Problem:
I'm facing an issue where SELinux is blocking certain actions of my application, which runs as a plugin for auditd
. I've been trying to generate the necessary SELinux policy using audit2allow
, but some actions still aren't resolved. Even after enabling ghost denial logs, the problem persists.
I want to run my application without setting SELinux or auditd
to permissive mode, as I need to maintain security features.
Steps taken so far:
- Generated custom SELinux policies using
audit2allow
based on the logs. - Enabled ghost denials to capture more detailed logs.
- Tried running the application while SELinux is in enforcing mode, but some actions are still blocked.
What I'm looking for:
Are there any alternative approaches or best practices to allow my application to run smoothly without disabling SELinux or switching to permissive mode?
Any insights or suggestions would be greatly appreciated!