puppet – 在带有日志记录的systemd中禁用ctrl alt delete

前端之家收集整理的这篇文章主要介绍了puppet – 在带有日志记录的systemd中禁用ctrl alt delete前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
我正在尝试更新一些在RHEL机器上禁用CAD的Puppet清单.

现在我正在使用systemd上的顶级方式:masking(即链接到/ dev / null)

  1. $ctrlaltdel_process = '/usr/bin/logger -p security.info "Control-Alt-Delete pressed"'
  2.  
  3. # Every version of RHEL has a different way of doing this! :)
  4. case $::operatingsystemmajrelease {
  5. '4','5': {
  6. augeas { 'disable-inittab-ctrlaltdel':
  7. context => '/files/etc/inittab',lens => 'inittab.lns',incl => '/etc/inittab',changes => "set *[action = 'ctrlaltdel']/process '${ctrlaltdelprocess}'",}
  8. }
  9. '6': {
  10. file { '/etc/init/control-alt-delete.conf':
  11. ensure => file,content => $ctrlaltdel_process,}
  12. }
  13. '7': {
  14. file { '/etc/systemd/system/ctrl-alt-del.target':
  15. ensure => 'link',target => '/dev/null',}
  16. }
  17. default: {
  18. fail("Module ${module_name} is not supported on this ${::operatingsystemmajrelease}")
  19. }
  20. }

正如您所看到的,在其他系统上,我实际上正在编写一个安全日志,说CAD已被按下,但我不会用systemd机器来获取它.

我喜欢在日志中实际拥有陷阱的想法,以便我们可以追踪人们是否正在这样做.

有人可以给我一个示例systemd配置文件的ctrl alt删除,它会做同样的事情吗?

解决方法

  1. # ctrl-alt-del.target
  2. [Unit]
  3. DefaultDependencies=no # Do not affect the system through dependencies
  4. Requires=ctrl-alt-del.service
  5. StopWhenUneeded=yes
  6.  
  7. # ctrl-alt-del.service
  8. [Service]
  9. DefaultDependencies=no # Do not affect the system through dependencies
  10. Type=oneshot
  11. ExecStart=/usr/bin/logger -p security.info "Control-Alt-Delete pressed"

猜你在找的HTML相关文章