Restricted Sudo Privileges
The term sudo stands for super user do. This technology allows one user to
execute a command as another user. If HPE Ezmeral Runtime Enterprise is installed as a non-root/superuser user, that user
must have sudo
permissions to execute some commands as the superuser. A
number of different tools are available for implementing sudo
functionality. The most common such tool on the Linux operating system is called
sudo
. The sudo
packages must be installed on each
host in the HPE Ezmeral Runtime Enterprise deployment.
Security policies at your organization may require you to control access to the
sudo
commands run by HPE Ezmeral Runtime Enterprise. You can implement this access control by
creating an allowed list of sudo
commands that HPE Ezmeral Runtime Enterprise runs.
The lists of sudo
commands provided in this topic are formatted for ease
of copying and pasting.
Set the NOPASSWD
tag to ensure all bin files execute successfully.
Installing and Upgrading HPE Ezmeral Runtime Enterprise 5.6.x
The following sudo
privileges are required for installing and
upgrading HPE Ezmeral Runtime Enterprise
5.6.x:
/bin/base64 /bin/bdconfig /bin/cat /bin/chcon /bin/chgrp /bin/chmod
/bin/chown /bin/container-storage-setup /bin/cp /bin/dd /bin/echo /bin/find
/bin/getent /bin/grep /bin/hostnamectl /bin/id /bin/killall /bin/ln /bin/ls
/bin/mkdir /bin/mount /bin/ovs-ofctl /bin/ovs-vsctl /bin/mv /bin/pkill
/bin/python3 /bin/rm /bin/rpm /bin/sed /bin/sg /bin/systemctl /bin/tar /bin/tee
/bin/test /bin/touch /bin/umount /bin/which /bin/xargs /bin/yum
/opt/bluedata/common-install/scripts/generate_django_secret.py
/opt/bluedata/common-install/scripts/monitoring/services_config/tls/generate-certs.sh
/sbin/alternatives /sbin/blkid /sbin/blockdev /sbin/chpasswd
/sbin/corosync-cmapctl /sbin/dmidecode /sbin/dmsetup /sbin/groupadd
/sbin/groupdel /sbin/ip /sbin/iptables /sbin/lvcreate /sbin/lvs /sbin/mkfs
/sbin/parted /sbin/pcs /sbin/pvcreate /sbin/pvremove /sbin/restorecon
/sbin/semodule /sbin/semanage /sbin/service /sbin/setsebool /sbin/ss
/sbin/subscription-manager /sbin/sysctl /sbin/useradd /sbin/userdel
/sbin/usermod /sbin/vgcreate /sbin/vgdisplay /sbin/vgremove
/usr/bin/firewall-cmd /usr/sbin/dmidecode /usr/sbin/pcs /usr/sbin/haproxy
/bin/ls /sbin/sysctl /sbin/vgscan
/sbin/lvscan /sbin/pvscan /bin/egrep /bin/nerdctl /usr/bin/ezconfig
/bin/ctr
Running HPE Ezmeral Runtime Enterprise 5.6.x
The following sudo
privileges are required for running HPE Ezmeral Runtime Enterprise
5.6.x:
/bin/systemctl , /bin/sed , /bin/cat , /bin/rm , /bin/mkdir , /bin/chgrp ,
/bin/chmod , /bin/chown , /bin/cp , /sbin/ip , /bin/ovs-ofctl , /bin/killall ,
/usr/sbin/dnsmasq , /usr/sbin/haproxy , /bin/echo , /sbin/ip , /bin/stat ,
/bin/umount , /bin/mount , /usr/sbin/crm_mon , /usr/sbin/pcs , /bin/ovs-vsctl ,
/usr/sbin/haproxy , /sbin/vgdisplay , /sbin/dmidecode , /bin/sed , /bin/umount ,
/bin/stat , /bin/mount , /bin/mkdir , /bin/chgrp , /bin/chmod , /usr/sbin/pcs ,
/usr/sbin/crm_mon /sbin/iptables
/bin/nerdctl /bin/find /bin/ls /bin/xargs /bin/tar /bin/test /sbin/modprobe
/bin/mv /sbin/restorecon /sbin/sysctl /bin/yum /bin/tee /bin/chcon
/sbin/semanage /bin/ezctl /usr/bin/ezctl bin/pkill /bin/timeout /bin/ctr
/usr/bin/ezconfig /bin/containerd /sbin/lvs /sbin/lvremove /sbin/vgreduce
/sbin/pvremov /sbin/parted /sbin/blockdev /sbin/vgremove /sbin/vgscan
/sbin/lvscan /sbin/pvscan
SETENV Sudo Tag
You also need to set the SETENV
sudo tag for the following
commands:
/bin/cat
/usr/sbin/haproxy