Thanks @Princess-Daisy and @Lind ,
Here’s everything relevant that’s uncommented in my torrc file atm:
Log notice file /var/log/tor/notices.log
MetricsPort 127.0.0.1:9035
MetricsPortPolicy accept 127.0.0.1
I was using:
MetricsPort 127.0.0.1:9052
MetricsPortPolicy accept 127.0.0.1
MetricsPortPolicy accept [::1]
which worked just fine. But changed it to the above as that’s the advice from the link in the OP.
So that MetricsPort being via 127.0.0.1 - the loopback address - should not be accessible from public internet, right? And it didn’t work without enabling the current:
MetricsPort 127.0.0.1:9035
MetricsPortPolicy accept 127.0.0.1
in the torrc file.
Having looked at the relevant parts of the manual I’m wary of this but I have a firewall only letting in the ORPort port number, 443 and ssh, default reject all others. No one else has access to this server. So the metrics are only accessible when logged into the vps running the relay via ssh (very strong passphrase).
I could comment out that:
MetricsPort 127.0.0.1:9035
MetricsPortPolicy accept 127.0.0.1
and thus close that access when not using it (as per advice in the link in the OP) but then I’d have to pkill -sighup tor the process which I’d rather not do too often ‘cos … interrupting users.
If I would be better off with a different set up please let me know. This works but I’d be grateful for any advice.
Thanks, too, for the advice re. /var/log/tor/notices.log files. The relay process has added a new notices.log file with whatever permissions and ownership it chose, namely:
-rw-r----- 1 debian-tor
and running @Princess-Daisy ‘s test command returns OK (it is on Debian).