1zabbix_agent_selinux(8)   SELinux Policy zabbix_agent  zabbix_agent_selinux(8)
2
3
4

NAME

6       zabbix_agent_selinux  -  Security  Enhanced  Linux  Policy for the zab‐
7       bix_agent processes
8

DESCRIPTION

10       Security-Enhanced Linux secures the zabbix_agent processes via flexible
11       mandatory access control.
12
13       The  zabbix_agent  processes  execute  with  the zabbix_agent_t SELinux
14       type. You can check if you have these processes  running  by  executing
15       the ps command with the -Z qualifier.
16
17       For example:
18
19       ps -eZ | grep zabbix_agent_t
20
21
22

ENTRYPOINTS

24       The   zabbix_agent_t   SELinux   type  can  be  entered  via  the  zab‐
25       bix_agent_exec_t file type.
26
27       The default entrypoint paths for the zabbix_agent_t domain are the fol‐
28       lowing:
29
30       /usr/bin/zabbix_agentd, /usr/sbin/zabbix_agentd
31

PROCESS TYPES

33       SELinux defines process types (domains) for each process running on the
34       system
35
36       You can see the context of a process using the -Z option to ps
37
38       Policy governs the access confined processes have  to  files.   SELinux
39       zabbix_agent policy is very flexible allowing users to setup their zab‐
40       bix_agent processes in as secure a method as possible.
41
42       The following process types are defined for zabbix_agent:
43
44       zabbix_agent_t
45
46       Note: semanage permissive -a zabbix_agent_t can be  used  to  make  the
47       process type zabbix_agent_t permissive. SELinux does not deny access to
48       permissive process types, but the AVC (SELinux  denials)  messages  are
49       still generated.
50
51

BOOLEANS

53       SELinux  policy  is  customizable based on least access required.  zab‐
54       bix_agent policy is extremely flexible and has  several  booleans  that
55       allow you to manipulate the policy and run zabbix_agent with the tight‐
56       est access possible.
57
58
59
60       If you want to allow all domains to execute in fips_mode, you must turn
61       on the fips_mode boolean. Enabled by default.
62
63       setsebool -P fips_mode 1
64
65
66
67       If  you  want to allow Zabbix to run su/sudo, you must turn on the zab‐
68       bix_run_sudo boolean. Disabled by default.
69
70       setsebool -P zabbix_run_sudo 1
71
72
73

PORT TYPES

75       SELinux defines port types to represent TCP and UDP ports.
76
77       You can see the types associated with a port  by  using  the  following
78       command:
79
80       semanage port -l
81
82
83       Policy  governs  the  access  confined  processes  have to these ports.
84       SELinux zabbix_agent policy is very flexible allowing  users  to  setup
85       their zabbix_agent processes in as secure a method as possible.
86
87       The following port types are defined for zabbix_agent:
88
89
90       zabbix_agent_port_t
91
92
93
94       Default Defined Ports:
95                 tcp 10050
96

MANAGED FILES

98       The  SELinux  process type zabbix_agent_t can manage files labeled with
99       the following file types.  The paths listed are the default  paths  for
100       these  file  types.  Note the processes UID still need to have DAC per‐
101       missions.
102
103       cluster_conf_t
104
105            /etc/cluster(/.*)?
106
107       cluster_var_lib_t
108
109            /var/lib/pcsd(/.*)?
110            /var/lib/cluster(/.*)?
111            /var/lib/openais(/.*)?
112            /var/lib/pengine(/.*)?
113            /var/lib/corosync(/.*)?
114            /usr/lib/heartbeat(/.*)?
115            /var/lib/heartbeat(/.*)?
116            /var/lib/pacemaker(/.*)?
117
118       cluster_var_run_t
119
120            /var/run/crm(/.*)?
121            /var/run/cman_.*
122            /var/run/rsctmp(/.*)?
123            /var/run/aisexec.*
124            /var/run/heartbeat(/.*)?
125            /var/run/pcsd-ruby.socket
126            /var/run/corosync-qnetd(/.*)?
127            /var/run/corosync-qdevice(/.*)?
128            /var/run/corosync.pid
129            /var/run/cpglockd.pid
130            /var/run/rgmanager.pid
131            /var/run/cluster/rgmanager.sk
132
133       faillog_t
134
135            /var/log/btmp.*
136            /var/log/faillog.*
137            /var/log/tallylog.*
138            /var/run/faillock(/.*)?
139
140       krb5_host_rcache_t
141
142            /var/tmp/krb5_0.rcache2
143            /var/cache/krb5rcache(/.*)?
144            /var/tmp/nfs_0
145            /var/tmp/DNS_25
146            /var/tmp/host_0
147            /var/tmp/imap_0
148            /var/tmp/HTTP_23
149            /var/tmp/HTTP_48
150            /var/tmp/ldap_55
151            /var/tmp/ldap_487
152            /var/tmp/ldapmap1_0
153
154       lastlog_t
155
156            /var/log/lastlog.*
157
158       root_t
159
160            /sysroot/ostree/deploy/.*-atomic/deploy(/.*)?
161            /
162            /initrd
163
164       security_t
165
166            /selinux
167
168       zabbix_log_t
169
170            /var/log/zabbix.*
171
172       zabbix_tmpfs_t
173
174
175       zabbix_var_run_t
176
177            /var/run/zabbix(/.*)?
178
179

FILE CONTEXTS

181       SELinux requires files to have an extended attribute to define the file
182       type.
183
184       You can see the context of a file using the -Z option to ls
185
186       Policy  governs  the  access  confined  processes  have to these files.
187       SELinux zabbix_agent policy is very flexible allowing  users  to  setup
188       their zabbix_agent processes in as secure a method as possible.
189
190       The following file types are defined for zabbix_agent:
191
192
193
194       zabbix_agent_exec_t
195
196       -  Set  files with the zabbix_agent_exec_t type, if you want to transi‐
197       tion an executable to the zabbix_agent_t domain.
198
199
200       Paths:
201            /usr/bin/zabbix_agentd, /usr/sbin/zabbix_agentd
202
203
204       zabbix_agent_initrc_exec_t
205
206       - Set files with the zabbix_agent_initrc_exec_t type, if  you  want  to
207       transition an executable to the zabbix_agent_initrc_t domain.
208
209
210
211       Note:  File context can be temporarily modified with the chcon command.
212       If you want to permanently change the file context you need to use  the
213       semanage fcontext command.  This will modify the SELinux labeling data‐
214       base.  You will need to use restorecon to apply the labels.
215
216

COMMANDS

218       semanage fcontext can also be used to manipulate default  file  context
219       mappings.
220
221       semanage  permissive  can  also  be used to manipulate whether or not a
222       process type is permissive.
223
224       semanage module can also be used to enable/disable/install/remove  pol‐
225       icy modules.
226
227       semanage port can also be used to manipulate the port definitions
228
229       semanage boolean can also be used to manipulate the booleans
230
231
232       system-config-selinux is a GUI tool available to customize SELinux pol‐
233       icy settings.
234
235

AUTHOR

237       This manual page was auto-generated using sepolicy manpage .
238
239

SEE ALSO

241       selinux(8), zabbix_agent(8), semanage(8), restorecon(8), chcon(1),  se‐
242       policy(8), setsebool(8)
243
244
245
246zabbix_agent                       22-05-27            zabbix_agent_selinux(8)
Impressum