Skip to content
Navigation Menu
Toggle navigation
Sign in
In this repository
All GitHub Enterprise
↵
Jump to
↵
No suggested jump to results
In this repository
All GitHub Enterprise
↵
Jump to
↵
In this organization
All GitHub Enterprise
↵
Jump to
↵
In this repository
All GitHub Enterprise
↵
Jump to
↵
Sign in
Reseting focus
You signed in with another tab or window.
Reload
to refresh your session.
You signed out in another tab or window.
Reload
to refresh your session.
You switched accounts on another tab or window.
Reload
to refresh your session.
Dismiss alert
{{ message }}
mariux64
/
mxtools
Public
Notifications
You must be signed in to change notification settings
Fork
0
Star
1
Code
Issues
15
Pull requests
4
Actions
Projects
0
Security
Insights
Additional navigation options
Code
Issues
Pull requests
Actions
Projects
Security
Insights
Files
6795406
applications-defaults
blink
checktrust
clusterd
crashkernel
cronwrap
desktop-files
etc
fon
forensics
hostconfig
kill-exuser
kvm_monitor
libexec_cron
libexec_startup
logrotate
logrotate.conf
logrotate.service
logrotate.timer
make-automaps
mkmotd
mozilla-launcher
mxgrub
mxmirror
mxmount
mxnetctl
mxproxmox
mxqi
mxraid
mxrouter
mxshadow
mxsnoop
mxstartup
mxvlan
net_qdisc_nfs_low
netlog
nfsdtop
nvidiactl
pdist
pkgadmin
pmirror
prun
put_websafe
serial-log
slowio
unbound
usrlocalpkg
uvpn
vmcontrol
wakeonlan
.gitignore
Makefile
README.md
install.sh
Breadcrumbs
mxtools
/
logrotate
/
logrotate.service
Blame
Blame
Latest commit
History
History
26 lines (23 loc) · 678 Bytes
Breadcrumbs
mxtools
/
logrotate
/
logrotate.service
Top
File metadata and controls
Code
Blame
26 lines (23 loc) · 678 Bytes
Raw
[Unit] Documentation=man:logrotate(8) man:logrotate.conf(5) RequiresMountsFor=/var/log ConditionACPower=true [Service] Type=oneshot ExecStart=/usr/sbin/logrotate -v /etc/logrotate.conf # performance options Nice=19 IOSchedulingClass=best-effort IOSchedulingPriority=7 # hardening options # details: https://www.freedesktop.org/software/systemd/man/systemd.exec.html # no ProtectHome for userdir logs # no PrivateNetwork for mail deliviery # no ProtectKernelTunables for working SELinux with systemd older than 235 MemoryDenyWriteExecute=true PrivateDevices=true PrivateTmp=true ProtectControlGroups=true ProtectKernelModules=true ProtectSystem=full RestrictRealtime=true
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
You can’t perform that action at this time.