]>
Commit | Line | Data |
---|---|---|
776aa360 | 1 | { config, pkgs, lib, resources, flakes, ... }: |
e820134d | 2 | { |
34abd6af IB |
3 | deployment = { |
4 | targetUser = "root"; | |
05becbbb | 5 | targetHost = lib.head config.hostEnv.ips.main.ip4; |
34abd6af | 6 | }; |
282c67a1 IB |
7 | # ssh-keyscan monitoring-1 | nix-shell -p ssh-to-age --run ssh-to-age |
8 | secrets.ageKeys = [ "age1dn4lzhgxusqrpjjnzm7w8ml39ptf326htuzmpqdqs2gg3wq7cqzqxuvx8k" ]; | |
e820134d | 9 | boot.kernelPackages = pkgs.linuxPackages_latest; |
282c67a1 | 10 | myEnv = import ../../../nixops/secrets/environment.nix; |
e820134d | 11 | |
776aa360 | 12 | imports = [ <nixpkgs/nixos/modules/profiles/qemu-guest.nix> ] ++ builtins.attrValues (import ../.. flakes); |
e820134d IB |
13 | |
14 | myServices.monitoring.enable = true; | |
15 | myServices.monitoring.master = true; | |
16 | myServices.status.enable = true; | |
17 | networking = { | |
18 | firewall.enable = true; | |
05becbbb IB |
19 | interfaces."ens3".ipv4.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList |
20 | (n: ips: map (ip: { address = ip; prefixLength = 32; }) (ips.ip4 or [])) | |
21 | (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips)); | |
e820134d IB |
22 | interfaces."ens3".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList |
23 | (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) | |
619e4f46 | 24 | config.hostEnv.ips); |
e820134d IB |
25 | defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; |
26 | }; | |
34abd6af IB |
27 | boot.loader.grub.device = "nodev"; |
28 | fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; }; | |
e820134d IB |
29 | myServices.mailRelay.enable = true; |
30 | ||
171d8e1a IB |
31 | security.pki.certificateFiles = [ |
32 | (pkgs.fetchurl { | |
33 | url = "http://downloads.e.eriomem.net/eriomemca.pem"; | |
34 | sha256 = "1ixx4c6j3m26j8dp9a3dkvxc80v1nr5aqgmawwgs06bskasqkvvh"; | |
35 | }) | |
36 | ]; | |
37 | ||
e43fdf34 | 38 | services.netdata.enable = true; |
120bcf4d | 39 | services.netdata.configDir."stream.conf" = config.secrets.fullPaths."netdata-stream.conf"; |
e43fdf34 IB |
40 | services.netdata.config.web."allow dashboard from" = "localhost"; |
41 | services.netdata.config.web."allow badges from" = "*"; | |
42 | services.netdata.config.web."allow streaming from" = "*"; | |
43 | services.netdata.config.web."allow netdata.conf from" = "fd*"; | |
44 | services.netdata.config.web."allow management from" = "fd*"; | |
45 | networking.firewall.allowedTCPPorts = [ 19999 ]; | |
0e374709 | 46 | |
4c4652aa IB |
47 | secrets.keys = { |
48 | "netdata-stream.conf" = { | |
0e374709 IB |
49 | user = config.services.netdata.user; |
50 | group = config.services.netdata.group; | |
51 | permissions = "0400"; | |
52 | text = builtins.concatStringsSep "\n" (pkgs.lib.mapAttrsToList (_: key: '' | |
53 | [${key}] | |
54 | enabled = yes | |
55 | default history = 3600 | |
56 | default memory = ram | |
57 | health enabled by default = auto | |
58 | '') config.myEnv.monitoring.netdata_keys); | |
4c4652aa IB |
59 | }; |
60 | }; | |
0e374709 | 61 | users.users."${config.services.netdata.user}".extraGroups = [ "keys" ]; |
e820134d IB |
62 | # This value determines the NixOS release with which your system is |
63 | # to be compatible, in order to avoid breaking some software such as | |
64 | # database servers. You should change this only after NixOS release | |
65 | # notes say you should. | |
66 | # https://nixos.org/nixos/manual/release-notes.html | |
d43e0c61 | 67 | system.stateVersion = "20.03"; # Did you read the comment? |
e820134d | 68 | } |