![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||||||||||
Solution Type Problem Resolution Sure Solution 2362792.1 : File changes for sshd/pam.d/iptables etc. are lost after Exadata CELL/Database node patching/reboot
In this Document
Created from <SR 3-16896951899> Applies to:Exadata Database Machine X2-2 Full Rack - Version All Versions and laterLinux OS - Version Oracle Linux 5.0 to Oracle Linux 7.4 [Release OL5 to OL7U4] Oracle Exadata Storage Server Software - Version 11.1.3.1.0 to 12.1.2.1.2 [Release 11.1 to 12.1] Linux x86 Linux x86-64 SymptomsManual changes in DB/CELL /etc/pamd./ or /etc/ssh/sshd_config or even CELL /etc/sysconfig/iptables changes are lost after patching and as well reboot. ChangesExadata patching was done or Cell/DB node got rebooted CauseThis is normal behaviour in Engineered systems which utilize on host_access_control utility Solutionhost_access_control keeps Exadata CELL/Database Nodes to comply with security requirements. Customer can still update and change files but they will be lost after next reboot/patching - instead host_access_control tool should be used to run all changes so they won't be lost. In some cases even if host_access_control was properly used - some settings can be still reverted back to default values to actually match Exadata security policies and customer will need to get all further information from Exadata Oracle Support Team. Please contact Exadata Oracle Support team to obtain further details
In example case Cell Nodes utilize cellwall to configure firewall rules - if cellwall service will get restarted it will wipe all settings added manually to /etc/sysconfig/iptables Some changes are not even allowed on Exadata Cell/DB nodes hence even by adding some modification won't be supported and allowed - for more details please contact Exadata Oracle Support Team Usually changes in pam.d or sshd_conf on both CELL/DB nodes will require usage of host_access_control - that's count for every OS configuration file which interact with User security and OS access policy
Example document used by EEST team to configure host_access_control: host_access_control utility on Exadata database servers and storage cells (Doc ID 1600288.1) References<NOTE:1600288.1> - host_access_control utility on Exadata database servers and storage cellsAttachments This solution has no attachment |
||||||||||||||||||||
|