Run ls -lZ /var/lib/mysql to view the SELinux context of the default database location for mysql:
# ls -lZ /var/lib/mysql
drwx------. mysql mysql unconfined_u:object_r:mysqld_db_t:s0 mysql
This shows mysqld_db_t which is the default context element for the location of database files. This context will have to be manually applied to the new database location that will be used in this example in order for it to function properly.
Enter mysqlshow -u root -p and enter the mysqld root password to show the available databases:
# mysqlshow -u root -p
Enter password: *******
+--------------------+
| Databases |
+--------------------+
| information_schema |
| mysql |
| test |
| wikidb |
+--------------------+
Shut down the mysqld daemon with service mysqld stop as the root user:
# service mysqld stop
Stopping MySQL: [ OK ]
Create a new directory for the new location of the database(s). In this example, /opt/mysql is used:
# mkdir -p /opt/mysql
Copy the database files from the old location to the new location:
# cp -R /var/lib/mysql/* /opt/mysql/
Change the ownership of this location to allow access by the mysql user and group. This sets the traditional Unix permissions which SELinux will still observe.
# chown -R mysql:mysql /opt/mysql
Run ls -lZ /opt to see the initial context of the new directory:
# ls -lZ /opt
drwxr-xr-x. mysql mysql unconfined_u:object_r:usr_t:s0 mysql
The context usr_t of this newly created directory is not currently suitable to SELinux as a location for MySQL database files. Once the context has been changed, MySQL will be able to function properly in this area.
Open the main MySQL configuration file /etc/my.cnf with a text editor and modify the datadir option so that it refers to the new location. In this example the value that should be entered is /opt/mysql.
[mysqld]
datadir=/opt/mysql
Save this file and exit.
Run service mysqld start as the root user to start mysqld. The service should fail to start, and a denial will be logged to /var/log/messages:
SELinux is preventing /usr/libexec/mysqld "write" access on /opt/mysql. For complete SELinux messages. run sealert -l b3f01aff-7fa6-4ebe-ad46-abaef6f8ad71
The reason for this denial is that /opt/mysql is not labeled correctly for MySQL data files. SELinux is stopping MySQL from having access to the content labeled as usr_t. Perform the following steps to resolve this problem:
Run the semanage command to add a context mapping for /opt/mysql:
semanage fcontext -a -t mysqld_db_t "/opt/mysql(/.*)?"
This mapping is written to the /etc/selinux/targeted/contexts/files/file_contexts.local file:
# grep -i mysql /etc/selinux/targeted/contexts/files/file_contexts.local
/opt/mysql(/.*)? system_u:object_r:mysqld_db_t:s0
Now use the restorecon command to apply this context mapping to the running system:
restorecon -R -v /opt/mysql
Now that the /opt/mysql location has been labeled with the correct context for MySQL, the mysqld daemon starts:
# service mysqld start
Starting MySQL: [ OK ]
Confirm the context has changed for /opt/mysql:
ls -lZ /opt
drwxr-xr-x. mysql mysql system_u:object_r:mysqld_db_t:s0 mysql
The location has been changed and labeled, and the mysqld daemon has started successfully. At this point all running services should be tested to confirm normal operation.