]>
Commit | Line | Data |
---|---|---|
e820134d IB |
1 | { config, pkgs, resources, ... }: |
2 | { | |
34abd6af IB |
3 | deployment = { |
4 | targetUser = "root"; | |
5 | targetHost = config.hostEnv.ips.main.ip4; | |
6 | substituteOnDestination = true; | |
7 | }; | |
282c67a1 IB |
8 | # ssh-keyscan monitoring-1 | nix-shell -p ssh-to-age --run ssh-to-age |
9 | secrets.ageKeys = [ "age1dn4lzhgxusqrpjjnzm7w8ml39ptf326htuzmpqdqs2gg3wq7cqzqxuvx8k" ]; | |
e820134d | 10 | boot.kernelPackages = pkgs.linuxPackages_latest; |
282c67a1 | 11 | myEnv = import ../../../nixops/secrets/environment.nix; |
e820134d | 12 | |
34abd6af | 13 | imports = [ <nixpkgs/nixos/modules/profiles/qemu-guest.nix> ] ++ builtins.attrValues (import ../..); |
e820134d IB |
14 | |
15 | myServices.monitoring.enable = true; | |
16 | myServices.monitoring.master = true; | |
17 | myServices.status.enable = true; | |
18 | networking = { | |
19 | firewall.enable = true; | |
20 | interfaces."ens3".ipv4.addresses = pkgs.lib.attrsets.mapAttrsToList | |
21 | (n: ips: { address = ips.ip4; prefixLength = 32; }) | |
619e4f46 | 22 | (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips); |
e820134d IB |
23 | interfaces."ens3".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList |
24 | (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) | |
619e4f46 | 25 | config.hostEnv.ips); |
e820134d IB |
26 | defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; |
27 | }; | |
34abd6af IB |
28 | boot.loader.grub.device = "nodev"; |
29 | fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; }; | |
e820134d IB |
30 | myServices.mailRelay.enable = true; |
31 | ||
171d8e1a IB |
32 | security.pki.certificateFiles = [ |
33 | (pkgs.fetchurl { | |
34 | url = "http://downloads.e.eriomem.net/eriomemca.pem"; | |
35 | sha256 = "1ixx4c6j3m26j8dp9a3dkvxc80v1nr5aqgmawwgs06bskasqkvvh"; | |
36 | }) | |
37 | ]; | |
38 | ||
e43fdf34 IB |
39 | services.netdata.enable = true; |
40 | services.netdata.config.web."allow dashboard from" = "localhost"; | |
41 | services.netdata.config.web."allow badges from" = "*"; | |
42 | services.netdata.config.web."allow streaming from" = "*"; | |
43 | services.netdata.config.web."allow netdata.conf from" = "fd*"; | |
44 | services.netdata.config.web."allow management from" = "fd*"; | |
45 | networking.firewall.allowedTCPPorts = [ 19999 ]; | |
0e374709 IB |
46 | environment.etc."netdata/stream.conf".source = "/var/secrets/netdata-stream.conf"; |
47 | ||
48 | secrets.keys = [ | |
49 | { | |
50 | dest = "netdata-stream.conf"; | |
51 | user = config.services.netdata.user; | |
52 | group = config.services.netdata.group; | |
53 | permissions = "0400"; | |
54 | text = builtins.concatStringsSep "\n" (pkgs.lib.mapAttrsToList (_: key: '' | |
55 | [${key}] | |
56 | enabled = yes | |
57 | default history = 3600 | |
58 | default memory = ram | |
59 | health enabled by default = auto | |
60 | '') config.myEnv.monitoring.netdata_keys); | |
61 | } | |
62 | ]; | |
63 | users.users."${config.services.netdata.user}".extraGroups = [ "keys" ]; | |
e820134d IB |
64 | # This value determines the NixOS release with which your system is |
65 | # to be compatible, in order to avoid breaking some software such as | |
66 | # database servers. You should change this only after NixOS release | |
67 | # notes say you should. | |
68 | # https://nixos.org/nixos/manual/release-notes.html | |
d43e0c61 | 69 | system.stateVersion = "20.03"; # Did you read the comment? |
e820134d | 70 | } |