41 lines
1.1 KiB
SYSTEMD
41 lines
1.1 KiB
SYSTEMD
![]() |
[Unit]
|
||
|
Description=Advanced key-value store
|
||
|
After=network.target
|
||
|
Documentation=https://docs.keydb.dev, man:keydb-sentinel(1)
|
||
|
|
||
|
[Service]
|
||
|
Type=forking
|
||
|
ExecStart=/usr/bin/keydb-sentinel /etc/keydb/sentinel.conf
|
||
|
ExecStop=/bin/kill -s TERM $MAINPID
|
||
|
PIDFile=/var/run/sentinel/keydb-sentinel.pid
|
||
|
TimeoutStopSec=0
|
||
|
Restart=always
|
||
|
User=keydb
|
||
|
Group=keydb
|
||
|
RuntimeDirectory=sentinel
|
||
|
RuntimeDirectoryMode=2755
|
||
|
|
||
|
UMask=007
|
||
|
PrivateTmp=yes
|
||
|
LimitNOFILE=65535
|
||
|
PrivateDevices=yes
|
||
|
ProtectHome=yes
|
||
|
ReadOnlyDirectories=/
|
||
|
ReadWriteDirectories=-/var/lib/keydb
|
||
|
ReadWriteDirectories=-/var/log/keydb
|
||
|
ReadWriteDirectories=-/var/run/sentinel
|
||
|
|
||
|
NoNewPrivileges=true
|
||
|
CapabilityBoundingSet=CAP_SETGID CAP_SETUID CAP_SYS_RESOURCE
|
||
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX
|
||
|
|
||
|
# keydb-sentinel can write to its own config file when in cluster mode so we
|
||
|
# permit writing there by default. If you are not using this feature, it is
|
||
|
# recommended that you replace the following lines with "ProtectSystem=full".
|
||
|
ProtectSystem=true
|
||
|
ReadWriteDirectories=-/etc/keydb
|
||
|
|
||
|
[Install]
|
||
|
WantedBy=multi-user.target
|
||
|
Alias=sentinel.service
|