Lnav had been my quick fix for browsing system logs, until the day I hit the silent wall: Restricted Access. It’s not a bug, and it’s not random. Lnav Restricted Access mode is a safeguard. It happens when Lnav can’t run with the permissions it needs to read system-level or sensitive logs. Instead of pulling from the full environment, it drops you into a safer, isolated mode with fewer data sources and fewer capabilities.
The heart of it is file permissions, environment variables, and the privilege level of the user running Lnav. If you’re not running with the right privileges, or if the OS tightens control over /var/log and other protected directories, you’ll see the “restricted access” warning at startup. It’s a deliberate design to prevent leaking sensitive data when the tool is run by scripts, public terminals, or untrusted sessions.
This mode affects more than just security—it changes the workflow. Certain features like auto-loading of system logs, log coloring based on system formats, or access to journal logs may be disabled. For teams using Lnav for quick diagnosis or parsing across environments, this can be a dealbreaker if they’re not aware of the limitation before deploying it on remote or containerized systems.