FastHandle - IT Operations Examples

FastHandle is fast operation tools for infrastructure configurations and tests.

User Tools

Site Tools


os:linux:set:deamon:etc_systemd_journald.conf.html



Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
os:linux:set:deamon:etc_systemd_journald.conf.html [2018/04/19 00:06]
kurihara created
os:linux:set:deamon:etc_systemd_journald.conf.html [2018/05/07 21:04] (current)
kurihara
Line 21: Line 21:
 # Max message is 10000 messages in 30 seconds # Max message is 10000 messages in 30 seconds
 RateLimitInterval=30s RateLimitInterval=30s
-RateLimitBurst=1000+RateLimitBurst=10000
 </sxh> </sxh>
  
  
 \\ \\
-===== CentOS7 Default /etc/systemd/journald.conf =====+===== CentOS7 and Ubuntu 16.0.4 Default /etc/systemd/journald.conf =====
 <sxh bash toolbar:false gutter:false> <sxh bash toolbar:false gutter:false>
 #  This file is part of systemd. #  This file is part of systemd.
Line 69: Line 69:
 </sxh> </sxh>
  
-\\ 
-===== Ubuntu 16.0.4 Default /etc/security/limits.conf ===== 
-<sxh bash toolbar:false gutter:false> 
-# Package generated configuration file 
-# See the sshd_config(5) manpage for details 
- 
-# What ports, IPs and protocols we listen for 
-Port 22 
-# Use these options to restrict which interfaces/protocols sshd will bind to 
-#ListenAddress :: 
-#ListenAddress 0.0.0.0 
-Protocol 2 
-# HostKeys for protocol version 2 
-HostKey /etc/ssh/ssh_host_rsa_key 
-HostKey /etc/ssh/ssh_host_dsa_key 
-HostKey /etc/ssh/ssh_host_ecdsa_key 
-HostKey /etc/ssh/ssh_host_ed25519_key 
-#Privilege Separation is turned on for security 
-UsePrivilegeSeparation yes 
- 
-# Lifetime and size of ephemeral version 1 server key 
-KeyRegenerationInterval 3600 
-ServerKeyBits 1024 
- 
-# Logging 
-SyslogFacility AUTH 
-LogLevel INFO 
- 
-# Authentication: 
-LoginGraceTime 120 
-PermitRootLogin prohibit-password 
-StrictModes yes 
- 
-RSAAuthentication yes 
-PubkeyAuthentication yes 
-#AuthorizedKeysFile     %h/.ssh/authorized_keys 
- 
-# Don't read the user's ~/.rhosts and ~/.shosts files 
-IgnoreRhosts yes 
-# For this to work you will also need host keys in /etc/ssh_known_hosts 
-RhostsRSAAuthentication no 
-# similar for protocol version 2 
-HostbasedAuthentication no 
-# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication 
-#IgnoreUserKnownHosts yes 
- 
-# To enable empty passwords, change to yes (NOT RECOMMENDED) 
-PermitEmptyPasswords no 
- 
-# Change to yes to enable challenge-response passwords (beware issues with 
-# some PAM modules and threads) 
-ChallengeResponseAuthentication no 
- 
-# Change to no to disable tunnelled clear text passwords 
-#PasswordAuthentication yes 
- 
-# Kerberos options 
-#KerberosAuthentication no 
-#KerberosGetAFSToken no 
-#KerberosOrLocalPasswd yes 
-#KerberosTicketCleanup yes 
- 
-# GSSAPI options 
-#GSSAPIAuthentication no 
-#GSSAPICleanupCredentials yes 
- 
-X11Forwarding yes 
-X11DisplayOffset 10 
-PrintMotd no 
-PrintLastLog yes 
-TCPKeepAlive yes 
-#UseLogin no 
- 
-#MaxStartups 10:30:60 
-#Banner /etc/issue.net 
- 
-# Allow client to pass locale environment variables 
-AcceptEnv LANG LC_* 
- 
-Subsystem sftp /usr/lib/openssh/sftp-server 
- 
-# Set this to 'yes' to enable PAM authentication, account processing, 
-# and session processing. If this is enabled, PAM authentication will 
-# be allowed through the ChallengeResponseAuthentication and 
-# PasswordAuthentication.  Depending on your PAM configuration, 
-# PAM authentication via ChallengeResponseAuthentication may bypass 
-# the setting of "PermitRootLogin without-password". 
-# If you just want the PAM account and session checks to run without 
-# PAM authentication, then enable this but set PasswordAuthentication 
-# and ChallengeResponseAuthentication to 'no'. 
-UsePAM yes 
-</sxh> 
  
 \\ \\


os/linux/set/deamon/etc_systemd_journald.conf.html.1524064007.txt.gz ยท Last modified: 2018/04/19 00:06 by kurihara