- Community Home
- >
- Software
- >
- HPE Morpheus Software
- >
- HPE Morpheus Enterprise
- >
- SELINUX - Enforcing Mode
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-18-2023 08:54 PM
01-18-2023 08:54 PM
SELINUX - Enforcing Mode
Morpheus documentation states that latest versions does support SELINUX in enforcing mode if users want to use this option. 3 Node HA install documentation had commands to make necessary changes in SELINUX to allow Morpheus traffic. Same documentation appears to be removed now. Please help with required commands to make necessary changes in SELINUX if customer wants to use enforcing mode.
Any help is greatly appreciated !
- Tags:
- settings
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-19-2023 07:47 AM
01-19-2023 07:47 AM
Re: SELINUX - Enforcing Mode
Hello @suresh.thakur,
Looking at the previous documentation, the only items listed for SELinux are for the Percona XtraDB Cluster, if you are using that as an external mySQL backend. Morpheus itself will create the policies automatically on the application nodes, if SELinux is in enforcing mode. No additional policies should need to be added for Morpheus.
However, Percona’s installation documentation recommends setting SELinux to Permissive. They do have guidance on setting SELinux policies if SELinux is required.
That said, here are the commands that were previously listed in the documentation. However, I’d highly recommend following Percona’s guidance above instead, to ensure the newest policies are added.
[root]# yum install -y policycoreutils-python.x86_64
[root]# semanage port -m -t mysqld_port_t -p tcp 4444
[root]# semanage port -m -t mysqld_port_t -p tcp 4567
[root]# semanage port -a -t mysqld_port_t -p tcp 4568
[root]# vi PXC.te
module PXC 1.0;
require {
type unconfined_t;
type mysqld_t;
type unconfined_service_t;
type tmp_t;
type sysctl_net_t;
type kernel_t;
type mysqld_safe_t;
class process { getattr setpgid };
class unix_stream_socket connectto;
class system module_request;
class file { getattr open read write };
class dir search;
}
#============= mysqld_t ==============
allow mysqld_t kernel_t:system module_request;
allow mysqld_t self:process { getattr setpgid };
allow mysqld_t self:unix_stream_socket connectto;
allow mysqld_t sysctl_net_t:dir search;
allow mysqld_t sysctl_net_t:file { getattr open read };
allow mysqld_t tmp_t:file write;
[root]# checkmodule -M -m -o PXC.mod PXC.te
[root]# semodule_package -o PXC.pp -m PXC.mod
[root]# semodule -i PXC.pp
These were the troubleshooting steps:
- Verify SELinux is not rejecting any db cluster communication by running the below on all db nodes:
[root@allDbNodes]# grep -i denied /var/log/audit/audit.log | grep mysqld_t
If there are any results, address the source or update the SELinux Policy to resolve.
- Update SELinux if necessary
[root@allDbNodes]# rm -f PXC.* [root@allDbNodes]# grep -i denied /var/log/audit/audit.log | grep mysqld_t | audit2allow -M PXC [root@allDbNodes]# semodule -i PXC.pp
- To verify all nodes joined the cluster, on any db node login to mysql and run
show status like 'wsrep%';
[root@anyDbNode]# mysql -u root -p mysql> show status like 'wsrep%';
- Verify
wsrep_cluster_size
is3
andwsrep_incoming_addresses
lists all 3 node ip addresses. - From all Morpheus app nodes, verify that you can login to all 3 database nodes
[root@allAppNodes] cd /opt/morpheus/embedded/bin/ [root@appNode01]# ./mysql -h 192.168.101.01 -u morpheusDbUser -p
[root@appNode02]# ./mysql -h 192.168.101.02 -u morpheusDbUser -p [root@appNode03]# ./mysql -h 192.168.101.03 -u morpheusDbUser -p
I hope that helps!