That's what lies in those "SELinux policies."

I think it's simple: Use SELinux to lock the filesystem (and other stuff) up so no one can get in or go around. Then create specific policies that allow, in this case, NiFi, access to its filesystem (like //opt/nifi/current-nifi//) so that it can do work. Obviously, when you install NiFi, things can get complicated like where do you want each repository to live--you'll have to provide NiFi access to each place, no longer a single filesystem.

This is handled by DevOps guys and not me (I just write custom processors), but if you get real pointed, I can ask them better questions they can answer.

Russ


On 3/8/24 15:04, Mike Thomsen wrote:
I think the admin told me that even a simple nifi.sh start won’t work. Just won’t even start the script and it is marked executable. I was wondering if there were any gotchas to getting a basic setup running.


Sent from my iPhone

On Mar 8, 2024, at 4:29 PM, Russell Bateman <r...@windofkeltia.com> wrote:

 We have run on CentOS with SELinux set to enforcing and have run NiFi in that environment for probably 8 or 9 years now. We do install some SELinux policies that allow NiFi to access the filesystem underneath itself and not outside that filesystem.

What specifically are you asking?

On 3/8/24 14:04, Mike Thomsen wrote:
Does anyone have experience setting up NiFi w/ SELinux set to "enforcing?"

Reply via email to