You should first investigate if you can use RBAC to accomplish what you want. If you can't, you use isi_visudo. There's a background process that will detect that you've made custom changes (via isi_visudo) and will automatically re-merge your custom content with the auto-generated content based on your RBAC configuration.
Your custom content is stored in /etc/mcp/override/sudoers (but use isi_visudo, don't edit this file by hand). The system content is stored in /etc/mcp/templates/sudoers. These 2 files along with your RBAC configuration are merged to create the final config that's stored in /usr/local/etc/sudoers; this is the file used by sudo to evaluate if you have permissions to run a given command.
Yes the sudoers configuration mechanism has changed as of 7.0.2.4 if I remember correctly.
Use the 'isi_visudo' command to populate your custom sudoers configuration and those changes will be synchronized across all nodes in the cluster (and won't be overwritten).
Which sudoers file is the cluster working from? I am confused as I have added the AD group to the existing roles and if you cat the sudoers file in this location (/usr/local/etc/) is shows the the default roles having limitations set within the sudoers file.
Yan_Faubert
117 Posts
0
October 29th, 2014 08:00
You should first investigate if you can use RBAC to accomplish what you want. If you can't, you use isi_visudo. There's a background process that will detect that you've made custom changes (via isi_visudo) and will automatically re-merge your custom content with the auto-generated content based on your RBAC configuration.
Your custom content is stored in /etc/mcp/override/sudoers (but use isi_visudo, don't edit this file by hand). The system content is stored in /etc/mcp/templates/sudoers. These 2 files along with your RBAC configuration are merged to create the final config that's stored in /usr/local/etc/sudoers; this is the file used by sudo to evaluate if you have permissions to run a given command.
Yan_Faubert
117 Posts
0
October 29th, 2014 06:00
Yes the sudoers configuration mechanism has changed as of 7.0.2.4 if I remember correctly.
Use the 'isi_visudo' command to populate your custom sudoers configuration and those changes will be synchronized across all nodes in the cluster (and won't be overwritten).
chjatwork
2 Intern
•
356 Posts
0
October 29th, 2014 08:00
Ok, I have another question?
Which sudoers file is the cluster working from? I am confused as I have added the AD group to the existing roles and if you cat the sudoers file in this location (/usr/local/etc/) is shows the the default roles having limitations set within the sudoers file.
## begin auto-generated RBAC entries
User_Alias SECURITYADMIN = #10
User_Alias SYSTEMADMIN = #10, %#1000002
User_Alias VMWAREADMIN = %#1000002
SECURITYADMIN ALL=(ALL) NOPASSWD: ISI_PRIV_AUTH, ISI_PRIV_ROLE
SYSTEMADMIN ALL=(ALL) NOPASSWD: ISI_PRIV_ANTIVIRUS, ISI_PRIV_AUDIT, ISI_PRIV_CLUSTER, ISI_PRIV_DEVICES, ISI_PRIV_EVENT, ISI_PRIV_FTP, ISI_PRIV_HTTP, ISI_PRIV_ISCSI, ISI_PRIV_JOB_ENGINE, ISI_PRIV_LICENSE, ISI_PRIV_NDMP, ISI_PRIV_NETWORK, ISI_PRIV_NFS, ISI_PRIV_NTP, ISI_PRIV_QUOTA, ISI_PRIV_REMOTE_SUPPORT, ISI_PRIV_SMARTPOOLS, ISI_PRIV_SMB, ISI_PRIV_SNAPSHOT, ISI_PRIV_SNMP, ISI_PRIV_STATISTICS, ISI_PRIV_SYNCIQ, ISI_PRIV_VCENTER
VMWAREADMIN ALL=(ALL) NOPASSWD: ISI_PRIV_ISCSI, ISI_PRIV_NETWORK, ISI_PRIV_SMARTPOOLS, ISI_PRIV_SNAPSHOT, ISI_PRIV_SYNCIQ, ISI_PRIV_VCENTER
## end auto-generated RBAC entries
But when I run the isi_visudo there are no entries. So I am totally confused? What Sudoers file is the cluster running on?
Thank you,
vijayscsa1
26 Posts
0
June 5th, 2015 03:00
Hi..
I have an isilon cluster local user account want to execute set of commands.. I tried editing isi_visudo,
can any of us show what are the lines i have to add
example:
user1 ALL=(ALL) !/usr/bin/isi sync*
here user1 is the user name
need your suggestions
chjatwork
2 Intern
•
356 Posts
0
June 5th, 2015 05:00
What version of OneFS?