From b362c4a1b1462b1ccf26750752c2147615508f52 Mon Sep 17 00:00:00 2001 From: Christian Pointner Date: Sat, 17 Dec 2022 18:21:12 +0100 Subject: add prometheus snmp exporter --- .../prometheus/exporter/snmp/templates/service.j2 | 31 ++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 roles/monitoring/prometheus/exporter/snmp/templates/service.j2 (limited to 'roles/monitoring/prometheus/exporter/snmp/templates/service.j2') diff --git a/roles/monitoring/prometheus/exporter/snmp/templates/service.j2 b/roles/monitoring/prometheus/exporter/snmp/templates/service.j2 new file mode 100644 index 00000000..7fccb2da --- /dev/null +++ b/roles/monitoring/prometheus/exporter/snmp/templates/service.j2 @@ -0,0 +1,31 @@ +[Unit] +Description=Prometheus snmp exporter + +[Service] +Restart=always +User=prometheus-exporter +ExecStart=/usr/bin/prometheus-snmp-exporter --web.listen-address="127.0.0.1:9116" --config.file=/etc/prometheus/exporter/snmp/config.yml +ExecReload=/bin/kill -HUP $MAINPID + +# systemd hardening-options +AmbientCapabilities= +CapabilityBoundingSet= +DeviceAllow=/dev/null rw +DevicePolicy=strict +LockPersonality=true +MemoryDenyWriteExecute=true +NoNewPrivileges=true +PrivateDevices=true +PrivateTmp=true +ProtectControlGroups=true +ProtectHome=true +ProtectKernelModules=true +ProtectKernelTunables=true +ProtectSystem=strict +RemoveIPC=true +RestrictNamespaces=true +RestrictRealtime=true +SystemCallArchitectures=native + +[Install] +WantedBy=multi-user.target -- cgit v1.2.3