On Tuesday, December 3, 2019, Ivan Apolonio
<ivan(a)apolonio.com.br> wrote:
This line shuts logging, worth to comment it out during check. Plus, do you
have an #includedir setting in your /etc/sudoers file?
The vdsm.log snippet seems later than the error in the engine.log, could
you provide one covering the failing attempt?
Hello, Amit.
It looks that commenting out that last line (Defaults:vdsm !syslog) did the trick to help
identify the problem. According to /var/log/secure log file, vdsm uid is being blocked to
sudo due to pam requirements:
Dec 4 10:53:36 Rosinha sudo: pam_unix(sudo:auth): authentication failure; logname=root
uid=36 euid=0 tty=/dev/pts/0 ruser=vdsm rhost= user=vdsm
Dec 4 10:53:36 Rosinha sudo: pam_succeed_if(sudo:auth): requirement "uid >=
1000" not met by user "vdsm"
Dec 4 10:58:38 Rosinha sudo: pam_unix(sudo:auth): conversation failed
Dec 4 10:58:38 Rosinha sudo: pam_unix(sudo:auth): auth could not identify password for
[vdsm]
Dec 4 10:58:38 Rosinha sudo: pam_succeed_if(sudo:auth): requirement "uid >=
1000" not met by user "vdsm"
This "uid >= 1000" requirement is the CentOS 7 default. What is the best way
to work around it? I'm asking that because if I just comment this rule on pam
configuration files, it is going to allow other system users to sudo, which would lead to
security issues.
Thanks,
Ivan