diff options
Diffstat (limited to 'modules/private/monitoring')
-rw-r--r-- | modules/private/monitoring/default.nix | 4 | ||||
-rw-r--r-- | modules/private/monitoring/status.nix | 2 |
2 files changed, 3 insertions, 3 deletions
diff --git a/modules/private/monitoring/default.nix b/modules/private/monitoring/default.nix index a1f4b3f..2c2f693 100644 --- a/modules/private/monitoring/default.nix +++ b/modules/private/monitoring/default.nix | |||
@@ -85,7 +85,7 @@ let | |||
85 | masterObjects = pkgs.callPackage ./objects_master.nix { inherit config; }; | 85 | masterObjects = pkgs.callPackage ./objects_master.nix { inherit config; }; |
86 | commonObjects = pkgs.callPackage ./objects_common.nix ({ | 86 | commonObjects = pkgs.callPackage ./objects_common.nix ({ |
87 | master = cfg.master; | 87 | master = cfg.master; |
88 | hostFQDN = config.hostEnv.FQDN; | 88 | hostFQDN = config.hostEnv.fqdn; |
89 | hostName = name; | 89 | hostName = name; |
90 | sudo = "/run/wrappers/bin/sudo"; | 90 | sudo = "/run/wrappers/bin/sudo"; |
91 | } // builtins.getAttr name commonConfig); | 91 | } // builtins.getAttr name commonConfig); |
@@ -97,7 +97,7 @@ let | |||
97 | (builtins.pathExists specific_file) | 97 | (builtins.pathExists specific_file) |
98 | (pkgs.callPackage specific_file { | 98 | (pkgs.callPackage specific_file { |
99 | inherit config; | 99 | inherit config; |
100 | hostFQDN = config.hostEnv.FQDN; | 100 | hostFQDN = config.hostEnv.fqdn; |
101 | hostName = name; | 101 | hostName = name; |
102 | }); | 102 | }); |
103 | in | 103 | in |
diff --git a/modules/private/monitoring/status.nix b/modules/private/monitoring/status.nix index ed4d681..d25d934 100644 --- a/modules/private/monitoring/status.nix +++ b/modules/private/monitoring/status.nix | |||
@@ -37,7 +37,7 @@ | |||
37 | security.acme.certs."${name}".extraDomains."status.immae.eu" = null; | 37 | security.acme.certs."${name}".extraDomains."status.immae.eu" = null; |
38 | 38 | ||
39 | myServices.certificates.enable = true; | 39 | myServices.certificates.enable = true; |
40 | networking.firewall.allowedTCPPorts = [ 80 443 18000 ]; | 40 | networking.firewall.allowedTCPPorts = [ 80 443 ]; |
41 | systemd.services.naemon-status = { | 41 | systemd.services.naemon-status = { |
42 | description = "Naemon status"; | 42 | description = "Naemon status"; |
43 | after = [ "network.target" ]; | 43 | after = [ "network.target" ]; |