diff options
author | Ismaël Bouya <ismael.bouya@normalesup.org> | 2020-12-27 15:36:09 +0100 |
---|---|---|
committer | Ismaël Bouya <ismael.bouya@normalesup.org> | 2020-12-27 15:36:09 +0100 |
commit | 6ee7783682e977f3ceebfb5a8ee8ddd1db3f7cc6 (patch) | |
tree | 783f1331c900aa63575e1f1589b0659d75d928dd /modules/private/system/dilion.nix | |
parent | a0d2610c6d727095a43672f6285d907db9b9e2ff (diff) | |
download | Nix-6ee7783682e977f3ceebfb5a8ee8ddd1db3f7cc6.tar.gz Nix-6ee7783682e977f3ceebfb5a8ee8ddd1db3f7cc6.tar.zst Nix-6ee7783682e977f3ceebfb5a8ee8ddd1db3f7cc6.zip |
Add monitoring for dilion and quatresaisons
Diffstat (limited to 'modules/private/system/dilion.nix')
-rw-r--r-- | modules/private/system/dilion.nix | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/modules/private/system/dilion.nix b/modules/private/system/dilion.nix index 4e2a11f..b89b364 100644 --- a/modules/private/system/dilion.nix +++ b/modules/private/system/dilion.nix | |||
@@ -24,6 +24,8 @@ | |||
24 | "/boot/pass.key" = "/boot/pass.key"; | 24 | "/boot/pass.key" = "/boot/pass.key"; |
25 | }; | 25 | }; |
26 | kernel.sysctl."vm.nr_hugepages" = 256; # for xmr-stak | 26 | kernel.sysctl."vm.nr_hugepages" = 256; # for xmr-stak |
27 | # available in nixos-20.09 | ||
28 | #zfs.requestEncryptionCredentials = [ "zpool/root" ]; | ||
27 | }; | 29 | }; |
28 | nix.maxJobs = 8; | 30 | nix.maxJobs = 8; |
29 | powerManagement.cpuFreqGovernor = "powersave"; | 31 | powerManagement.cpuFreqGovernor = "powersave"; |
@@ -147,6 +149,7 @@ | |||
147 | nix.binaryCaches = [ "https://hydra.iohk.io" "https://cache.nixos.org" ]; | 149 | nix.binaryCaches = [ "https://hydra.iohk.io" "https://cache.nixos.org" ]; |
148 | nix.binaryCachePublicKeys = [ "hydra.iohk.io:f/Ea+s+dFdN+3Y/G+FDgSq+a5NEWhJGzdjvKNGv0/EQ=" ]; | 150 | nix.binaryCachePublicKeys = [ "hydra.iohk.io:f/Ea+s+dFdN+3Y/G+FDgSq+a5NEWhJGzdjvKNGv0/EQ=" ]; |
149 | 151 | ||
152 | myServices.monitoring.enable = true; | ||
150 | myServices.certificates.enable = true; | 153 | myServices.certificates.enable = true; |
151 | security.acme.certs."${name}" = { | 154 | security.acme.certs."${name}" = { |
152 | user = config.services.nginx.user; | 155 | user = config.services.nginx.user; |