This unit is provided by:
Options
-
[Install]-
WantedBy=multi-user.target
-
-
[Service]-
CapabilityBoundingSet= -
ExecPaths=/usr/bin/redis-server /usr/lib /lib -
ExecStart=/usr/bin/redis-server /etc/redis/redis-%i.conf --supervised systemd --daemonize no -
Group=redis -
LimitNOFILE=65535 -
LockPersonalityIntroduced in systemd 235=yes -
MemoryDenyWriteExecuteIntroduced in systemd 231=yes -
NoExecPaths=/ -
NoNewPrivilegesIntroduced in systemd 239=yes -
PIDFile=/run/redis-%i/redis-server.pid -
PrivateDevicesIntroduced in systemd 209=yes -
PrivateTmp=yes -
PrivateUsers=yes -
ProcSubsetIntroduced in systemd 247=pid -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectProcIntroduced in systemd 247=invisible -
ProtectSystemIntroduced in systemd 214=strict -
ReadWriteDirectories=-/etc/redis -
ReadWritePaths=-/var/lib/redis -/var/log/redis -/var/run/redis-%i -
RemoveIPCIntroduced in systemd 232=yes -
Restart=always -
RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX -
RestrictNamespacesIntroduced in systemd 233=yes -
RestrictRealtimeIntroduced in systemd 231=yes -
RestrictSUIDSGIDIntroduced in systemd 242=yes -
RuntimeDirectory=redis-%i -
RuntimeDirectoryMode=2755 -
SystemCallArchitectures=native -
SystemCallFilter=@system-service ~ @privileged @resources -
TimeoutStopSecIntroduced in systemd 188=0 -
Type=notify -
UMask=007 -
User=redis
-
-
[Unit]-
After=network.target -
Description=Advanced key-value store (%I) -
Documentation=http://redis.io/documentation, man:redis-server(1)
-
Additionnal notes
Nothing here.