This unit is provided by:
Options
-
[Install]-
WantedBy=multi-user.target
-
-
[Service]-
AmbientCapabilities= -
CapabilityBoundingSet= -
ExecStart=/usr/bin/houndd -
ExecStart=/usr/bin/houndd -addr 0.0.0.0:6080 -conf hound.json -
ExecStartPre=/usr/bin/git config --global --replace-all http.sslCAinfo /etc/ssl/certs/ca-certificates.crt -
Group=hound -
LimitNOFILE=1048576 -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateTmp=yes -
PrivateUsers=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectSystemIntroduced in systemd 214=full -
ReadWritePaths=/var/lib/hound -
RemoveIPCIntroduced in systemd 232=yes -
Restart=always -
RestartSec=30 -
RestrictAddressFamilies=AF_INET AF_INET6 -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
SystemCallArchitectures=native -
SystemCallFilter=@system-service ~@privileged @resources -
UMask=0077 -
User=hound -
WorkingDirectory=/var/lib/hound
-
-
[Unit]-
After=network-online.target -
After=network.target -
Description=Hound Code Search -
Description=Hound Code Search and Indexing Daemon -
Documentation=https://github.com/hound-search/hound -
Requires=network-online.target
-
Additionnal notes
Nothing here.