Install Docker distribution for Red Hat.
Red Hat maintains its own package of Docker, which is the version used in OpenShift Container Platform environments, and is available in the RHEL Extras repository.
Note
If running RHEL v8 or higher, the engine installs Podman packages and configures the operating system to enable Podman in rootless mode.
For more information about the different packages available to install on Red Hat, see the Red Hat Knowledge Base Article (requires a Red Hat subscription to access).
Install Red Hat’s Docker package.
Run the following commands.
systemctl enable docker.servicesystemctl restart docker.serviceChange ownership of the Docker daemon socket so members of the
dockerrootuser group have access.Edit or create the file
/etc/docker/daemon.json.Enable OS group
dockerrootaccess to Docker by adding the following entry to the/etc/docker/daemon.json: "group": "dockerroot"file. For example:{ "group": "dockerroot" }Restart the Docker service by running the following command.
systemctl restart docker.serviceAfter the engine is installed, run the following command to add the
demistoos user to thedockerrootos group (Red Hat uses dockerroot group instead of docker).usermod -aG dockerroot demistoRestart the engine.
Set the required SELinux permissions.
The Cortex XSIAM engine uses the
/var/lib/demisto/tempdirectory (with subdirs) to copy files and receive files from running Docker containers. By default, when SELinux is in enforcing mode directories under/var/lib/it cannot be accessed by Docker containers.To allow containers access to the
/var/lib/demisto/tempdirectory, you need to set the correct SELinux policy type, by typing the following command.chcon -Rt svirt_sandbox_file_t /var/lib/demisto/temp( Optional) Verify that the directory has the
container_file_tSELinux type attached by running the following command.ls -d -Z /var/lib/demisto/tempConfigure label confinement to allow Python and PowerShell containers to access other script folders.
In the d1.conf file, set the following parameters:
Key
Value
For Python containers
python.pass.extra.keys
--security-opt=label=level:s0:c100,c200
For PowerShell containers
powershell.pass.extra.keys
--security-opt=label=level:s0:c100,c200
Open any incident and in the incident War Room CLI, run the
/reset_containerscommand.