When I checked the directory "/var/VRTSvcs/log/tmp/"
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-1
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-0
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-8
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-7
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-6
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-5
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-4
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-3
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-2
-rw-------. 1 root root 0 Aug 22 05:42 IPMultiNIC-9
I couldn't find any problem. One small observation that I could make is that in this problematic server file permission have a "." at end of each file permission "-rw-------." which is not there in any other server.
That . (dot) at the end of the display of the discretionary access control (DAC) permissions means that the file has SELinux security context.
You may display the mandatory access control (MAC) permissions of SELinux by using the -Z (capital Z) as in ls -Z
The issue you are experiencing is due to the label context of application ip with SELinux security label context of ifconfig_t trying to write to files /var/VRTSvcs/log/tmp/IPMultiNIC-* with SELinux security label context of var_t . This is exactly what SELinux is supposed to do; deny access to mismatched targets. You might need to investigate a bit about SELinux if you what to fix it.
The issue has been dealt away in your "healthy server" by disabling SeLinux, completely. New files created after that, do not get any SELinux file context and that's why they show without a . (dot) at the end of the normal Linux permissions and a ? shows instead of the SElinux context.
Security is not convenient and unfortunately it is easier to choose the path of less resistance; in this case disabling SELinux, instead of learning the way that it could be an asset to secure the server.
---------- Post updated 10-15-15 at 08:44 AM ---------- Previous update was 10-14-15 at 10:35 AM ----------
Test this solution based on what you have posted so far.
Install policycoreutils-python if you do not have it yet, from the official repository (it is not installed by default with rhel). This package contains semanage which you'll need to manage SELinux.
Then try:
semanage fcontext -a -t tmp_t "/var/VRTSvcs/log/tmp(/.*)?"
restorecon -Rv /var/VRTSvcs/log/tmp
That would set anything in /var/VRTSvcs/log/tmp to have a file context of tmp_t which is one of the file context that the process ifconfig_t type is allow to use.