Sponsored Content
Special Forums UNIX and Linux Applications High Performance Computing Building a Linux Virtual Server cluster Post 302322537 by formyz on Thursday 4th of June 2009 03:58:50 AM
Old 06-04-2009
please down ipvsadm-1.25.tar.gz,install it.
 

8 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

Building a cluster

I am working on putting togethor information on building a cluster. There are so many different types of software and hardware needed to havea fully optimized Cluster system. An important aspect of it is the file system that is chosen. I am researching all the fielsystems that are out there... (1 Reply)
Discussion started by: linuxhpc
1 Replies

2. Linux

how to setup a virtual IP to control 2 server load for linux

Hi anyone know how to setup a setup a virtual IP to control 2 server load for linux? i only have 2 server, i don want to buy another just for the load balance... is there a way to do it? Sumemr (0 Replies)
Discussion started by: summerpeh
0 Replies

3. High Performance Computing

Bonding, IP alias, Virtual IP, 2 nodes cluster

Hi ! I have a simple setup of 2 PC (with linux Red-Hat) where the first PC is the primary machine and the second the backup. I use DRBD for data replication and Red-Hat cluster suite for HA (High Availability). I have tested both. Now I NEED a COMMON IP ADDRESS (or Master/unique IP address) for... (0 Replies)
Discussion started by: Danny Gilbert
0 Replies

4. UNIX for Dummies Questions & Answers

IP Alias, Bonding or Virtual IP, 2 nodes Cluster, which one to use ?

Hi ! I have a simple setup of 2 PC (with linux Red-Hat) where the first PC is the primary machine and the second the backup. I use DRBD for data replication and Red-Hat cluster suite for HA (High Availability). I have tested both. Now I NEED a COMMON IP ADDRESS (or Master/unique IP address) for... (3 Replies)
Discussion started by: Danny Gilbert
3 Replies

5. High Performance Computing

Building a Solaris Cluster Express cluster in a VirtualBox on OpenSolaris

Provides a description of how to set up a Solaris Cluster Express cluster in a VirtualBox on OpenSolaris. More... (0 Replies)
Discussion started by: Linux Bot
0 Replies

6. UNIX for Dummies Questions & Answers

Samba setup in virtual server environment Windows/ Linux

I have a home network set up that consists of a few windows clients and 3 centos, and 1 suse client. These are all virtual machines, VMware Workstation. One centos vm is set to be the Samba server. Do I need Samba set up on the other Linux clients?I have no problem seeing the windows clients... (0 Replies)
Discussion started by: ktb231
0 Replies

7. UNIX and Linux Applications

Configuration of Linux cluster managment on Red Hat 5.x server

Hi Experts, I have question regarding linux cluster managment on Red Hat 5.x server. When I try to install 'luci' or 'ricci' in one of our linux servers it is giving me below error:- yum install luci Loaded plugins: katello, product-id, rhnplugin, security, subscription-manager Updating... (0 Replies)
Discussion started by: Amey Joshi
0 Replies

8. High Performance Computing

Building Linux cluster for mechanical engineering software

Hello everybody, I'm new here in the forum and first i will greet everybody. Also I'm new with the issue of HPC, but I have to inform my urgently. My issue: I'm a mechanical engineer, specialised on simulation like fluid dynamics (CFD) and FEM. Especially I'm programming software for... (6 Replies)
Discussion started by: biro
6 Replies
iptables_selinux(8)					      SELinux Policy iptables					       iptables_selinux(8)

NAME
iptables_selinux - Security Enhanced Linux Policy for the iptables processes DESCRIPTION
Security-Enhanced Linux secures the iptables processes via flexible mandatory access control. The iptables processes execute with the iptables_t SELinux type. You can check if you have these processes running by executing the ps com- mand with the -Z qualifier. For example: ps -eZ | grep iptables_t ENTRYPOINTS
The iptables_t SELinux type can be entered via the iptables_exec_t file type. The default entrypoint paths for the iptables_t domain are the following: /sbin/ip6?tables.*, /sbin/ip6?tables-multi.*, /sbin/ip6?tables-restore.*, /usr/sbin/ip6?tables.*, /usr/sbin/ip6?tables-multi.*, /usr/sbin/ip6?tables-restore.*, /sbin/ipchains.*, /usr/sbin/ipchains.*, /sbin/ipset, /sbin/ipvsadm, /sbin/ebtables, /usr/sbin/ipset, /usr/sbin/ipvsadm, /usr/libexec/ipset, /sbin/ipvsadm-save, /usr/sbin/ebtables, /sbin/xtables-multi, /sbin/ipvsadm-restore, /sbin/ebtables- restore, /usr/sbin/ipvsadm-save, /usr/sbin/xtables-multi, /usr/sbin/ipvsadm-restore, /usr/sbin/ebtables-restore PROCESS TYPES
SELinux defines process types (domains) for each process running on the system You can see the context of a process using the -Z option to ps Policy governs the access confined processes have to files. SELinux iptables policy is very flexible allowing users to setup their ipta- bles processes in as secure a method as possible. The following process types are defined for iptables: iptables_t Note: semanage permissive -a iptables_t can be used to make the process type iptables_t permissive. SELinux does not deny access to permis- sive process types, but the AVC (SELinux denials) messages are still generated. BOOLEANS
SELinux policy is customizable based on least access required. iptables policy is extremely flexible and has several booleans that allow you to manipulate the policy and run iptables with the tightest access possible. If you want to allow users to resolve user passwd entries directly from ldap rather then using a sssd server, you must turn on the authlo- gin_nsswitch_use_ldap boolean. Disabled by default. setsebool -P authlogin_nsswitch_use_ldap 1 If you want to allow all daemons the ability to read/write terminals, you must turn on the daemons_use_tty boolean. Disabled by default. setsebool -P daemons_use_tty 1 If you want to deny any process from ptracing or debugging any other processes, you must turn on the deny_ptrace boolean. Enabled by default. setsebool -P deny_ptrace 1 If you want to allow dhcpc client applications to execute iptables commands, you must turn on the dhcpc_exec_iptables boolean. Disabled by default. setsebool -P dhcpc_exec_iptables 1 If you want to allow all domains to use other domains file descriptors, you must turn on the domain_fd_use boolean. Enabled by default. setsebool -P domain_fd_use 1 If you want to allow all domains to have the kernel load modules, you must turn on the domain_kernel_load_modules boolean. Disabled by default. setsebool -P domain_kernel_load_modules 1 If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default. setsebool -P fips_mode 1 If you want to enable reading of urandom for all domains, you must turn on the global_ssp boolean. Disabled by default. setsebool -P global_ssp 1 If you want to allow confined applications to run with kerberos, you must turn on the kerberos_enabled boolean. Enabled by default. setsebool -P kerberos_enabled 1 If you want to allow system to run with NIS, you must turn on the nis_enabled boolean. Disabled by default. setsebool -P nis_enabled 1 If you want to allow confined applications to use nscd shared memory, you must turn on the nscd_use_shm boolean. Disabled by default. setsebool -P nscd_use_shm 1 NSSWITCH DOMAIN
If you want to allow users to resolve user passwd entries directly from ldap rather then using a sssd server for the iptables_t, you must turn on the authlogin_nsswitch_use_ldap boolean. setsebool -P authlogin_nsswitch_use_ldap 1 If you want to allow confined applications to run with kerberos for the iptables_t, you must turn on the kerberos_enabled boolean. setsebool -P kerberos_enabled 1 MANAGED FILES
The SELinux process type iptables_t can manage files labeled with the following file types. The paths listed are the default paths for these file types. Note the processes UID still need to have DAC permissions. etc_runtime_t /[^/]+ /etc/mtab.* /etc/blkid(/.*)? /etc/nologin.* /etc/.fstab.hal..+ /halt /poweroff /fastboot /etc/cmtab /forcefsck /.autofsck /.suspended /fsckoptions /.autorelabel /etc/killpower /etc/securetty /etc/nohotplug /etc/ioctl.save /etc/fstab.REVOKE /etc/network/ifstate /etc/sysconfig/hwconf /etc/ptal/ptal-printd-like /etc/sysconfig/iptables.save /etc/xorg.conf.d/00-system-setup-keyboard.conf /etc/X11/xorg.conf.d/00-system-setup-keyboard.conf initrc_tmp_t iptables_tmp_t iptables_var_run_t psad_tmp_t psad_var_log_t /var/log/psad(/.*)? shorewall_var_lib_t /var/lib/shorewall(/.*)? /var/lib/shorewall6(/.*)? /var/lib/shorewall-lite(/.*)? system_conf_t /etc/yum.repos.d(/.*)? /etc/sysctl.conf(.old)? /etc/sysconfig/ip6?tables.* /etc/sysconfig/ipvsadm.* /etc/sysconfig/ebtables.* /etc/sysconfig/system-config-firewall.* FILE CONTEXTS
SELinux requires files to have an extended attribute to define the file type. You can see the context of a file using the -Z option to ls Policy governs the access confined processes have to these files. SELinux iptables policy is very flexible allowing users to setup their iptables processes in as secure a method as possible. STANDARD FILE CONTEXT SELinux defines the file context types for the iptables, if you wanted to store files with these types in a diffent paths, you need to exe- cute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. semanage fcontext -a -t iptables_exec_t '/srv/iptables/content(/.*)?' restorecon -R -v /srv/myiptables_content Note: SELinux often uses regular expressions to specify labels that match multiple files. The following file types are defined for iptables: iptables_exec_t - Set files with the iptables_exec_t type, if you want to transition an executable to the iptables_t domain. Paths: /sbin/ip6?tables.*, /sbin/ip6?tables-multi.*, /sbin/ip6?tables-restore.*, /usr/sbin/ip6?tables.*, /usr/sbin/ip6?tables-multi.*, /usr/sbin/ip6?tables-restore.*, /sbin/ipchains.*, /usr/sbin/ipchains.*, /sbin/ipset, /sbin/ipvsadm, /sbin/ebtables, /usr/sbin/ipset, /usr/sbin/ipvsadm, /usr/libexec/ipset, /sbin/ipvsadm-save, /usr/sbin/ebtables, /sbin/xtables-multi, /sbin/ipvsadm-restore, /sbin/ebta- bles-restore, /usr/sbin/ipvsadm-save, /usr/sbin/xtables-multi, /usr/sbin/ipvsadm-restore, /usr/sbin/ebtables-restore iptables_initrc_exec_t - Set files with the iptables_initrc_exec_t type, if you want to transition an executable to the iptables_initrc_t domain. Paths: /etc/rc.d/init.d/ip6?tables, /etc/rc.d/init.d/ebtables iptables_tmp_t - Set files with the iptables_tmp_t type, if you want to store iptables temporary files in the /tmp directories. iptables_unit_file_t - Set files with the iptables_unit_file_t type, if you want to treat the files as iptables unit content. Paths: /usr/lib/systemd/system/ppp.*, /usr/lib/systemd/system/ipset.*, /usr/lib/systemd/system/vsftpd.*, /usr/lib/systemd/system/proftpd.*, /usr/lib/systemd/system/iptables.*, /usr/lib/systemd/system/ip6tables.* iptables_var_run_t - Set files with the iptables_var_run_t type, if you want to store the iptables files under the /run or /var/run directory. Note: File context can be temporarily modified with the chcon command. If you want to permanently change the file context you need to use the semanage fcontext command. This will modify the SELinux labeling database. You will need to use restorecon to apply the labels. COMMANDS
semanage fcontext can also be used to manipulate default file context mappings. semanage permissive can also be used to manipulate whether or not a process type is permissive. semanage module can also be used to enable/disable/install/remove policy modules. semanage boolean can also be used to manipulate the booleans system-config-selinux is a GUI tool available to customize SELinux policy settings. AUTHOR
This manual page was auto-generated using sepolicy manpage . SEE ALSO
selinux(8), iptables(8), semanage(8), restorecon(8), chcon(1), sepolicy(8) , setsebool(8) iptables 14-06-10 iptables_selinux(8)
All times are GMT -4. The time now is 03:31 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy