1zabbix_agent_selinux(8) SELinux Policy zabbix_agent zabbix_agent_selinux(8)
2
3
4
6 zabbix_agent_selinux - Security Enhanced Linux Policy for the zab‐
7 bix_agent processes
8
10 Security-Enhanced Linux secures the zabbix_agent processes via flexible
11 mandatory access control.
12
13 The zabbix_agent processes execute with the zabbix_agent_t SELinux
14 type. You can check if you have these processes running by executing
15 the ps command with the -Z qualifier.
16
17 For example:
18
19 ps -eZ | grep zabbix_agent_t
20
21
22
24 The zabbix_agent_t SELinux type can be entered via the zab‐
25 bix_agent_exec_t file type.
26
27 The default entrypoint paths for the zabbix_agent_t domain are the fol‐
28 lowing:
29
30 /usr/bin/zabbix_agentd, /usr/sbin/zabbix_agentd
31
33 SELinux defines process types (domains) for each process running on the
34 system
35
36 You can see the context of a process using the -Z option to ps
37
38 Policy governs the access confined processes have to files. SELinux
39 zabbix_agent policy is very flexible allowing users to setup their zab‐
40 bix_agent processes in as secure a method as possible.
41
42 The following process types are defined for zabbix_agent:
43
44 zabbix_agent_t
45
46 Note: semanage permissive -a zabbix_agent_t can be used to make the
47 process type zabbix_agent_t permissive. SELinux does not deny access to
48 permissive process types, but the AVC (SELinux denials) messages are
49 still generated.
50
51
53 SELinux policy is customizable based on least access required. zab‐
54 bix_agent policy is extremely flexible and has several booleans that
55 allow you to manipulate the policy and run zabbix_agent with the tight‐
56 est access possible.
57
58
59
60 If you want to allow all domains to execute in fips_mode, you must turn
61 on the fips_mode boolean. Enabled by default.
62
63 setsebool -P fips_mode 1
64
65
66
67 If you want to allow Zabbix to run su/sudo, you must turn on the zab‐
68 bix_run_sudo boolean. Disabled by default.
69
70 setsebool -P zabbix_run_sudo 1
71
72
73
75 SELinux defines port types to represent TCP and UDP ports.
76
77 You can see the types associated with a port by using the following
78 command:
79
80 semanage port -l
81
82
83 Policy governs the access confined processes have to these ports.
84 SELinux zabbix_agent policy is very flexible allowing users to setup
85 their zabbix_agent processes in as secure a method as possible.
86
87 The following port types are defined for zabbix_agent:
88
89
90 zabbix_agent_port_t
91
92
93
94 Default Defined Ports:
95 tcp 10050
96
98 The SELinux process type zabbix_agent_t can manage files labeled with
99 the following file types. The paths listed are the default paths for
100 these file types. Note the processes UID still need to have DAC per‐
101 missions.
102
103 cluster_conf_t
104
105 /etc/cluster(/.*)?
106
107 cluster_var_lib_t
108
109 /var/lib/pcsd(/.*)?
110 /var/lib/cluster(/.*)?
111 /var/lib/openais(/.*)?
112 /var/lib/pengine(/.*)?
113 /var/lib/corosync(/.*)?
114 /usr/lib/heartbeat(/.*)?
115 /var/lib/heartbeat(/.*)?
116 /var/lib/pacemaker(/.*)?
117
118 cluster_var_run_t
119
120 /var/run/crm(/.*)?
121 /var/run/cman_.*
122 /var/run/rsctmp(/.*)?
123 /var/run/aisexec.*
124 /var/run/heartbeat(/.*)?
125 /var/run/pcsd-ruby.socket
126 /var/run/corosync-qnetd(/.*)?
127 /var/run/corosync-qdevice(/.*)?
128 /var/run/corosync.pid
129 /var/run/cpglockd.pid
130 /var/run/rgmanager.pid
131 /var/run/cluster/rgmanager.sk
132
133 faillog_t
134
135 /var/log/btmp.*
136 /var/log/faillog.*
137 /var/log/tallylog.*
138 /var/run/faillock(/.*)?
139
140 krb5_host_rcache_t
141
142 /var/tmp/krb5_0.rcache2
143 /var/cache/krb5rcache(/.*)?
144 /var/tmp/nfs_0
145 /var/tmp/DNS_25
146 /var/tmp/host_0
147 /var/tmp/imap_0
148 /var/tmp/HTTP_23
149 /var/tmp/HTTP_48
150 /var/tmp/ldap_55
151 /var/tmp/ldap_487
152 /var/tmp/ldapmap1_0
153
154 lastlog_t
155
156 /var/log/lastlog.*
157
158 root_t
159
160 /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
161 /
162 /initrd
163
164 security_t
165
166 /selinux
167
168 zabbix_log_t
169
170 /var/log/zabbix.*
171
172 zabbix_tmpfs_t
173
174
175 zabbix_var_run_t
176
177 /var/run/zabbix(/.*)?
178
179
181 SELinux requires files to have an extended attribute to define the file
182 type.
183
184 You can see the context of a file using the -Z option to ls
185
186 Policy governs the access confined processes have to these files.
187 SELinux zabbix_agent policy is very flexible allowing users to setup
188 their zabbix_agent processes in as secure a method as possible.
189
190 The following file types are defined for zabbix_agent:
191
192
193
194 zabbix_agent_exec_t
195
196 - Set files with the zabbix_agent_exec_t type, if you want to transi‐
197 tion an executable to the zabbix_agent_t domain.
198
199
200 Paths:
201 /usr/bin/zabbix_agentd, /usr/sbin/zabbix_agentd
202
203
204 zabbix_agent_initrc_exec_t
205
206 - Set files with the zabbix_agent_initrc_exec_t type, if you want to
207 transition an executable to the zabbix_agent_initrc_t domain.
208
209
210
211 Note: File context can be temporarily modified with the chcon command.
212 If you want to permanently change the file context you need to use the
213 semanage fcontext command. This will modify the SELinux labeling data‐
214 base. You will need to use restorecon to apply the labels.
215
216
218 semanage fcontext can also be used to manipulate default file context
219 mappings.
220
221 semanage permissive can also be used to manipulate whether or not a
222 process type is permissive.
223
224 semanage module can also be used to enable/disable/install/remove pol‐
225 icy modules.
226
227 semanage port can also be used to manipulate the port definitions
228
229 semanage boolean can also be used to manipulate the booleans
230
231
232 system-config-selinux is a GUI tool available to customize SELinux pol‐
233 icy settings.
234
235
237 This manual page was auto-generated using sepolicy manpage .
238
239
241 selinux(8), zabbix_agent(8), semanage(8), restorecon(8), chcon(1), se‐
242 policy(8), setsebool(8)
243
244
245
246zabbix_agent 21-11-19 zabbix_agent_selinux(8)