Difference between revisions of "AppArmor"

From wikieduonline
Jump to navigation Jump to search
 
(8 intermediate revisions by the same user not shown)
Line 3: Line 3:
 
  apparmor_status
 
  apparmor_status
  
  /etc/apparmor.d/[[libvirt]]
+
  [[/etc/apparmor.d/]][[libvirt]]/
  
 
  May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.[[rocketchat-server]].rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
 
  May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.[[rocketchat-server]].rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
Line 9: Line 9:
  
 
To disable [[AppArmor]]:
 
To disable [[AppArmor]]:
   GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT apparmor=0"
+
   [[GRUB_CMDLINE_LINUX_DEFAULT]]="$GRUB_CMDLINE_LINUX_DEFAULT apparmor=0"
 
   [[update-grub]]
 
   [[update-grub]]
  
 +
 +
  cat /proc/[[cmdline]]
  
 
   sudo [[systemctl disable]] apparmor
 
   sudo [[systemctl disable]] apparmor
 
   [[reboot]]
 
   [[reboot]]
  
 +
== News ==
 +
* AppArmor support is stable in [[K8s v1.31]] (Aug 2024)
  
 
== Related terms ==
 
== Related terms ==
 
* [[Canonical]]
 
* [[Canonical]]
 
+
* [[kubelet is posting ready status. AppArmor enabled]]
 +
* Kubernetes changelog: AppArmor profiles can now be configured through fields on the [[PodSecurityContext]] and container [[SecurityContext]]
  
 
== See also ==  
 
== See also ==  

Latest revision as of 18:41, 27 October 2024

wikipedia:AppArmor ("Application Armor") is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per-program profiles.

apparmor_status
/etc/apparmor.d/libvirt/
May 01 17:34:39 g-cc audit[188993]: AVC apparmor="DENIED" operation="open" profile="snap.rocketchat-server.rocketchat-mongo" name="/proc/188993/net/netstat" pid=188993 comm="ftdc" requested_mask="r" denied_mask="r" fsuid=0 ouid=0


To disable AppArmor:

 GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT apparmor=0"
 update-grub


 cat /proc/cmdline
 sudo systemctl disable apparmor
 reboot

News[edit]

  • AppArmor support is stable in K8s v1.31 (Aug 2024)

Related terms[edit]

See also[edit]

Advertising: