwarder-image-as-non-root-u.html?childToView=740712#answer-740712"&gt;thread&lt;/A&gt;: &lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 15:46:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/376858#M1173</guid>
      <dc:creator>codebuilder</dc:creator>
      <dc:date>2019-04-16T15:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Permissions issue in Docker container</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/550615#M5740</link>
      <description>&lt;P&gt;I encounter this as well when running splunkforwarder on kubernetes cluster as daemonset. This was solved by mounting the volume to /opt/splunkforwarder-etc/ instead of /opt/splunkforwarder. It seems that all the local/custom configuration should be implemented on /opt/splunkforwarder-etc/&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 08:34:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Permissions-issue-in-Docker-container/m-p/550615#M5740</guid>
      <dc:creator>jhomerlopez</dc:creator>
      <dc:date>2021-05-06T08:34:44Z</dc:date>
    </item>
  </channel>
</rss>

