Configure alertmanager
This commit is contained in:
parent
93806bd148
commit
442c02f13e
|
@ -1,12 +1,10 @@
|
||||||
{ zentralwerk, config, lib, ... }:
|
{ zentralwerk, config, lib, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
sops.defaultSopsFile = ./secrets.yaml;
|
|
||||||
|
|
||||||
networking = {
|
networking = {
|
||||||
hostName = "prometheus";
|
hostName = "prometheus";
|
||||||
firewall = {
|
firewall = {
|
||||||
allowedTCPPorts = [ 22 80 443 9090 9091 9093 9094 ];
|
allowedTCPPorts = [ /*22*/ 80 443 /*9090 9091 9093 9094*/ ];
|
||||||
enable = true;
|
enable = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -19,11 +17,11 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
webExternalUrl = "https://prometheus.serv.zentralwerk.org/alertmanager/";
|
webExternalUrl = "https://prometheus.serv.zentralwerk.org/alertmanager/";
|
||||||
listenAddress = "0.0.0.0";
|
listenAddress = "127.0.0.1";
|
||||||
configuration = {
|
configuration = {
|
||||||
"global" = {
|
"global" = {
|
||||||
"smtp_smarthost" = "mail.serv.zentralwerk.org:587";
|
# "smtp_smarthost" = "mail.serv.zentralwerk.org:587";
|
||||||
"smtp_from" = "alertmanager@prometheus.serv.zentralwerk.org";
|
# "smtp_from" = "alertmanager@prometheus.serv.zentralwerk.org";
|
||||||
};
|
};
|
||||||
"route" = {
|
"route" = {
|
||||||
"group_by" = [ "alertname" "alias" ];
|
"group_by" = [ "alertname" "alias" ];
|
||||||
|
@ -50,14 +48,42 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# alertmanagerURL = [ "https://prometheus.serv.zentralwerk.org/alertmanager/" ];
|
# pushgateway = {
|
||||||
|
# enable = true;
|
||||||
|
# web.external-url = "https://prometheus.serv.zentralwerk.org/push/";
|
||||||
|
# };
|
||||||
|
|
||||||
pushgateway = {
|
# rules = [{
|
||||||
enable = true;
|
# groups = [{
|
||||||
web.external-url = "https://prometheus.serv.zentralwerk.org/push/";
|
# alert = "oom_kills";
|
||||||
};
|
# expr = "increase(node_vmstat_oom_kill[7d]) > 0.999";
|
||||||
|
# for = "10m";
|
||||||
|
# labels = {
|
||||||
|
# severity = "error";
|
||||||
|
# };
|
||||||
|
# annotations = {
|
||||||
|
# summary = "Service gets oom killed";
|
||||||
|
# # description = "";
|
||||||
|
# };
|
||||||
|
# }];
|
||||||
|
# }];
|
||||||
|
|
||||||
scrapeConfigs = [ {
|
rules = [
|
||||||
|
''
|
||||||
|
groups:
|
||||||
|
- name: default
|
||||||
|
rules:
|
||||||
|
- alert: oom_kills
|
||||||
|
expr: increase(node_vmstat_oom_kill[7d]) > 0.999
|
||||||
|
for: 10m
|
||||||
|
labels:
|
||||||
|
severity: error
|
||||||
|
annotations:
|
||||||
|
summary: service gets oom killed
|
||||||
|
''
|
||||||
|
];
|
||||||
|
|
||||||
|
scrapeConfigs = [{
|
||||||
# TODO: authorization?
|
# TODO: authorization?
|
||||||
job_name = "node";
|
job_name = "node";
|
||||||
scrape_interval = "1m";
|
scrape_interval = "1m";
|
||||||
|
@ -65,31 +91,43 @@
|
||||||
let
|
let
|
||||||
zwNets = zentralwerk.lib.config.site.net;
|
zwNets = zentralwerk.lib.config.site.net;
|
||||||
fromNet = net: _:
|
fromNet = net: _:
|
||||||
map (host:
|
map
|
||||||
"${host}.${net}.zentralwerk.org:9100"
|
(host:
|
||||||
) (builtins.attrNames zwNets.${net}.hosts4);
|
"${host}.${net}.zentralwerk.org:9100"
|
||||||
in [ {
|
)
|
||||||
|
(builtins.attrNames zwNets.${net}.hosts4);
|
||||||
|
in
|
||||||
|
[{
|
||||||
targets =
|
targets =
|
||||||
fromNet "serv" (_: true);
|
fromNet "serv" (_: true);
|
||||||
labels.__meta_net = "net-serv";
|
labels.__meta_net = "net-serv";
|
||||||
} {
|
}
|
||||||
targets =
|
{
|
||||||
fromNet "flpk" (host: host != "flpk-gw");
|
targets =
|
||||||
labels.__meta_net = "net-flpk";
|
fromNet "flpk" (host: host != "flpk-gw");
|
||||||
} {
|
labels.__meta_net = "net-flpk";
|
||||||
targets =
|
}
|
||||||
fromNet "cluster" (host: builtins.elem host [
|
{
|
||||||
"server8" "server9" "server10"
|
targets =
|
||||||
]);
|
fromNet "cluster" (host: builtins.elem host [
|
||||||
labels.__meta_net = "net-flpk";
|
"server8"
|
||||||
} ];
|
"server9"
|
||||||
} ];
|
"server10"
|
||||||
|
]);
|
||||||
|
labels.__meta_net = "net-flpk";
|
||||||
|
}];
|
||||||
|
}];
|
||||||
|
|
||||||
exporters.collectd.enable = true;
|
exporters = {
|
||||||
exporters.collectd.openFirewall = true;
|
collectd = {
|
||||||
|
enable = true;
|
||||||
exporters.nginx.enable = true;
|
openFirewall = true;
|
||||||
exporters.nginx.openFirewall = true;
|
};
|
||||||
|
nginx = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
|
@ -100,7 +138,14 @@
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
locations."/" = {
|
locations."/" = {
|
||||||
proxyPass = "http://localhost:9090";
|
proxyPass = "http://localhost:${toString config.services.prometheus.port}";
|
||||||
|
extraConfig = ''
|
||||||
|
auth_basic "Prometheus";
|
||||||
|
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
locations."/alertmanager" = {
|
||||||
|
proxyPass = "http://localhost:${toString config.services.prometheus.alertmanager.port}";
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
auth_basic "Prometheus";
|
auth_basic "Prometheus";
|
||||||
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
|
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
|
||||||
|
@ -108,7 +153,11 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
sops.secrets."nginx/httpAuth".owner = config.systemd.services.nginx.serviceConfig.User;
|
|
||||||
|
|
||||||
system.stateVersion = "22.11"; # Did you read the comment?
|
sops = {
|
||||||
|
defaultSopsFile = ./secrets.yaml;
|
||||||
|
secrets."nginx/httpAuth".owner = config.systemd.services.nginx.serviceConfig.User;
|
||||||
|
};
|
||||||
|
|
||||||
|
system.stateVersion = "22.11";
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue