prometheus: format

This commit is contained in:
Sandro - 2023-09-15 23:00:05 +02:00
parent 4f8e8119b8
commit 93d428d98d
Signed by: sandro
GPG Key ID: 3AF5A43A3EECC2E5
1 changed files with 44 additions and 38 deletions

View File

@ -69,23 +69,23 @@
) )
(builtins.attrNames zwNets.${net}.hosts4); (builtins.attrNames zwNets.${net}.hosts4);
in in
[ { [{
targets = fromNet "serv" (_: true); targets = fromNet "serv" (_: true);
labels.__meta_net = "net-serv"; labels.__meta_net = "net-serv";
} { } {
targets = fromNet "flpk" (host: host != "flpk-gw"); targets = fromNet "flpk" (host: host != "flpk-gw");
labels.__meta_net = "net-flpk"; labels.__meta_net = "net-flpk";
} { } {
targets = fromNet "cluster" (host: builtins.elem host [ targets = fromNet "cluster" (host: builtins.elem host [
"server8" "server8"
"server9" "server9"
"server10" "server10"
]); ]);
labels.__meta_net = "net-flpk"; labels.__meta_net = "net-flpk";
} { } {
targets = [ "localhost:${toString config.services.prometheus.exporters.collectd.port}" ]; targets = [ "localhost:${toString config.services.prometheus.exporters.collectd.port}" ];
} { } {
targets = [ targets = [
# caveman: caveman-hunter # caveman: caveman-hunter
"${zwNets.flpk.hosts4.caveman}:9103" "${zwNets.flpk.hosts4.caveman}:9103"
# caveman: caveman-gatherer # caveman: caveman-gatherer
@ -93,7 +93,7 @@
# buzzrelay: buzzrelay # buzzrelay: buzzrelay
"relay.fedi.buzz" "relay.fedi.buzz"
]; ];
} ]; }];
}]; }];
exporters = { exporters = {
@ -111,46 +111,52 @@
webExternalUrl = "https://prometheus.serv.zentralwerk.org/"; webExternalUrl = "https://prometheus.serv.zentralwerk.org/";
}; };
services.alert2muc = { services = {
enable = true; alert2muc = {
configFile = config.sops.secrets."alert2muc/config".path; enable = true;
}; configFile = config.sops.secrets."alert2muc/config".path;
};
services.nginx = { nginx = {
enable = true; enable = true;
virtualHosts."prometheus.serv.zentralwerk.org" = { virtualHosts."prometheus.serv.zentralwerk.org" = {
# serverAliases = [ "registry.serv.zentralwerk.org" ]; # serverAliases = [ "registry.serv.zentralwerk.org" ];
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;
locations."/" = { locations = {
proxyPass = "http://localhost:${toString config.services.prometheus.port}"; "/" = {
extraConfig = '' proxyPass = "http://localhost:${toString config.services.prometheus.port}";
auth_basic "Prometheus"; extraConfig = ''
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path}; auth_basic "Prometheus";
''; auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
}; '';
locations."/alertmanager" = { };
proxyPass = "http://localhost:${toString config.services.prometheus.alertmanager.port}"; "/alertmanager" = {
extraConfig = '' proxyPass = "http://localhost:${toString config.services.prometheus.alertmanager.port}";
auth_basic "Prometheus"; extraConfig = ''
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path}; auth_basic "Prometheus";
''; auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
}; '';
locations."/alert2muc" = { };
proxyPass = "http://localhost:9022"; "/alert2muc" = {
extraConfig = '' proxyPass = "http://localhost:9022";
rewrite ^/alert2muc/(.*) /$1 break; extraConfig = ''
''; rewrite ^/alert2muc/(.*) /$1 break;
'';
};
};
}; };
}; };
}; };
sops = { sops = {
defaultSopsFile = ./secrets.yaml; defaultSopsFile = ./secrets.yaml;
secrets."nginx/httpAuth".owner = config.systemd.services.nginx.serviceConfig.User; secrets = {
secrets."alertmanager/xmpp-password".owner = config.systemd.services.prometheus-xmpp-alerts.serviceConfig.User; "nginx/httpAuth".owner = config.systemd.services.nginx.serviceConfig.User;
secrets."alert2muc/config".owner = config.services.alert2muc.user; "alertmanager/xmpp-password".owner = config.systemd.services.prometheus-xmpp-alerts.serviceConfig.User;
"alert2muc/config".owner = config.services.alert2muc.user;
};
}; };
system.stateVersion = "22.11"; system.stateVersion = "22.11";