Uploaded image for project: 'ZABBIX BUGS AND ISSUES'
  1. ZABBIX BUGS AND ISSUES
  2. ZBX-27150

Cannot start zabbix-agent on fresh Redhat9

XMLWordPrintable

    • Icon: Problem report Problem report
    • Resolution: Unresolved
    • Icon: Trivial Trivial
    • None
    • None
    • None
    • None

      On fresh Redhat 9.6 installation, zabbix-agent 7.0.19 doesnt start.

      cat /etc/*release
      NAME="Red Hat Enterprise Linux"
      VERSION="9.6 (Plow)"
      ID="rhel"
      ID_LIKE="fedora"
      VERSION_ID="9.6"
      PLATFORM_ID="platform:el9"
      PRETTY_NAME="Red Hat Enterprise Linux 9.6 (Plow)"
      ANSI_COLOR="0;31"
      LOGO="fedora-logo-icon"
      CPE_NAME="cpe:/o:redhat:enterprise_linux:9::baseos"
      HOME_URL="https://www.redhat.com/"
      DOCUMENTATION_URL="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9"
      BUG_REPORT_URL="https://issues.redhat.com/"
      REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 9"
      REDHAT_BUGZILLA_PRODUCT_VERSION=9.6
      REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux"
      REDHAT_SUPPORT_PRODUCT_VERSION="9.6"
      Red Hat Enterprise Linux release 9.6 (Plow)
      Red Hat Enterprise Linux release 9.6 (Plow)
      
      rpm -qa -last | grep zabbix
      zabbix-agent-7.0.19-release1.el9.x86_64       Tue 28 Oct 2025 06:09:15 AM UTC
      zabbix-selinux-policy-7.0.19-release1.el9.x86_64 Tue 28 Oct 2025 06:08:17 AM UTC
      
       56391:20251028:060957.060 Starting Zabbix Agent [server.com]. Zabbix 7.0.19 (revision a2d0368f1b9).
       56391:20251028:060957.060 **** Enabled features ****
       56391:20251028:060957.060 IPv6 support:          YES
       56391:20251028:060957.060 TLS support:           YES
       56391:20251028:060957.060 **************************
       56391:20251028:060957.060 using configuration file: /etc/zabbix/zabbix_agentd.conf
       56391:20251028:060957.061 listener failed: bind() for [[-]:10150] failed: [13] Permission denied
       56391:20251028:060957.061 Zabbix Agent stopped. Zabbix 7.0.19 (revision a2d0368f1b9).
      
      cat /var/log/audit/audit.log | grep agent
      type=SOFTWARE_UPDATE msg=audit(1761631755.940:2392): pid=53991 uid=0 auid=873416138 ses=22 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=install sw="zabbix-agent-7.0.19-release1.el9.x86_64" sw_type=rpm key_enforce=0 gpg_res=0 root_dir="/" comm="dnf" exe="/usr/bin/python3.9" hostname=server.com addr=? terminal=pts/1 res=success'UID="root" AUID="user"
      type=AVC msg=audit(1761631797.059:2995): avc:  denied  { name_bind } for  pid=56391 comm="zabbix_agentd" src=10150 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631797.059:2995): arch=c000003e syscall=49 success=no exit=-13 a0=4 a1=55945bb44a00 a2=10 a3=7ffdbe3f34dc items=0 ppid=1 pid=56391 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=bind AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=SERVICE_START msg=audit(1761631799.067:2996): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'UID="root" AUID="unset"
      type=SERVICE_START msg=audit(1761631809.123:3036): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=SERVICE_STOP msg=audit(1761631809.123:3037): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=AVC msg=audit(1761631809.179:3038): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631809.179:3038): arch=c000003e syscall=42 success=no exit=-13 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=AVC msg=audit(1761631809.180:3039): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631809.180:3039): arch=c000003e syscall=42 success=no exit=-13 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=SERVICE_START msg=audit(1761631809.269:3040): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=AVC msg=audit(1761631814.180:3119): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631814.180:3119): arch=c000003e syscall=42 success=no exit=-13 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=AVC msg=audit(1761631819.181:3181): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631819.181:3181): arch=c000003e syscall=42 success=no exit=-13 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=AVC msg=audit(1761631824.182:3182): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631824.182:3182): arch=c000003e syscall=42 success=no exit=-13 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=AVC msg=audit(1761631829.183:3184): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=0
      type=SYSCALL msg=audit(1761631829.183:3184): arch=c000003e syscall=42 success=no exit=-13 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=AVC msg=audit(1761631834.184:3207): avc:  denied  { name_connect } for  pid=56561 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=1
      type=SYSCALL msg=audit(1761631834.184:3207): arch=c000003e syscall=42 success=no exit=-115 a0=6 a1=562f4cef5400 a2=10 a3=0 items=0 ppid=56549 pid=56561 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      type=SERVICE_STOP msg=audit(1761631835.336:3223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=SERVICE_START msg=audit(1761631835.455:3224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=SERVICE_STOP msg=audit(1761631838.688:3261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=SERVICE_START msg=audit(1761631838.813:3262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=zabbix-agent comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'UID="root" AUID="unset"
      type=AVC msg=audit(1761631843.722:3271): avc:  denied  { name_connect } for  pid=57363 comm="zabbix_agentd" dest=10050 scontext=system_u:system_r:zabbix_agent_t:s0 tcontext=system_u:object_r:zabbix_agent_port_t:s0 tclass=tcp_socket permissive=1
      type=SYSCALL msg=audit(1761631843.722:3271): arch=c000003e syscall=42 success=no exit=-115 a0=6 a1=562106f42400 a2=10 a3=0 items=0 ppid=57351 pid=57363 auid=4294967295 uid=986 gid=986 euid=986 suid=986 fsuid=986 egid=986 sgid=986 fsgid=986 tty=(none) ses=4294967295 comm="zabbix_agentd" exe="/usr/sbin/zabbix_agentd" subj=system_u:system_r:zabbix_agent_t:s0 key=(null)ARCH=x86_64 SYSCALL=connect AUID="unset" UID="zabbix" GID="zabbix" EUID="zabbix" SUID="zabbix" FSUID="zabbix" EGID="zabbix" SGID="zabbix" FSGID="zabbix"
      
      cat /var/log/messages | grep agent
      Oct 28 06:09:08 server.com python3[53860]: ansible-systemd Invoked with name=zabbix-agent state=stopped daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None
      Oct 28 06:09:10 server.com python3[53990]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -qa|grep zabbix-agent*|xargs rpm -e; dnf -y install https://repo.zabbix.com/zabbix/7.0/rhel/9/x86_64/zabbix-agent-7.0.19-release1.el9.x86_64.rpm _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None
      Oct 28 06:09:23 server.com python3[54573]: ansible-ansible.legacy.stat Invoked with path=/etc/zabbix/zabbix_agentd.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True
      Oct 28 06:09:25 server.com python3[54679]: ansible-ansible.legacy.copy Invoked with src=/home/user/.ansible/tmp/ansible-tmp-1761631761.747426-383721-211914510984126/source dest=/etc/zabbix/zabbix_agentd.conf owner=zabbix group=zabbix mode=420 follow=False _original_basename=zabbix_agentd.conf.j2 checksum=6fa2eabc507d12a09be9912e49ecb8429f056f3e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None
      Oct 28 06:09:56 server.com python3[56362]: ansible-systemd Invoked with name=zabbix-agent enabled=True state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None
      Oct 28 06:09:59 server.com systemd[1]: zabbix-agent.service: Can't open PID file /run/zabbix/zabbix_agentd.pid (yet?) after start: Operation not permitted
      Oct 28 06:09:59 server.com systemd[1]: zabbix-agent.service: Failed with result 'protocol'.
      Oct 28 06:10:01 server.com python3[56532]: ansible-ansible.legacy.command Invoked with _raw_params=cat /var/log/audit/audit.log | grep zabbix_agentd | grep denied | audit2allow -M zabbix_agent_setrlimit > zabbix_agent_setrlimit.te && semodule -i zabbix_agent_setrlimit.pp && systemctl start zabbix-agent _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None
      Oct 28 06:10:02 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_bind access on the tcp_socket port 10150. For complete SELinux messages run: sealert -l b851c8d3-367d-4c1a-98f3-54cd4f092a13
      Oct 28 06:10:02 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_bind access on the tcp_socket port 10150.#012#012*****  Plugin bind_ports (92.2 confidence) suggests   ************************#012#012If you want to allow /usr/sbin/zabbix_agentd to bind to network port 10150#012Then you need to modify the port type.#012Do#012# semanage port -a -t zabbix_agent_port_t -p tcp 10150#012#012*****  Plugin catchall_boolean (7.83 confidence) suggests   ******************#012#012If you want to allow nis to enabled#012Then you must tell SELinux about this by enabling the 'nis_enabled' boolean.#012#012Do#012setsebool -P nis_enabled 1#012#012*****  Plugin catchall (1.41 confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_bind access on the port 10150 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:09 server.com systemd[1]: zabbix-agent.service: Scheduled restart job, restart counter is at 1.
      Oct 28 06:10:09 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:09 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:09 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:09 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:11 server.com python3[56690]: ansible-systemd Invoked with name=zabbix-agent enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None
      Oct 28 06:10:13 server.com python3[56821]: ansible-ansible.legacy.stat Invoked with path=/root/zabbix_agentd_special.pp follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True
      Oct 28 06:10:14 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:14 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:16 server.com python3[56925]: ansible-ansible.legacy.copy Invoked with src=/home/user/.ansible/tmp/ansible-tmp-1761631812.2515776-383972-281136250277957/source dest=/root/ _original_basename=zabbix_agentd_special.pp follow=False checksum=823dcc464342f1fac56d536a9a892cf7a4fec790 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None
      Oct 28 06:10:18 server.com python3[57054]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/semodule -i /root/zabbix_agentd_special.pp && semanage permissive -a zabbix_agent_t _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None
      Oct 28 06:10:19 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:19 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:25 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:25 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:29 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:29 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:34 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:34 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      Oct 28 06:10:35 server.com python3[57194]: ansible-systemd Invoked with name=zabbix-agent enabled=True state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None
      Oct 28 06:10:35 server.com systemd[1]: zabbix-agent.service: Deactivated successfully.
      Oct 28 06:10:38 server.com python3[57343]: ansible-systemd Invoked with name=zabbix-agent enabled=True state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None
      Oct 28 06:10:38 server.com systemd[1]: zabbix-agent.service: Deactivated successfully.
      Oct 28 06:10:43 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050. For complete SELinux messages run: sealert -l 8b70e7ea-1005-4fca-8784-85ba59b5ff1a
      Oct 28 06:10:43 server.com setroubleshoot[56392]: SELinux is preventing /usr/sbin/zabbix_agentd from name_connect access on the tcp_socket port 10050.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that zabbix_agentd should be allowed name_connect access on the port 10050 tcp_socket by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'zabbix_agentd' --raw | audit2allow -M my-zabbixagentd#012# semodule -X 300 -i my-zabbixagentd.pp#012
      

      To fix, execute:

      cat /var/log/audit/audit.log | grep zabbix_agentd | grep denied | audit2allow -M zabbix_agent_setrlimit > zabbix_agent_setrlimit.te && semodule -i zabbix_agent_setrlimit.pp && systemctl restart zabbix-agent
      
      cat zabbix_agent_setrlimit.te
      
      module zabbix_agent_setrlimit 1.0;
      
      require {
              type zabbix_agent_port_t;
              type unreserved_port_t;
              type zabbix_agent_t;
              class tcp_socket { name_bind name_connect };
      }
      
      #============= zabbix_agent_t ==============
      
      #!!!! This avc is allowed in the current policy
      allow zabbix_agent_t unreserved_port_t:tcp_socket name_bind;
      allow zabbix_agent_t zabbix_agent_port_t:tcp_socket name_connect;
      

            yurii Jurijs Klopovskis
            spavlovs Sergejs Pavlovs
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: