This unit is provided by:
Options
-
[Service]
-
Environment=HOME=/root
-
ExecStart=/bin/sh -c "/usr/sbin/logrotate ${usr_etc_conf} ${etc_conf} ${etc_dir} ${usr_etc_dir}"
-
ExecStart=/usr/sbin/logrotate logrotate.conf
-
ExecStart=/usr/sbin/logrotate /etc/logrotate.conf
-
ExecStartPre=/bin/sh -c "/usr/bin/systemctl set-environment etc_conf=" ; /bin/sh -c "if [ -f /etc/logrotate.conf ]; then /usr/bin/systemctl set-environment etc_conf=/etc/logrotate.conf; fi" ; /bin/sh -c "/usr/bin/systemctl set-environment usr_etc_conf=" ; /bin/sh -c "if [ -f /usr/etc/logrotate.conf ]; then /usr/bin/systemctl set-environment usr_etc_conf=/usr/etc/logrotate.conf; fi" ; /bin/sh -c "/usr/bin/systemctl set-environment usr_etc_dir=" ; /bin/sh -c "if [ -d /usr/etc/logrotate.d ]; then /usr/bin/systemctl set-environment usr_etc_dir=/usr/etc/logrotate.d; fi" ; /bin/sh -c "/usr/bin/systemctl set-environment etc_dir=" ; /bin/sh -c "if [ -d /etc/logrotate.d ]; then /usr/bin/systemctl set-environment etc_dir=/etc/logrotate.d; fi"
-
IOSchedulingClass=best-effort
-
IOSchedulingPriority=7
-
LockPersonality
Introduced in systemd 235=yes -
MemoryDenyWriteExecute
Introduced in systemd 231=yes -
Nice=19
-
PrivateDevices
Introduced in systemd 209=yes -
PrivateTmp=yes
-
ProtectClock
Introduced in systemd 245=yes -
ProtectControlGroups
Introduced in systemd 232=yes -
ProtectHostname
Introduced in systemd 242=yes -
ProtectKernelLogs
Introduced in systemd 244=yes -
ProtectKernelModules
Introduced in systemd 232=yes -
ProtectKernelTunables
Introduced in systemd 232=yes -
ProtectSystem
Introduced in systemd 214=full -
Restart=no
-
RestrictNamespaces
Introduced in systemd 233=yes -
RestrictRealtime
Introduced in systemd 231=yes -
Type=oneshot
-
User=root
-
-
[Unit]
-
ConditionACPower=yes
-
Description=Logrotate Service
-
Description=Rotate log files
-
Documentation=man:logrotate(8) man:logrotate.conf(5)
-
RequiresMountsFor=/var/log
-
Additionnal notes
Nothing here.