Siren Platform User Guide

Linux file permissions

The Siren Alert plugin requires two internal binaries (phantomjs and chrome) to be executable. If Siren Investigate is running as root, it can take care of this automatically. However, if Siren Investigate is running as an unprivileged user, for example in a hardened environment, you may see errors in the logs similar to this:

Jul 24 09:16:04 xxxxxxxx investigate[30856]: FATAL { Error: EPERM: operation not permitted, chmod '/xxxxxxx/siren-investigate-10.1.0-linux-x86_64/siren_plugins/sentinl/node_modules/phantomjs-prebuilt/bin/phantomjs'
Jul 24 09:17:42 xxxxxxxx investigate[32296]: [sentinl] fail to make report engine executable: EPERM: operation not permitted, chmod '/xxxxxxxx/siren-investigate-10.1.0-linux-x86_64/siren_plugins/sentinl/node_modules/puppeteer/.local-chromium/linux-564778/chrome-linux/chrome'!

Siren Investigate includes a post-installation utility that can be run by an administrator as root (or using sudo), that can fix these file permissions manually:

cd $INVESTIGATE_INSTALL_DIRECTORY/siren_plugins/sentinl/
../../node/bin/node ./postinst.js