"audit2allow < /var/log/audit/audit.log" returns "-bash: /var/log/audit/audit.log: Permission denied" despite using sudo or "-bash: audit2allow: command not found" when using "su -."
Following are part of the log. Does it tell anything? As to what I need to do?
type=AVC msg=audit(1430426830.107:370): avc: denied { setattr } for pid=26299 comm="ruby" name="puppetmaster.oracle.pem" dev="dm-0" ino=131152 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=unconfined_u
bject_r
uppet_var_lib_t:s0 tclass=file
type=SYSCALL msg=audit(1430426830.107:370): arch=c000003e syscall=90 success=yes exit=0 a0=2cb75a0 a1=1a0 a2=8 a3=8 items=0 ppid=26263 pid=26299 auid=500 uid=52 gid=52 euid=52 suid=52 fsuid=52 egid=52 sgid=52 fsgid=52 ses=1 tty=(none) comm="ruby" exe="/usr/bin/ruby" subj=unconfined_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(1430426830.107:371): avc: denied { relabelfrom } for pid=26299 comm="ruby" name="puppetmaster.oracle.pem" dev="dm-0" ino=131152 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=unconfined_u
bject_r
uppet_var_lib_t:s0 tclass=file
type=AVC msg=audit(1430426830.107:371): avc: denied { relabelto } for pid=26299 comm="ruby" name="puppetmaster.oracle.pem" dev="dm-0" ino=131152 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u
bject_r
uppet_var_lib_t:s0 tclass=file
type=SYSCALL msg=audit(1430426830.107:371): arch=c000003e syscall=189 success=yes exit=0 a0=2cb75a0 a1=39e36162fd a2=233eaa0 a3=26 items=0 ppid=26263 pid=26299 auid=500 uid=52 gid=52 euid=52 suid=52 fsuid=52 egid=52 sgid=52 fsgid=52 ses=1 tty=(none) comm="ruby" exe="/usr/bin/ruby" subj=unconfined_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(1430426830.522:372): avc: denied { fowner } for pid=26348 comm="chmod" capability=3 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=unconfined_u:system_r:httpd_t:s0 tclass=capability
type=AVC msg=audit(1430426830.522:372): avc: denied { fsetid } for pid=26348 comm="chmod" capability=4 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=unconfined_u:system_r:httpd_t:s0 tclass=capability
type=SYSCALL msg=audit(1430426830.522:372): arch=c000003e syscall=268 success=yes exit=0 a0=ffffffffffffff9c a1=2436120 a2=1c0 a3=0 items=0 ppid=26263 pid=26348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="chmod" exe="/bin/chmod" subj=unconfined_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(1430426833.010:379): avc: denied { search } for pid=26356 comm="ps" name="354" dev="proc" ino=7879 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir
type=AVC msg=audit(1430426833.010:379): avc: denied { read } for pid=26356 comm="ps" name="stat" dev="proc" ino=10952 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file
type=AVC msg=audit(1430426833.010:379): avc: denied { open } for pid=26356 comm="ps" path="/proc/354/stat" dev="proc" ino=10952 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file
type=SYSCALL msg=audit(1430426833.010:379): arch=c000003e syscall=2 success=yes exit=5 a0=39e2411860 a1=0 a2=0 a3=0 items=0 ppid=26263 pid=26356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="ps" exe="/bin/ps" subj=unconfined_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(1430426833.010:380): avc: denied { getattr } for pid=26356 comm="ps" path="/proc/2027" dev="proc" ino=10772 scontext=unconfined_u:system_r:httpd_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir
type=SYSCALL msg=audit(1430426833.010:380): arch=c000003e syscall=4 success=yes exit=0 a0=9da4e0 a1=39e2411cc0 a2=39e2411cc0 a3=9da4e6 items=0 ppid=26263 pid=26356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="ps" exe="/bin/ps" subj=unconfined_u:system_r:httpd_t:s0 key=(null)