X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fmonitoring-1.nix;h=2198d09fc3f480b7045284d3f2019ff1c3ff4a91;hb=0c67c58418d0b69135109765226e31137bd13c0a;hp=7581c01e523afaff07c0f0162f6126480c2fe15d;hpb=d43e0c61af84940447dbcdd1deac848328dde46d;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/monitoring-1.nix b/modules/private/system/monitoring-1.nix index 7581c01..2198d09 100644 --- a/modules/private/system/monitoring-1.nix +++ b/modules/private/system/monitoring-1.nix @@ -1,20 +1,15 @@ { privateFiles }: { config, pkgs, resources, ... }: { + deployment = { + targetUser = "root"; + targetHost = config.hostEnv.ips.main.ip4; + substituteOnDestination = true; + }; boot.kernelPackages = pkgs.linuxPackages_latest; myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; - imports = builtins.attrValues (import ../..); - - deployment = { - targetEnv = "hetznerCloud"; - hetznerCloud = { - authToken = config.myEnv.hetznerCloud.authToken; - datacenter = "hel1-dc2"; - location ="hel1"; - serverType = "cx11"; - }; - }; + imports = [ ] ++ builtins.attrValues (import ../..); myServices.monitoring.enable = true; myServices.monitoring.master = true; @@ -29,8 +24,42 @@ config.hostEnv.ips); defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; }; + boot.loader.grub.device = "nodev"; + fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; }; myServices.mailRelay.enable = true; + security.pki.certificateFiles = [ + (pkgs.fetchurl { + url = "http://downloads.e.eriomem.net/eriomemca.pem"; + sha256 = "1ixx4c6j3m26j8dp9a3dkvxc80v1nr5aqgmawwgs06bskasqkvvh"; + }) + ]; + + services.netdata.enable = true; + services.netdata.config.web."allow dashboard from" = "localhost"; + services.netdata.config.web."allow badges from" = "*"; + services.netdata.config.web."allow streaming from" = "*"; + services.netdata.config.web."allow netdata.conf from" = "fd*"; + services.netdata.config.web."allow management from" = "fd*"; + networking.firewall.allowedTCPPorts = [ 19999 ]; + environment.etc."netdata/stream.conf".source = "/var/secrets/netdata-stream.conf"; + + secrets.keys = [ + { + dest = "netdata-stream.conf"; + user = config.services.netdata.user; + group = config.services.netdata.group; + permissions = "0400"; + text = builtins.concatStringsSep "\n" (pkgs.lib.mapAttrsToList (_: key: '' + [${key}] + enabled = yes + default history = 3600 + default memory = ram + health enabled by default = auto + '') config.myEnv.monitoring.netdata_keys); + } + ]; + users.users."${config.services.netdata.user}".extraGroups = [ "keys" ]; # This value determines the NixOS release with which your system is # to be compatible, in order to avoid breaking some software such as # database servers. You should change this only after NixOS release