diff options
author | Christian Pointner <equinox@spreadspace.org> | 2023-05-26 21:34:14 +0200 |
---|---|---|
committer | Christian Pointner <equinox@spreadspace.org> | 2023-07-17 21:51:22 +0200 |
commit | 695131994b5a749e129fb304e8ba709acd37afe8 (patch) | |
tree | 02111746a1cd0cfc31c5736170b12aafadcb771e /roles/monitoring/prometheus/exporter/chrony/templates | |
parent | make textfile collector for apt packages configurable (diff) |
add support for chrony_exporter (replaces textfile collector)
Diffstat (limited to 'roles/monitoring/prometheus/exporter/chrony/templates')
-rw-r--r-- | roles/monitoring/prometheus/exporter/chrony/templates/service.j2 | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/roles/monitoring/prometheus/exporter/chrony/templates/service.j2 b/roles/monitoring/prometheus/exporter/chrony/templates/service.j2 new file mode 100644 index 00000000..cb806649 --- /dev/null +++ b/roles/monitoring/prometheus/exporter/chrony/templates/service.j2 @@ -0,0 +1,31 @@ +[Unit] +Description=Prometheus chrony exporter + +[Service] +Restart=always +User=_chrony +ExecStart=/usr/bin/prometheus-chrony-exporter --web.listen-address="127.0.0.1:9123" --chrony.address=unix:///run/chrony/chronyd.sock {% for collector in prometheus_exporter_chrony_enable_collectors %} --collector.{{ collector }}{% endfor %}{{ '' }} + +# systemd hardening-options +AmbientCapabilities= +CapabilityBoundingSet= +DeviceAllow=/dev/null rw +DevicePolicy=strict +LockPersonality=true +MemoryDenyWriteExecute=true +NoNewPrivileges=true +PrivateDevices=true +PrivateTmp=true +ProtectControlGroups=true +ProtectHome=true +ProtectKernelModules=true +ProtectKernelTunables=true +ProtectSystem=strict +ReadWritePaths=/run/chrony +RemoveIPC=true +RestrictNamespaces=true +RestrictRealtime=true +SystemCallArchitectures=native + +[Install] +WantedBy=multi-user.target |