Allow h2 and alpn, add PROXY and give telegraf network control perms for wireguard
This commit is contained in:
parent
b6f5c6a4f1
commit
1c0e1c432b
|
@ -24,3 +24,7 @@ MemoryDenyWriteExecute=yes
|
||||||
LockPersonality=yes
|
LockPersonality=yes
|
||||||
PrivateTmp=yes
|
PrivateTmp=yes
|
||||||
PrivateDevices=yes
|
PrivateDevices=yes
|
||||||
|
{% if inventory_hostname == "n1" %}
|
||||||
|
CapabilityBoundingSet=CAP_NET_ADMIN
|
||||||
|
AmbientCapabilities=CAP_NET_ADMIN
|
||||||
|
{% endif %}
|
||||||
|
|
|
@ -7,4 +7,4 @@ Restart=on-failure
|
||||||
RestartSec=10
|
RestartSec=10
|
||||||
|
|
||||||
ExecStart=
|
ExecStart=
|
||||||
ExecStart=/usr/sbin/varnishd -F -a {{ varnish.frontend.sock }},user={{ varnish.frontend.user }},group={{ varnish.frontend.group }},mode={{ varnish.frontend.mode }} -j unix,user={{ varnish.jail.user }} -f /etc/varnish/default.vcl -s malloc,256m
|
ExecStart=/usr/sbin/varnishd -F -a {{ varnish.frontend.sock }},user={{ varnish.frontend.user }},group={{ varnish.frontend.group }},mode={{ varnish.frontend.mode }},PROXY -p feature=+http2 -j unix,user={{ varnish.jail.user }} -f /etc/varnish/default.vcl -s malloc,512m
|
||||||
|
|
Reference in New Issue