Hello all,
I recently discovered Linux capabilities, in particular the option CAP_DAC_READ_SEARCH from the AmbientCapabilities parameter in services, and realised it was actually implemented on Splunk UF 9.0+.
I was happy to see this included in the service of UFs, but I then found it was not enabled by default on Splunk Enterprise (I was using 9.3.1), so I attempted to create an override for the service, including the aforementioned parameter.
Unfortunately, I was unable to ingest logs for which the user running splunk did not have the permissions. Funnily enough, I tried to set some monitoring on /var/log/messages through the GUI; I was able to see the logs when selecting the sourcetype, but then I got an error "Parameter name: Path is not readable" when submitting the conf. I also get an insufficient permission message in the internal logs when forcing the monitoring of /var/log/messages via an inputs.conf.
I read on an older post that this behaviour comes from the use of an inappropriate function when checking the permissions on the file...
So my questions to the community and Splunk employees are :
Thanks
Hi @alex12
As documented here
https://docs.splunk.com/Documentation/Forwarder/9.3.1/Forwarder/Installleastprivileged
the CAP_DAC_READ_SEARCH will work only with UF (not with HF)
the HF installation method (regular Splunk enterprise installation)
https://docs.splunk.com/Documentation/Splunk/9.3.1/Installation/InstallonLinux
I believe this feature is for UF only, code changes are made only for UF.