=====Investigate and Resolve SELinux Issues===== * Most access denials indicate that SELinux is working correctly by blocking improper actions. * Evaluating denied actions requires some familiarity with normal, expected service actions. * The most common SELinux issue is an incorrect context on new, copied, or moved files. * File contexts can be fixed when an existing policy references their location. * Optional Boolean policy features are documented in the _selinux man pages. * Implementing Boolean features generally requires setting additional non-SELinux configuration. * SELinux policies do not replace or circumvent file permissions or access control list restrictions. Use tool from **setroubleshoot-server package** When Selinux denies an action an **Access Vector Cache (AVC)** is logged in **/var/log/audit/audit.log** The SELinux troubleshooting service monitors for AVC events and sends an event summary to the /var/log/messages file. The AVC summary includes an event unique identifier (UUID). Use the **sealert -l UUID command** to view comprehensive report details for the specific event. Use the **sealert -a /var/log/audit/audit.log** command to view all existing events. Use the **ausearch** command to search for AVC events in the **/var/log/audit/audit.log log** file. Use the -m option to specify the AVC message type and the -ts option to provide a time hint, such as recent. example [root@host ~]# ausearch -m AVC -ts recent You can also use the Selinux sectionb of the webconsole to diagnose and troubleshoot issues