Regenerated selinux policy and have been able to restart the web server cleanly. If you get stuck in between you can simply remove the pid and sock files which will allow the server to restart.
New te file below:
module passenger_sock2 1.0;
require {
type sshd_key_t;
type httpd_t;
type selinux_config_t;
type sssd_conf_t;
type var_run_t;
type automount_tmp_t;
type gpg_exec_t;
type ood_apps_public_t;
type ood_pun_t;
type node_t;
type var_lib_t;
type ssh_keysign_exec_t;
type ood_apps_t;
type unreserved_port_t;
type rhsmcertd_t;
class tcp_socket { name_connect node_bind };
class file { append create execute execute_no_trans getattr map open read unlink write };
class sock_file { create getattr setattr unlink write };
class netlink_route_socket { bind create getattr nlmsg_read };
class dir { add_name create read remove_name setattr write };
}
#============= httpd_t ==============
#!!! This avc is allowed in the current policy
allow httpd_t ood_apps_public_t:file map;
#!!! This avc is allowed in the current policy
allow httpd_t sssd_conf_t:file { open read };
#!!! This avc is allowed in the current policy
allow httpd_t var_run_t:sock_file { getattr write };
#============= ood_pun_t ==============
#!!! This avc is allowed in the current policy
allow ood_pun_t automount_tmp_t:dir read;
#!!! This avc is allowed in the current policy
allow ood_pun_t ood_apps_t:file append;
#!!! This avc is allowed in the current policy
allow ood_pun_t self:netlink_route_socket { bind create getattr nlmsg_read };
#!!! This avc is allowed in the current policy
allow ood_pun_t selinux_config_t:dir read;
#!!! This avc is allowed in the current policy
allow ood_pun_t ssh_keysign_exec_t:file { execute execute_no_trans map open read };
#!!! This avc is allowed in the current policy
allow ood_pun_t sshd_key_t:file { open read };
#!!! This avc is allowed in the current policy
allow ood_pun_t unreserved_port_t:tcp_socket name_connect;
#!!! This avc is allowed in the current policy
allow ood_pun_t var_run_t:dir { add_name create remove_name setattr write };
allow ood_pun_t var_run_t:file unlink;
#!!! This avc is allowed in the current policy
allow ood_pun_t var_run_t:file { create open read write };
allow ood_pun_t var_run_t:sock_file unlink;
#!!! This avc is allowed in the current policy
allow ood_pun_t var_run_t:sock_file { create getattr setattr write };
#============= rhsmcertd_t ==============
#!!! This avc is allowed in the current policy
allow rhsmcertd_t gpg_exec_t:file { execute open read };
#!!! This avc is allowed in the current policy
allow rhsmcertd_t node_t:tcp_socket node_bind;
#!!! This avc is allowed in the current policy
allow rhsmcertd_t var_lib_t:file { getattr open read write };