This unit is provided by:
Options
-
[Service]-
CapabilityBoundingSet= -
ExecStart=/usr/bin/redis-server /var/lib/redis-nitter/redis.conf -
ExecStartPre=+redis-nitter-prep-conf -
Group=redis-nitter -
LimitNOFILE=10032 -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoNewPrivilegesIntroduced in systemd 239=yes -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateMounts=yes -
PrivateTmp=yes -
PrivateUsers=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectSystemIntroduced in systemd 214=strict -
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
RuntimeDirectory=redis-nitter -
RuntimeDirectoryMode=0750 -
StateDirectory=redis-nitter -
StateDirectoryMode=0700 -
SystemCallArchitectures=native -
SystemCallFilter=~@cpu-emulation @debug @keyring @memlock @mount @obsolete @privileged @resources @setuid -
Type=notify -
UMask=0077 -
User=redis-nitter
-
-
[Unit]-
After=network.target -
Description=Redis Server - redis-nitter
-
Additionnal notes
Nothing here.