ceph/systemd
Patrick Donnelly b65d9c5457
systemd: Add systemd sandboxing to services.
This change makes it so the mon/osd/mds/radosgw daemons:
    o Cannot write to /usr, /etc, and /boot.
    o Cannot access /home, /root, or /run/user.
    o Each daemon gets its own private /tmp and /var/tmp.
    o All daemons get a private /dev without physical devices (exception: osd)

I'm not sure if the osd daemon needs access to a full /dev so I left
ProtectDevices out for ceph-osd@.service.

Signed-off-by: Patrick Donnelly <batrick@batbytes.com>
2016-01-28 10:50:00 -05:00
..
ceph doc: fix message typos in systemd 2015-11-23 16:50:07 +01:00
ceph-create-keys@.service
ceph-disk@.service build/ops: systemd ceph-disk unit must not assume /bin/flock 2015-12-04 21:11:09 +01:00
ceph-mds.target
ceph-mds@.service systemd: Add systemd sandboxing to services. 2016-01-28 10:50:00 -05:00
ceph-mon.target
ceph-mon@.service systemd: Add systemd sandboxing to services. 2016-01-28 10:50:00 -05:00
ceph-osd.target
ceph-osd@.service systemd: Add systemd sandboxing to services. 2016-01-28 10:50:00 -05:00
ceph-radosgw-prestart.sh
ceph-radosgw.target
ceph-radosgw@.service systemd: Add systemd sandboxing to services. 2016-01-28 10:50:00 -05:00
ceph.target
ceph.tmpfiles.d
Makefile.am Merge pull request #6276 from david-z/wip-systemd-finegrain-ceph-service 2015-11-28 08:25:40 -05:00
rbdmap.service