46 lines
1.2 KiB
SYSTEMD
46 lines
1.2 KiB
SYSTEMD
[Unit]
|
|
Description=Advanced key-value store instance 2
|
|
After=network.target
|
|
Documentation=http://redis.io/documentation, man:redis-server(1)
|
|
|
|
[Service]
|
|
Type=forking
|
|
ExecStart=/usr/bin/redis-server /etc/redis/redis-slave.conf
|
|
PIDFile=/var/run/redis/redis-slave-server.pid
|
|
TimeoutStopSec=0
|
|
Restart=always
|
|
User=redis
|
|
Group=redis
|
|
RuntimeDirectory=redis
|
|
RuntimeDirectoryMode=2755
|
|
|
|
UMask=007
|
|
PrivateTmp=yes
|
|
LimitNOFILE=65535
|
|
PrivateDevices=yes
|
|
ProtectHome=yes
|
|
ReadOnlyDirectories=/
|
|
ReadWriteDirectories=-/var/lib/redis
|
|
ReadWriteDirectories=-/var/log/redis
|
|
ReadWriteDirectories=-/var/run/redis
|
|
|
|
NoNewPrivileges=true
|
|
CapabilityBoundingSet=CAP_SETGID CAP_SETUID CAP_SYS_RESOURCE
|
|
MemoryDenyWriteExecute=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelTunables=true
|
|
ProtectControlGroups=true
|
|
RestrictRealtime=true
|
|
RestrictNamespaces=true
|
|
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX
|
|
|
|
# redis-server can write to its own config file when in cluster mode so we
|
|
# permit writing there by default. If you are not using this feature, it is
|
|
# recommended that you replace the following lines with "ProtectSystem=full".
|
|
ProtectSystem=true
|
|
ReadWriteDirectories=-/etc/redis
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|
|
Alias=redis2.service
|