<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring SELinux on RHEL 6 in Installation</title>
    <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/564308#M10563</link>
    <description>&lt;P&gt;Have to agree with&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/278"&gt;@dwaddle&lt;/a&gt;, use `semanage` and `restorecon` as `chcon` is not persistent across reboots. On CentOS7/8, there should be no need to change SELinux policy if Splunk is in `/opt/splunk` and binding to standard ports. Only the homedir in `/opt/splunk` will fail to be created during a rpm install as per error message but will still be created in the end. See "non-default homedir location" online for aforementioned error.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Aug 2021 11:53:02 GMT</pubDate>
    <dc:creator>ephemeric</dc:creator>
    <dc:date>2021-08-23T11:53:02Z</dc:date>
    <item>
      <title>Configuring SELinux on RHEL 6</title>
      <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101173#M1728</link>
      <description>&lt;P&gt;So I have tried to run chcon command on the /opt/splunk/lib as the docs indicate.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;chcon -v -R -u system_u -r object_r -t lib_t $SPLUNK_HOME/lib 2&amp;gt;&amp;amp;1 &amp;gt; /dev/null and chcon -v -R -u system_u -r object_r -t lib_t /opt/splunk/lib 2&amp;gt;&amp;amp;1 &amp;gt; /dev/null&lt;/LI-CODE&gt;
&lt;P&gt;Also added:&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;export SPLUNK_IGNORE_SELINUX=1 to setSplunkEnv&lt;/LI-CODE&gt;
&lt;P&gt;script but not sure I did it correctly? Does it need to be at the end, before the esac or ??&lt;/P&gt;
&lt;P&gt;Can I verify the chcon ran successfully?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 18:53:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101173#M1728</guid>
      <dc:creator>snosplunk</dc:creator>
      <dc:date>2020-06-23T18:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring SELinux on RHEL 6</title>
      <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101174#M1729</link>
      <description>&lt;P&gt;The easiest way to verify any SELinux labelling worked properly is with the "-Z" option to ls.  But, starting with RHEL5, there are superior tools to chcon for more permanently configuring your SELinux policy to put certain files into a specific context.  Look into the "semanage" and "restorecon" tools.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2010 07:46:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101174#M1729</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2010-12-08T07:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring SELinux on RHEL 6</title>
      <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101175#M1730</link>
      <description>&lt;P&gt;On RHEL 6 there is no need to change anything in relation to SELinux for Splunk to work correctly. However, it's a good idea to confine Splunk with SELinux to take advantage of the protection it provides: &lt;A href="https://github.com/doksu/selinux_policy_for_splunk"&gt;https://github.com/doksu/selinux_policy_for_splunk&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2015 11:41:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101175#M1730</guid>
      <dc:creator>doksu</dc:creator>
      <dc:date>2015-03-25T11:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring SELinux on RHEL 6</title>
      <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101176#M1731</link>
      <description>&lt;P&gt;does this also apply to SELinux in CentOS6?  I like Dan Walsh and don't want him to cry &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 21:37:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101176#M1731</guid>
      <dc:creator>scruse</dc:creator>
      <dc:date>2015-07-17T21:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring SELinux on RHEL 6</title>
      <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101177#M1732</link>
      <description>&lt;P&gt;Yes, it applies to any RHEL 6 binary-compatible distributions (CentOS, Oracle Linux, etc). If you're concerned, you can have your cake and eat it too by confining Splunk with the policy but running it in permissive (so it only logs policy violations, rather than preventing them). Be sure to ingest your AVCs into Splunk (by putting an inputs.conf monitor stanza on /var/log/audit/audit.log), then use the 'Type Enforcement' dashboard of the Linux Auditd app (&lt;A href="https://splunkbase.splunk.com/app/2642/"&gt;https://splunkbase.splunk.com/app/2642/&lt;/A&gt;) to analyse denials.&lt;/P&gt;

&lt;P&gt;N.B. I've been working on a RHEL 7 version of the policy recently; let me know if you'd like any further information - it should be released on github some time soon.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 01:40:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/101177#M1732</guid>
      <dc:creator>doksu</dc:creator>
      <dc:date>2015-07-21T01:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring SELinux on RHEL 6</title>
      <link>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/564308#M10563</link>
      <description>&lt;P&gt;Have to agree with&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/278"&gt;@dwaddle&lt;/a&gt;, use `semanage` and `restorecon` as `chcon` is not persistent across reboots. On CentOS7/8, there should be no need to change SELinux policy if Splunk is in `/opt/splunk` and binding to standard ports. Only the homedir in `/opt/splunk` will fail to be created during a rpm install as per error message but will still be created in the end. See "non-default homedir location" online for aforementioned error.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 11:53:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Installation/Configuring-SELinux-on-RHEL-6/m-p/564308#M10563</guid>
      <dc:creator>ephemeric</dc:creator>
      <dc:date>2021-08-23T11:53:02Z</dc:date>
    </item>
  </channel>
</rss>

