wiki:MaiaConfigFile
close Warning:

Sample /etc/maia.conf file

###################################################################
#           Maia Mailguard Script Configuration File              #
#                                                                 #
# This file (/etc/maia.conf) contains configuration information   #
# used by Maia Mailguard's Perl maintenance scripts.              #
###################################################################

# Configure your Maia database DSN here
$dsn = "DBI:mysql:maia:localhost:3306";

# Your Maia database user's login name
$username = "amavis";

# Your Maia database user's password
$password = "passwd";

# The directory where Maia's Perl scripts can be found.
$script_dir = "/var/amavisd/maia/scripts";


### load-sa-rules.pl

# The load-sa-rules script tries to find certain important rules
# directories on its own, and usually it does a pretty good job,
# but if it fails to find your rules directories, you can tell it
# explicitly where to look by overriding the search here.  Setting
# these to "undef" tells load-sa-rules to find the directories
# on its own (recommended).

# The directory where SpamAssassin's local.cf file can be found.
#$local_cf_dir = "/etc/mail/spamassassin";
$local_cf_dir = undef;  # default: let the script find it

# The directory where SpamAssassin's core rules can be found.
# If you wish to specify the directory yourself, you can use the
# %%VERSION%% macro to replace the actual SpamAssassin version number.
#$system_rules_dir = "/usr/share/spamassassin";
#$system_rules_dir = "/var/lib/spamassassin/%%VERSION%%";  # sa-update
$system_rules_dir = undef;  # default: let the script find it

# The directory where your amavis user's user_prefs file can be found.
#$user_rules_dir = "/var/amavisd/.spamassassin";
#$user_rules_dur = "~/.spamassassin";
$user_rules_dir = undef;  # default: let the script find it


### process-quarantine.pl

# Location to write the lock/PID file (must be writeable by your
# amavis user)
$pid_file = "/var/amavisd/.process-quarantine.pid";

# Maximum number of spam/non-spam items to process at a time (1-127).
$default_limit = 5;

# Location of your encryption key file, or undef to disable
#$key_file = "/var/amavisd/blowfish.key";
$key_file = undef;

# Items larger than this size (in bytes) will not be learned/reported.
$default_max_size = 256*1024;

# Train the Bayes database?
#    0 = no
#    1 = yes (same as --learn)
$learning_options = 1;

# Reporting options (add values together as desired):
#    0 = none (don't report spam)
#    1 = report to Razor
#    2 = report to Pyzor
#    4 = report to DCC
#    8 = report to SpamCop
#$report_options = 0;
$report_options = 1 + 2 + 4 + 8;


### expire-quarantine-cache.pl

# Mail types to expire (add values together as desired):
#    0 = none (don't expire anything)
#    1 = expire Suspected Non-Spam
#    2 = expire Suspected Spam
#    4 = expire Viruses/Malware
#    8 = expire items with Invalid Mail Headers
#   16 = expire items with Banned File Attachments
#   32 = expire Confirmed Non-Spam
#   64 = expire Confirmed Spam
$mail_types = 1 + 2 + 4 + 8 + 16;


### send-quarantine-digests.pl

# Base URL to Maia's PHP scripts
$base_url = "http://example.com/";

# Template directory
$template_dir = "/var/amavisd/maia/templates/";

# How you want the sorted (choose one per cache type)
# (note: non spam/ham caches don't have score to sort by)
# options are:
# %sort = "score DIRECTION"
#       = "received_date DIRECTION"
#       = "recipient_id DIRECTION"
# Where DIRECTION is ASC or DESC

%sort = (
            'ham'   => "score DESC",  # puts the high scores at the top
            'spam'  => "score ASC",   # puts the low scroes at the top
            'virus' => "received_date DESC",
            'banned_file' => "received_date DESC",
            'bad_header'  => "received_date DESC",
);

# Heading titles for each section of the digest report

$titles = { 'spam'        =>  "Spam Quarantine",
            'virus'       =>  "Virus Quarantine",
            'banned_file' =>  "Banned File Attachments",
            'bad_header'  =>  "Invalid Email Headers",
            'ham'         =>  "Delivered Email"
};

# The order of the sections of the digest report
# Valid elements are 'spam', 'ham', 'virus', banned_file', and 'bad_header'
# Omit any of these elements to leave them out of the report

@report_order = ('spam','ham','virus','banned_file','bad_header');
Last modified 13 years ago Last modified on Apr 13, 2006, 12:17:38 AM