summarylogtreecommitdiffstats
path: root/systemd.service
diff options
context:
space:
mode:
authorGeorge Rawlinson2021-06-06 00:26:48 +0000
committerGeorge Rawlinson2021-06-06 00:26:48 +0000
commitafa7374920481b7763ff76256d53655e64ed48e3 (patch)
tree4a2318d90b8070d0d4b358d6a0e08a559b32ed11 /systemd.service
downloadaur-afa7374920481b7763ff76256d53655e64ed48e3.tar.gz
addpkg: prometheus-bind-exporter
Diffstat (limited to 'systemd.service')
-rw-r--r--systemd.service46
1 files changed, 46 insertions, 0 deletions
diff --git a/systemd.service b/systemd.service
new file mode 100644
index 000000000000..baf8d72fc3e2
--- /dev/null
+++ b/systemd.service
@@ -0,0 +1,46 @@
+[Unit]
+Description=Prometheus exporter for BIND metrics
+Requires=network-online.target
+After=network-online.target
+
+[Service]
+# If BIND_EXPORTER_ARGS is required, it should be applied using a
+# drop-in systemd file. See `man 5 systemd.unit` for details.
+ExecStart=/usr/bin/bind_exporter $BIND_EXPORTER_ARGS
+ExecReload=/bin/kill -HUP $MAINPID
+User=bind-exporter
+Group=bind-exporter
+Restart=on-failure
+RestartSec=5s
+
+NoNewPrivileges=true
+LimitNOFILE=1048576
+UMask=0077
+
+ProtectSystem=strict
+ProtectHome=true
+PrivateUsers=yes
+PrivateTmp=true
+PrivateDevices=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
+RestrictNamespaces=true
+LockPersonality=true
+MemoryDenyWriteExecute=true
+RestrictRealtime=true
+RestrictSUIDSGID=true
+RemoveIPC=true
+CapabilityBoundingSet=
+AmbientCapabilities=
+
+SystemCallFilter=@system-service
+SystemCallFilter=~@privileged @resources
+SystemCallArchitectures=native
+
+[Install]
+WantedBy=multi-user.target