diff options
author | Christian Pointner <equinox@spreadspace.org> | 2021-09-24 22:33:33 +0200 |
---|---|---|
committer | Christian Pointner <equinox@spreadspace.org> | 2021-09-24 22:33:33 +0200 |
commit | 2316917055ec9399966033cc4944f5e5662c0136 (patch) | |
tree | 1a4368c6e8dcbd847eae7e2865764f24bf84610d /roles/monitoring/prometheus/exporter/ipmi/templates/service.j2 | |
parent | refactor textfile collector script handling (diff) |
add prometheus exporter IPMI
Diffstat (limited to 'roles/monitoring/prometheus/exporter/ipmi/templates/service.j2')
-rw-r--r-- | roles/monitoring/prometheus/exporter/ipmi/templates/service.j2 | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/roles/monitoring/prometheus/exporter/ipmi/templates/service.j2 b/roles/monitoring/prometheus/exporter/ipmi/templates/service.j2 new file mode 100644 index 00000000..465215e8 --- /dev/null +++ b/roles/monitoring/prometheus/exporter/ipmi/templates/service.j2 @@ -0,0 +1,32 @@ +[Unit] +Description=Prometheus ipmi exporter + +[Service] +Restart=always +User=prometheus-exporter +ExecStart=/usr/bin/prometheus-ipmi-exporter --web.listen-address="127.0.0.1:9290" --config.file=/etc/prometheus/exporter/ipmi/config.yml --freeipmi.path="/usr/sbin" +ExecReload=/bin/kill -HUP $MAINPID + +{# TODO: test which hardening options need to be removed for IPMI to work... #} +# systemd hardening-options +AmbientCapabilities= +CapabilityBoundingSet= +DeviceAllow=/dev/null rw +DevicePolicy=strict +LockPersonality=true +MemoryDenyWriteExecute=true +NoNewPrivileges=true +PrivateDevices=true +PrivateTmp=true +ProtectControlGroups=true +ProtectHome=true +ProtectKernelModules=true +ProtectKernelTunables=true +ProtectSystem=strict +RemoveIPC=true +RestrictNamespaces=true +RestrictRealtime=true +SystemCallArchitectures=native + +[Install] +WantedBy=multi-user.target |