You've already forked prometheus-bind-exporter-pkg
addpkg: prometheus-bind-exporter
This commit is contained in:
46
systemd.service
Normal file
46
systemd.service
Normal file
@ -0,0 +1,46 @@
|
||||
[Unit]
|
||||
Description=Prometheus exporter for BIND metrics
|
||||
Requires=network-online.target
|
||||
After=network-online.target
|
||||
|
||||
[Service]
|
||||
# If BIND_EXPORTER_ARGS is required, it should be applied using a
|
||||
# drop-in systemd file. See `man 5 systemd.unit` for details.
|
||||
ExecStart=/usr/bin/bind_exporter $BIND_EXPORTER_ARGS
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
User=bind-exporter
|
||||
Group=bind-exporter
|
||||
Restart=on-failure
|
||||
RestartSec=5s
|
||||
|
||||
NoNewPrivileges=true
|
||||
LimitNOFILE=1048576
|
||||
UMask=0077
|
||||
|
||||
ProtectSystem=strict
|
||||
ProtectHome=true
|
||||
PrivateUsers=yes
|
||||
PrivateTmp=true
|
||||
PrivateDevices=true
|
||||
ProtectHostname=true
|
||||
ProtectClock=true
|
||||
ProtectKernelTunables=true
|
||||
ProtectKernelModules=true
|
||||
ProtectKernelLogs=true
|
||||
ProtectControlGroups=true
|
||||
RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
|
||||
RestrictNamespaces=true
|
||||
LockPersonality=true
|
||||
MemoryDenyWriteExecute=true
|
||||
RestrictRealtime=true
|
||||
RestrictSUIDSGID=true
|
||||
RemoveIPC=true
|
||||
CapabilityBoundingSet=
|
||||
AmbientCapabilities=
|
||||
|
||||
SystemCallFilter=@system-service
|
||||
SystemCallFilter=~@privileged @resources
|
||||
SystemCallArchitectures=native
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Reference in New Issue
Block a user