Hello,

Am Sat, 16 Feb 2019 16:33:53 +0100
schrieb Marc Donges <marc.don...@gmail.com>:

> I think to make this less awkward two things would be nice:
> 
> - a option to allow monitoring of /home without editing a non-conffile in
> /lib (How is this even done properly? I just edited the service file to
> find the cause of my problem, but I suppose it will be overwritten on every
> update. Is there a nice way to do this?)

By accident I stumbled upon "systemctl edit munin-node".
This will open up an empty editor. Here you can add the following:

 [Service]
 ProtectHome = read-only

This will create a file /etc/systemd/system/munin-node.service.d/override.conf
with the above content and in turn override the settings of the system-wide
service file.


> - a way to alert the admin of the possibly unintended configuration:
> df-plugin activated + ProtectHome + Separate /home
> Can the df* plugin itself detect the situation and then make a log entry?
> That would have severely cut down the time it took me to find this.

I took a quick look at it.
Here the plugin within the environment simply does not notice that /home is
not accessible: it will simply be missing in the output by "df -h". Thus we
cannot emit a warning in this case.
Or does someone have an idea how to identify such an issue?
(and how we should report it)


Given that the "ProtectHome" setting allows the "read-only" value, I propose
that we should pick this one instead of "yes".

I think, we are mainly trying to protect the user from badly written plugins
that mess up something with their cleanup procedure and accidentally erase
relevant files. "read-only" would prevent this problem.
The different problem of munin plugins spying on users on purpose would indeed
justify "yes". But I tend to think, that everything is lost anyway, if a user
runs random malicious code on his host.

What do you think?

Cheers,
Lars

Reply via email to