2023-07-01 19:12:36 +02:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.shb.monitoring;
|
2023-07-16 00:09:54 +02:00
|
|
|
|
|
|
|
fqdn = "${cfg.subdomain}.${cfg.domain}";
|
2023-07-01 19:12:36 +02:00
|
|
|
in
|
|
|
|
{
|
|
|
|
options.shb.monitoring = {
|
|
|
|
enable = lib.mkEnableOption "selfhostblocks.monitoring";
|
|
|
|
|
|
|
|
# sopsFile = lib.mkOption {
|
|
|
|
# type = lib.types.path;
|
|
|
|
# description = "Sops file location";
|
|
|
|
# example = "secrets/monitoring.yaml";
|
|
|
|
# };
|
2023-07-16 00:09:54 +02:00
|
|
|
|
|
|
|
subdomain = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "Subdomain under which home-assistant will be served.";
|
|
|
|
example = "grafana";
|
|
|
|
};
|
|
|
|
|
|
|
|
domain = lib.mkOption {
|
|
|
|
type = lib.types.str;
|
|
|
|
description = "domain under which home-assistant will be served.";
|
|
|
|
example = "mydomain.com";
|
|
|
|
};
|
2023-08-25 18:41:36 +02:00
|
|
|
|
|
|
|
debugLog = lib.mkOption {
|
|
|
|
type = lib.types.bool;
|
|
|
|
description = "Set to true to enable debug logging of the infrastructure serving Grafana.";
|
|
|
|
default = false;
|
|
|
|
example = true;
|
|
|
|
};
|
2023-07-01 19:12:36 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
config = lib.mkIf cfg.enable {
|
|
|
|
services.postgresql = {
|
|
|
|
enable = true;
|
|
|
|
ensureDatabases = [ "grafana" ];
|
|
|
|
ensureUsers = [
|
|
|
|
{
|
|
|
|
name = "grafana";
|
|
|
|
ensurePermissions = {
|
|
|
|
"DATABASE grafana" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
ensureClauses = {
|
|
|
|
"login" = true;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
services.grafana = {
|
|
|
|
enable = true;
|
|
|
|
|
|
|
|
settings = {
|
2023-07-16 00:09:54 +02:00
|
|
|
database = {
|
|
|
|
host = "/run/postgresql";
|
|
|
|
user = "grafana";
|
|
|
|
name = "grafana";
|
|
|
|
type = "postgres";
|
|
|
|
# Uses peer auth for local users, so we don't need a password.
|
|
|
|
# Here's the syntax anyway for future refence:
|
|
|
|
# password = "$__file{/run/secrets/homeassistant/dbpass}";
|
|
|
|
};
|
|
|
|
|
2023-07-01 19:12:36 +02:00
|
|
|
server = {
|
|
|
|
http_addr = "127.0.0.1";
|
|
|
|
http_port = 3000;
|
2023-07-16 00:09:54 +02:00
|
|
|
domain = fqdn;
|
|
|
|
root_url = "https://${fqdn}";
|
2023-08-25 18:41:36 +02:00
|
|
|
router_logging = cfg.debugLog;
|
2023-07-01 19:12:36 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2023-07-16 00:09:54 +02:00
|
|
|
services.prometheus = {
|
|
|
|
enable = true;
|
|
|
|
port = 3001;
|
|
|
|
};
|
|
|
|
|
|
|
|
services.nginx = {
|
|
|
|
enable = true;
|
|
|
|
|
|
|
|
virtualHosts.${fqdn} = {
|
2023-08-12 00:53:05 +02:00
|
|
|
forceSSL = true;
|
2023-07-16 00:09:54 +02:00
|
|
|
sslCertificate = "/var/lib/acme/${cfg.domain}/cert.pem";
|
|
|
|
sslCertificateKey = "/var/lib/acme/${cfg.domain}/key.pem";
|
|
|
|
locations."/" = {
|
2023-08-14 01:11:23 +02:00
|
|
|
proxyPass = "http://${toString config.services.grafana.settings.server.http_addr}:${toString config.services.grafana.settings.server.http_port}";
|
2023-07-16 00:09:54 +02:00
|
|
|
proxyWebsockets = true;
|
2023-07-01 19:12:36 +02:00
|
|
|
};
|
|
|
|
};
|
2023-07-16 00:09:54 +02:00
|
|
|
};
|
|
|
|
|
2023-07-30 07:14:38 +02:00
|
|
|
services.prometheus.scrapeConfigs = [
|
|
|
|
{
|
|
|
|
job_name = "node";
|
|
|
|
static_configs = [
|
|
|
|
{
|
2023-09-26 07:55:41 +02:00
|
|
|
targets = ["127.0.0.1:${toString config.services.prometheus.exporters.node.port}"];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
}
|
|
|
|
{
|
|
|
|
job_name = "smartctl";
|
|
|
|
static_configs = [
|
|
|
|
{
|
|
|
|
targets = ["127.0.0.1:${toString config.services.prometheus.exporters.smartctl.port}"];
|
2023-07-30 07:14:38 +02:00
|
|
|
}
|
|
|
|
];
|
|
|
|
}
|
2023-08-25 18:41:54 +02:00
|
|
|
{
|
|
|
|
job_name = "prometheus_internal";
|
|
|
|
static_configs = [
|
|
|
|
{
|
|
|
|
targets = ["127.0.0.1:${toString config.services.prometheus.port}"];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
}
|
2023-07-30 07:14:38 +02:00
|
|
|
] ++ (lib.lists.optional config.services.nginx.enable {
|
2023-07-16 00:09:54 +02:00
|
|
|
job_name = "nginx";
|
|
|
|
static_configs = [
|
2023-07-01 19:12:36 +02:00
|
|
|
{
|
2023-09-26 07:55:41 +02:00
|
|
|
targets = ["127.0.0.1:${toString config.services.prometheus.exporters.nginx.port}"];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
# }) ++ (lib.optional (builtins.length (lib.attrNames config.services.redis.servers) > 0) {
|
|
|
|
# job_name = "redis";
|
|
|
|
# static_configs = [
|
|
|
|
# {
|
|
|
|
# targets = ["127.0.0.1:${toString config.services.prometheus.exporters.redis.port}"];
|
|
|
|
# }
|
|
|
|
# ];
|
|
|
|
# }) ++ (lib.optional (builtins.length (lib.attrNames config.services.openvpn.servers) > 0) {
|
|
|
|
# job_name = "openvpn";
|
|
|
|
# static_configs = [
|
|
|
|
# {
|
|
|
|
# targets = ["127.0.0.1:${toString config.services.prometheus.exporters.openvpn.port}"];
|
|
|
|
# }
|
|
|
|
# ];
|
|
|
|
}) ++ (lib.optional config.services.dnsmasq.enable {
|
|
|
|
job_name = "dnsmasq";
|
|
|
|
static_configs = [
|
|
|
|
{
|
|
|
|
targets = ["127.0.0.1:${toString config.services.prometheus.exporters.dnsmasq.port}"];
|
2023-07-01 19:12:36 +02:00
|
|
|
}
|
|
|
|
];
|
2023-09-26 07:55:41 +02:00
|
|
|
});
|
2023-07-16 00:09:54 +02:00
|
|
|
services.prometheus.exporters.nginx = lib.mkIf config.services.nginx.enable {
|
|
|
|
enable = true;
|
|
|
|
port = 9113;
|
|
|
|
listenAddress = "127.0.0.1";
|
|
|
|
scrapeUri = "http://localhost:80/nginx_status";
|
2023-07-01 19:12:36 +02:00
|
|
|
};
|
2023-07-30 07:14:38 +02:00
|
|
|
services.prometheus.exporters.node = {
|
|
|
|
enable = true;
|
|
|
|
enabledCollectors = ["systemd"];
|
|
|
|
port = 9115;
|
|
|
|
listenAddress = "127.0.0.1";
|
|
|
|
};
|
2023-09-26 07:55:41 +02:00
|
|
|
services.prometheus.exporters.smartctl = {
|
|
|
|
enable = true;
|
|
|
|
port = 9117;
|
|
|
|
listenAddress = "127.0.0.1";
|
|
|
|
};
|
|
|
|
# services.prometheus.exporters.redis = lib.mkIf (builtins.length (lib.attrNames config.services.redis.servers) > 0) {
|
|
|
|
# enable = true;
|
|
|
|
# port = 9119;
|
|
|
|
# listenAddress = "127.0.0.1";
|
|
|
|
# };
|
|
|
|
# services.prometheus.exporters.openvpn = lib.mkIf (builtins.length (lib.attrNames config.services.openvpn.servers) > 0) {
|
|
|
|
# enable = true;
|
|
|
|
# port = 9121;
|
|
|
|
# listenAddress = "127.0.0.1";
|
|
|
|
# statusPaths = lib.mapAttrsToList (name: _config: "/tmp/openvpn/${name}.status") config.services.openvpn.servers;
|
|
|
|
# };
|
|
|
|
services.prometheus.exporters.dnsmasq = lib.mkIf config.services.dnsmasq.enable {
|
|
|
|
enable = true;
|
|
|
|
port = 9123;
|
|
|
|
listenAddress = "127.0.0.1";
|
|
|
|
};
|
2023-07-16 00:09:54 +02:00
|
|
|
services.nginx.statusPage = lib.mkDefault config.services.nginx.enable;
|
2023-07-01 19:12:36 +02:00
|
|
|
|
|
|
|
# sops.secrets."grafana" = {
|
|
|
|
# inherit (cfg) sopsFile;
|
|
|
|
# mode = "0440";
|
|
|
|
# owner = "grafana";
|
|
|
|
# group = "grafana";
|
|
|
|
# # path = "${config.services.home-assistant.configDir}/secrets.yaml";
|
|
|
|
# restartUnits = [ "grafana.service" ];
|
|
|
|
# };
|
|
|
|
};
|
|
|
|
}
|