Search Postgresql Archives

Re: PostgreSQL 12 error unrecognized configuration parameter zbx_tmp.wal_json_res

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/6/23 04:21, Arne Henrik Segtnan wrote:

Hi all,

We are currently running Zabbix 5.0 with PostgreSQL 12, and history and trend data partitioning.
History and trend data housekeeping has been disabled in Zabbix.

In the PostgreSQL logs, we get the following error:

2023-12-06 09:12:47 CET [3509536-5] zabbix@postgres STATEMENT: select current_setting('zbx_tmp.wal_json_res'); 2023-12-06 09:17:47 CET [3516312-1] zabbix@postgres ERROR: permission denied for function pg_ls_waldir 2023-12-06 09:17:47 CET [3516312-2] zabbix@postgres CONTEXT: SQL statement "SELECT row_to_json(T) FROM (
SELECT pg_wal_lsn_diff(pg_current_wal_lsn(),'0/00000000') AS WRITE,
count(*) FROM pg_ls_waldir() AS COUNT
) T"
PL/pgSQL function inline_code_block line 10 at SQL statement
2023-12-06 09:17:47 CET [3516312-3] zabbix@postgres STATEMENT: DO LANGUAGE plpgsql $$
DECLARE
ver integer;
res text := '{"write":0,"count":0}';
BEGIN
SELECT current_setting('server_version_num') INTO ver;

IF (SELECT NOT pg_is_in_recovery()) THEN
IF (ver >= 100000) THEN
SELECT row_to_json(T) INTO res FROM (
SELECT pg_wal_lsn_diff(pg_current_wal_lsn(),'0/00000000') AS WRITE,
count(*) FROM pg_ls_waldir() AS COUNT
) T;

ELSE
SELECT row_to_json(T) INTO res FROM (
SELECT pg_xlog_location_diff(pg_current_xlog_location(),' 0/00000000') AS WRITE,
count(*) FROM pg_ls_dir('pg_xlog') AS COUNT
) T;
END IF;
END IF;

perform set_config('zbx_tmp.wal_json_res', res, false);
END $$;
2023-12-06 09:17:47 CET [3516312-4] zabbix@postgres ERROR: unrecognized configuration parameter "zbx_tmp.wal_json_res" 2023-12-06 09:17:47 CET [3516312-5] zabbix@postgres STATEMENT: select current_setting('zbx_tmp.wal_json_res');


This seems to be related to permissions-problem and missing/unknown configuration parameter.
We found the following article describing how to set correct permission:

https://github.com/bitnami/charts/issues/20247 <https://github.com/bitnami/charts/issues/20247>

Is this a known issue? Should we just perform the step according to procedure in above link to set permission, or will security be degraded as commented in article?


Or turn the DO into a full function created by a user with the necessary privileges and use SECURITY DEFINER in the function definition to confer those privileges to unprivileged user for the duration of the function execution per:

https://www.postgresql.org/docs/12/sql-createfunction.html


Please advise.

Best regards,
Arne H.



--
Adrian Klaver
adrian.klaver@xxxxxxxxxxx






[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Postgresql Jobs]     [Postgresql Admin]     [Postgresql Performance]     [Linux Clusters]     [PHP Home]     [PHP on Windows]     [Kernel Newbies]     [PHP Classes]     [PHP Databases]     [Postgresql & PHP]     [Yosemite]

  Powered by Linux