-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permission search takes too long #53
Comments
If it possible to get a bit more information here? My assumption is that this find goes through a filesystem with a huge amount of files (some filesystem with tons of data) I faced once a similar problem with my first implementations of puppet-os-hardening at P&I years ago and we resolved it this way: exclude filesystems with |
For the search in os-01 and os-09 I would recommend to limit the the search depth with the option BTW: Why do you search for |
@mcgege thanks for your feedback. i agree with you. it should be something like this:
and to limit the max depth to 3 should be sufficient. Can you create a PR for this? |
@atomic111 Of course! See #77 |
I'm getting this error when running
|
@mike-stewart i tested it and it is working. i used the inspec version 1.31.1 and the compliance server 1.10.2 i included you my commands, which i used to upload the linux-baseline.
|
@atomic111 Still doesn't seem to be working for me. Is it possible that it's running the |
@mike-stewart it looks like your upload should take some time, can you check in another console with |
How about this: use |
My solution here was to create a wrapper profile with a find that looks for network fs types and excludes those paths from the find. My hosts from 10 minutes to execute the stock profile down to 30 seconds to execute the wrapper profile. https://gist.github.com/mattlqx/24c6730d7586e78a23a31353066cb31c This is the best/simplest way I found to override a part of a resource from another profile, feedback welcome if there are better ways. The dynamic classes that InSpec resources are made trying this... interesting. |
I riffed a bit on my gist from the prior comment and submitted a pull to just get into here. With it, by default, network filesystems (arbitrarily defined) are now ignored in the find of suid_check. Attributes are provided to override the exclude behavior. |
Any progress on this? Or anyway to increase the 600s timeout? |
Any PR is welcome to improve the situation. |
I've had a pull open for over a year. 🤷🏻♂️ I can rebase it. I'm not entirely sure what comments were meant to be actioned on though. |
Customers reported that the find permission command takes too long. We should find a solution to do this faster.
The text was updated successfully, but these errors were encountered: