Linux ip-172-26-5-244 6.1.0-28-cloud-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.119-1 (2024-11-22) x86_64
Apache
: 172.26.5.244 | : 216.73.216.21
Cant Read [ /etc/named.conf ]
8.3.14
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
opt /
bitnami /
mariadb /
share /
policy /
selinux /
[ HOME SHELL ]
Name
Size
Permission
Action
README
850
B
-rw-r--r--
mariadb-server.fc
640
B
-rw-r--r--
mariadb-server.te
3.95
KB
-rw-r--r--
mariadb.te
205
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README
Note: The included SELinux policy files can be used for MariaDB Galera cluster. However, since these policies had been tested for a limited set of scenarios, it is highly recommended that you run mysqld in "permissive" mode even with these policies installed and report any denials on mariadb.org/jira. How to generate and load the policy module of MariaDB Galera cluster ? * Generate the SELinux policy module. # cd <source>/policy/selinux/ # make -f /usr/share/selinux/devel/Makefile mariadb-server.pp * Load the generated policy module. # semodule -i /path/to/mariadb-server.pp * Lastly, run the following command to allow tcp/4568 and udp/4567. # semanage port -a -t mysqld_port_t -p tcp 4568 # semanage port -a -t mysqld_port_t -p udp 4567 How to run mysqld in permissve mode ? # semanage permissive -a mysqld_t
Close