- Complete Cloudflare Terraform configuration (DNS, WAF, tunnels, access) - WAF Intelligence MCP server with threat analysis and ML classification - GitOps automation with PR workflows and drift detection - Observatory monitoring stack with Prometheus/Grafana - IDE operator rules for governed development - Security playbooks and compliance frameworks - Autonomous remediation and state reconciliation
57 lines
1.3 KiB
Desktop File
57 lines
1.3 KiB
Desktop File
[Unit]
|
|
Description=Cloudflare Autonomous Remediator - Self-healing infrastructure
|
|
Documentation=https://vaultmesh.org/docs/cloudflare-binding
|
|
After=network-online.target drift-guardian.service
|
|
Wants=network-online.target
|
|
|
|
[Service]
|
|
Type=simple
|
|
User=cloudflare-mesh
|
|
Group=cloudflare-mesh
|
|
|
|
# Environment
|
|
EnvironmentFile=/etc/cloudflare-mesh/environment
|
|
Environment=PYTHONUNBUFFERED=1
|
|
|
|
# Execution
|
|
ExecStart=/usr/bin/python3 /opt/cloudflare-mesh/scripts/autonomous-remediator.py \
|
|
--zone-id ${CLOUDFLARE_ZONE_ID} \
|
|
--account-id ${CLOUDFLARE_ACCOUNT_ID} \
|
|
--watch-mode \
|
|
--emit-receipts
|
|
|
|
# Restart policy
|
|
Restart=always
|
|
RestartSec=30
|
|
StartLimitBurst=5
|
|
StartLimitIntervalSec=300
|
|
|
|
# Security hardening
|
|
NoNewPrivileges=yes
|
|
PrivateTmp=yes
|
|
ProtectSystem=strict
|
|
ProtectHome=yes
|
|
ReadOnlyPaths=/
|
|
ReadWritePaths=/var/lib/cloudflare-mesh
|
|
ReadWritePaths=/var/log/cloudflare-mesh
|
|
CapabilityBoundingSet=
|
|
AmbientCapabilities=
|
|
ProtectKernelTunables=yes
|
|
ProtectKernelModules=yes
|
|
ProtectControlGroups=yes
|
|
RestrictSUIDSGID=yes
|
|
RestrictNamespaces=yes
|
|
LockPersonality=yes
|
|
MemoryDenyWriteExecute=yes
|
|
RestrictRealtime=yes
|
|
SystemCallFilter=@system-service
|
|
SystemCallArchitectures=native
|
|
|
|
# Logging
|
|
StandardOutput=journal
|
|
StandardError=journal
|
|
SyslogIdentifier=autonomous-remediator
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|