仙人掌graphics不工作

我试着用mariadb,nginx 1.4,php 5.4.x在CentOS 6上设置Cacti

我只是无法让图表更新

我的cacti文件全部由用户nginx拥有,所以我的crontab文件/etc/cron.d/cacti有

*/5 * * * * nginx /usr/bin/php -q /usr/share/nginx/html/cacti/poller.php > /var/local/log/poller.log 2>&1 

但是,我发现它在cron日志中运行,但是它不会在poller.log中产生任何输出,并且不会更新cacti.log。

 Oct 13 12:20:01 srv CROND[14644]: (nginx) CMD ( /usr/bin/php -q usr/share/nginx/html/cacti/poller.php > /var/local/log/poller.log 2>&1) 

我可以运行sudo -u nginx /usr/bin/php -q /usr/share/nginx/html/cacti/poller.php并查看输出,它似乎更新.rrd文件。 另外,我已经运行了这个sudo -u nginx php -q cli/rebuild_poller_cache.php并且在图上我得到了一个数据点,但是我甚至无法手动更新graphics。

在cacti.log中似乎没有任何帮助(仅在手动运行时更新)。 我也没有看到关于SELinux的/var/log/secure内容,但是我可能错过了它(不知道要找什么)。

我应该在哪里解决这个问题? 为什么即使cronjob正在运行,cronjob也不工作? 我怎样才能让graphics再次更新?

更新:我想我看到了这个问题。 我没有看过实际的rra文件夹的权限,只是它的符号链接。 我会试着解决这个问题。

相关rra文件的权限:

 $ lll /usr/share/nginx/html/cacti/rra lrwxrwxrwx. 1 nginx nginx 18 Oct 12 23:21 /usr/share/nginx/html/cacti/rra -> /var/lib/cacti/rra $ lll /usr/share/nginx/html/cacti/rra/ total 340 drwxr-xr-x. 2 cacti root 4096 Oct 13 00:32 . drwxr-xr-x. 5 root root 4096 Oct 12 23:21 .. -rw-r--r--. 1 nginx nginx 141640 Oct 13 12:12 localhost_load_1min_5.rrd -rw-r--r--. 1 nginx nginx 47992 Oct 13 12:12 localhost_mem_buffers_3.rrd -rw-r--r--. 1 nginx nginx 47992 Oct 13 12:12 localhost_mem_swap_4.rrd -rw-r--r--. 1 nginx nginx 47992 Oct 13 12:12 localhost_proc_7.rrd -rw-r--r--. 1 nginx nginx 47992 Oct 13 12:12 localhost_users_6.rrd $ lll /var/lib/cacti/ total 20 drwxr-xr-x. 5 root root 4096 Oct 12 23:21 . drwxr-xr-x. 38 root root 4096 Oct 12 23:21 .. drwxr-xr-x. 2 root root 4096 Oct 12 23:21 cli lrwxrwxrwx. 1 root root 24 Oct 12 23:21 include -> /usr/share/cacti/include lrwxrwxrwx. 1 root root 20 Oct 12 23:21 lib -> /usr/share/cacti/lib drwxr-xr-x. 2 cacti root 4096 Oct 13 00:32 rra drwxr-xr-x. 2 root root 4096 Oct 12 23:21 scripts 

这是我的audit.log的一部分(这是非常重复的)

 [matt@srv ~]$ sudo cat /var/log/audit/audit.log | grep denied type=AVC msg=audit(1381785901.286:31729): avc: denied { getattr } for pid=22067 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381786201.333:31742): avc: denied { getattr } for pid=22087 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381786501.374:31749): avc: denied { getattr } for pid=22114 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381786801.418:31762): avc: denied { getattr } for pid=22134 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381787101.450:31769): avc: denied { getattr } for pid=22151 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381787401.493:31782): avc: denied { getattr } for pid=22171 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381787701.543:31789): avc: denied { getattr } for pid=22188 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file type=AVC msg=audit(1381788001.595:31800): avc: denied { getattr } for pid=22208 comm="postdrop" path="/var/spool/postfix/public/pickup" dev=dm-0 ino=2224026 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:postfix_public_t:s0 tclass=sock_file 

我必须修复symlink'd目录的父权限

/var/lib/cacti/rra

/var/log/cacti

注意:

 $ ll /usr/share/cacti/ total 868 ... lrwxrwxrwx. 1 nginx nginx 18 Oct 12 23:21 cli -> /var/lib/cacti/cli ... lrwxrwxrwx. 1 nginx nginx 15 Oct 12 23:21 log -> /var/log/cacti/ ... lrwxrwxrwx. 1 nginx nginx 18 Oct 12 23:21 rra -> /var/lib/cacti/rra ... lrwxrwxrwx. 1 nginx nginx 22 Oct 12 23:21 scripts -> /var/lib/cacti/scripts 

固定:

 chown -R nginx:nginx /var/log/cacti/ chown -R nginx:nginx /var/lib/cacti/rra