summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: 778a672)
raw | patch | inline | side by side (parent: 778a672)
author | Marc Fournier <marc.fournier@camptocamp.com> | |
Thu, 21 Jan 2016 17:39:51 +0000 (18:39 +0100) | ||
committer | Marc Fournier <marc.fournier@camptocamp.com> | |
Thu, 21 Jan 2016 17:39:51 +0000 (18:39 +0100) |
Fixes #1444
contrib/systemd.collectd.service | patch | blob | history |
index 0e758e40ef85a9fb6aba1c921da5a0f27c89a41d..c7806feddd905e1bc18de179e81cadf7ca057fcb 100644 (file)
ProtectSystem=full
ProtectHome=true
-# drop all capabilities:
-CapabilityBoundingSet=
-# use this instead if you use the dns or ping plugin
-#CapabilityBoundingSet=CAP_NET_RAW
-# turn this on if you use the iptables next to the dns or ping plugin
+# A few plugins won't work without some privileges, which you'll have to
+# specify using the CapabilityBoundingSet directive below.
+#
+# Here's a (incomplete) list of the plugins known capability requirements:
+# ceph CAP_DAC_OVERRIDE
+# dns CAP_NET_RAW
+# exec CAP_SETUID CAP_SETGID
+# iptables CAP_NET_ADMIN
+# ping CAP_NET_RAW
+# turbostat CAP_SYS_RAWIO
+#
+# Example, if you use the iptables plugin alongside the dns or ping plugin:
#CapabilityBoundingSet=CAP_NET_RAW CAP_NET_ADMIN
+#
+# By default, drop all capabilities:
+CapabilityBoundingSet=
NoNewPrivileges=true