Uploaded image for project: 'Core Server'
  1. Core Server
  2. SERVER-39648

Service not starting after deploying certificate

    XMLWordPrintable

    Details

    • Type: Bug
    • Status: Closed
    • Priority: Major - P3
    • Resolution: Incomplete
    • Affects Version/s: None
    • Fix Version/s: None
    • Component/s: Admin
    • Labels:
      None
    • Operating System:
      ALL

      Description

      Mongo Db Service not get started after deploying the key file in redhat 7 , i create replica set with authentication ,i create a key file and copy to the path and try to start mongod.service but it get failed

      - Subject: Unit mongod.service has begun start-up
      -- Defined-By: systemd
      -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel
      -- 
      -- Unit mongod.service has begun starting up.
      Feb 18 09:40:08 SVP-HIS-DB1 mongod[119917]: about to fork child process, waiting until server is ready for connections.
      Feb 18 09:40:08 SVP-HIS-DB1 mongod[119917]: forked process: 119922
      Feb 18 09:40:08 SVP-HIS-DB1 mongod[119917]: ERROR: child process failed, exited with error number 1
      Feb 18 09:40:08 SVP-HIS-DB1 mongod[119917]: To see additional information in this output, start without the "--fork" option.
      Feb 18 09:40:08 SVP-HIS-DB1 systemd[1]: mongod.service: control process exited, code=exited status=1
      Feb 18 09:40:08 SVP-HIS-DB1 systemd[1]: Failed to start MongoDB Database Server.
      -- Subject: Unit mongod.service has failed
      -- Defined-By: systemd
      -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel
      -- 
      -- Unit mongod.service has failed.
      -- 
      -- The result is failed.
      Feb 18 09:40:08 SVP-HIS-DB1 systemd[1]: Unit mongod.service entered failed state.
      Feb 18 09:40:08 SVP-HIS-DB1 systemd[1]: mongod.service failed.
      Feb 18 09:40:08 SVP-HIS-DB1 polkitd[12276]: Unregistered Authentication Agent for unix-process:119892:14645443 (system bus name :1.774, object path /org/freedesk
      Feb 18 09:40:08 SVP-HIS-DB1 setroubleshoot[118075]: SELinux is preventing /usr/bin/mongod from read access on the file netstat. For complete SELinux messages run
      Feb 18 09:40:08 SVP-HIS-DB1 python[118075]: SELinux is preventing /usr/bin/mongod from read access on the file netstat.
                                                  
                                                  *****  Plugin catchall (100. confidence) suggests   **************************
                                                  
                                                  If you believe that mongod should be allowed read access on the netstat file by default.
                                                  Then you should report this as a bug.
                                                  You can generate a local policy module to allow this access.
                                                  Do
                                                  allow this access for now by executing:
                                                  # ausearch -c 'ftdc' --raw | audit2allow -M my-ftdc
                                                  # semodule -i my-ftdc.pp
                                                  
      Feb 18 09:40:08 SVP-HIS-DB1 setroubleshoot[118075]: SELinux is preventing /usr/bin/mongod from read access on the file snmp. For complete SELinux messages run: s
      Feb 18 09:40:08 SVP-HIS-DB1 python[118075]: SELinux is preventing /usr/bin/mongod from read access on the file snmp.
                                                  
                                                  *****  Plugin catchall (100. confidence) suggests   **************************
                                                  
                                                  If you believe that mongod should be allowed read access on the snmp file by default.
                                                  Then you should report this as a bug.
                                                  You can generate a local policy module to allow this access.
                                                  Do
                                                  allow this access for now by executing:
                                                  # ausearch -c 'ftdc' --raw | audit2allow -M my-ftdc
                                                  # semodule -i my-ftdc.pp
      
      

      please help to solve this problem

        Attachments

          Activity

            People

            • Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: