X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Fsystem%2Fmonitoring-1.nix;h=e335080b88d66fda0163e86583215114b5f3aa5c;hb=bd5c5d4e23ebd3863a960976767ed4a83dfd07fe;hp=20c12df8867a5729767a83994d80b8a1d393947c;hpb=619e4f46adc15e409122c4e0fa0e0a0b811bb32f;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/system/monitoring-1.nix b/modules/private/system/monitoring-1.nix index 20c12df..e335080 100644 --- a/modules/private/system/monitoring-1.nix +++ b/modules/private/system/monitoring-1.nix @@ -1,20 +1,16 @@ -{ privateFiles }: { config, pkgs, resources, ... }: { - boot.kernelPackages = pkgs.linuxPackages_latest; - myEnv = import "${privateFiles}/environment.nix" // { inherit privateFiles; }; - - imports = builtins.attrValues (import ../..); - deployment = { - targetEnv = "hetznerCloud"; - hetznerCloud = { - authToken = config.myEnv.hetznerCloud.authToken; - datacenter = "hel1-dc2"; - location ="hel1"; - serverType = "cx11"; - }; + targetUser = "root"; + targetHost = config.hostEnv.ips.main.ip4; + substituteOnDestination = true; }; + # ssh-keyscan monitoring-1 | nix-shell -p ssh-to-age --run ssh-to-age + secrets.ageKeys = [ "age1dn4lzhgxusqrpjjnzm7w8ml39ptf326htuzmpqdqs2gg3wq7cqzqxuvx8k" ]; + boot.kernelPackages = pkgs.linuxPackages_latest; + myEnv = import ../../../nixops/secrets/environment.nix; + + imports = [ ] ++ builtins.attrValues (import ../..); myServices.monitoring.enable = true; myServices.monitoring.master = true; @@ -29,12 +25,46 @@ config.hostEnv.ips); defaultGateway6 = { address = "fe80::1"; interface = "ens3"; }; }; + boot.loader.grub.device = "nodev"; + fileSystems."/" = { device = "/dev/sda1"; fsType = "ext4"; }; myServices.mailRelay.enable = true; + security.pki.certificateFiles = [ + (pkgs.fetchurl { + url = "http://downloads.e.eriomem.net/eriomemca.pem"; + sha256 = "1ixx4c6j3m26j8dp9a3dkvxc80v1nr5aqgmawwgs06bskasqkvvh"; + }) + ]; + + services.netdata.enable = true; + services.netdata.config.web."allow dashboard from" = "localhost"; + services.netdata.config.web."allow badges from" = "*"; + services.netdata.config.web."allow streaming from" = "*"; + services.netdata.config.web."allow netdata.conf from" = "fd*"; + services.netdata.config.web."allow management from" = "fd*"; + networking.firewall.allowedTCPPorts = [ 19999 ]; + environment.etc."netdata/stream.conf".source = "/var/secrets/netdata-stream.conf"; + + secrets.keys = [ + { + dest = "netdata-stream.conf"; + user = config.services.netdata.user; + group = config.services.netdata.group; + permissions = "0400"; + text = builtins.concatStringsSep "\n" (pkgs.lib.mapAttrsToList (_: key: '' + [${key}] + enabled = yes + default history = 3600 + default memory = ram + health enabled by default = auto + '') config.myEnv.monitoring.netdata_keys); + } + ]; + users.users."${config.services.netdata.user}".extraGroups = [ "keys" ]; # This value determines the NixOS release with which your system is # to be compatible, in order to avoid breaking some software such as # database servers. You should change this only after NixOS release # notes say you should. # https://nixos.org/nixos/manual/release-notes.html - system.stateVersion = "19.03"; # Did you read the comment? + system.stateVersion = "20.03"; # Did you read the comment? }