1
0
Fork 0
nix-config/hosts/prometheus/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

159 lines
4.2 KiB
Nix
Raw Normal View History

2022-12-04 08:53:28 +01:00
{ zentralwerk, config, lib, ... }:
{
deployment.mem = 1024;
2022-12-17 21:56:20 +01:00
networking = {
hostName = "prometheus";
firewall.allowedUDPPorts = [
# services.prometheus.exporters.collectd.collectdBinary
25826
];
};
services.prometheus = {
enable = true;
2022-11-27 01:48:03 +01:00
retentionTime = "7d";
alertmanager = {
enable = true;
2022-11-27 01:14:30 +01:00
webExternalUrl = "https://prometheus.serv.zentralwerk.org/alertmanager/";
2022-12-10 21:44:44 +01:00
listenAddress = "[::1]";
configuration = {
"route" = {
2022-12-10 21:44:44 +01:00
"group_by" = [ "instance" ];
"group_wait" = "1m";
"group_interval" = "1m";
2022-12-18 00:47:35 +01:00
"repeat_interval" = "7d";
"receiver" = "xmpp";
};
"receivers" = [{
"name" = "xmpp";
2022-12-17 21:56:07 +01:00
"webhook_configs" = [{
2022-12-18 03:19:40 +01:00
"url" = "http://127.0.0.1:9022/alert";
}];
}];
};
};
2022-12-10 21:44:44 +01:00
alertmanagers = [{
static_configs = [{
targets = [ "localhost:${toString config.services.prometheus.alertmanager.port}" ];
}];
path_prefix = "/alertmanager";
} {
static_configs = [{
2022-12-29 03:31:30 +01:00
# alert2muc
targets = [ "localhost:9022" ];
}];
2022-12-10 21:44:44 +01:00
}];
enableReload = true;
ruleFiles = [ ./rules.yaml ];
2022-12-10 20:08:03 +01:00
scrapeConfigs = [{
2022-11-27 01:48:03 +01:00
# TODO: authorization?
job_name = "node";
scrape_interval = "1m";
static_configs =
let
zwNets = zentralwerk.lib.config.site.net;
2022-12-04 08:53:28 +01:00
fromNet = net: _:
2022-12-10 20:08:03 +01:00
map
(host:
"${host}.${net}.zentralwerk.org:9100"
)
(builtins.attrNames zwNets.${net}.hosts4);
in
[ {
2022-12-19 23:21:54 +01:00
targets = fromNet "serv" (_: true);
2022-11-27 01:48:03 +01:00
labels.__meta_net = "net-serv";
} {
2022-12-19 23:21:54 +01:00
targets = fromNet "flpk" (host: host != "flpk-gw");
labels.__meta_net = "net-flpk";
} {
2022-12-19 23:21:54 +01:00
targets = fromNet "cluster" (host: builtins.elem host [
"server8"
"server9"
"server10"
]);
labels.__meta_net = "net-flpk";
} {
2022-12-10 21:44:44 +01:00
targets = [ "localhost:${toString config.services.prometheus.exporters.collectd.port}" ];
2022-12-20 03:15:30 +01:00
} {
2022-12-30 02:59:37 +01:00
targets = [
# caveman: caveman-hunter
"${zwNets.flpk.hosts4.caveman}:9101"
# caveman: caveman-gatherer
"fedi.buzz"
# buzzrelay: buzzrelay
"relay.fedi.buzz"
];
} ];
2022-12-10 20:08:03 +01:00
}];
2021-02-22 11:45:12 +01:00
2022-12-10 20:08:03 +01:00
exporters = {
collectd = {
enable = true;
collectdBinary.enable = true;
2022-12-10 20:08:03 +01:00
};
2022-12-10 21:44:44 +01:00
# TODO: deploy with every nginx
2022-12-10 20:08:03 +01:00
nginx = {
enable = true;
openFirewall = true;
};
};
2022-12-10 21:44:44 +01:00
webExternalUrl = "https://prometheus.serv.zentralwerk.org/";
2022-12-17 00:47:47 +01:00
};
2022-12-10 21:44:44 +01:00
2022-12-17 00:47:47 +01:00
services.alert2muc = {
enable = true;
configFile = config.sops.secrets."alert2muc/config".path;
};
services.nginx = {
enable = true;
virtualHosts."prometheus.serv.zentralwerk.org" = {
# serverAliases = [ "registry.serv.zentralwerk.org" ];
enableACME = true;
2022-11-27 01:14:30 +01:00
forceSSL = true;
locations."/" = {
2022-12-10 20:08:03 +01:00
proxyPass = "http://localhost:${toString config.services.prometheus.port}";
extraConfig = ''
auth_basic "Prometheus";
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
'';
};
locations."/alertmanager" = {
proxyPass = "http://localhost:${toString config.services.prometheus.alertmanager.port}";
2022-11-27 01:14:30 +01:00
extraConfig = ''
auth_basic "Prometheus";
auth_basic_user_file ${config.sops.secrets."nginx/httpAuth".path};
'';
};
2022-12-29 03:31:30 +01:00
locations."/alert2muc" = {
proxyPass = "http://localhost:9022";
extraConfig = ''
rewrite ^/alert2muc/(.*) /$1 break;
'';
2022-12-29 03:31:30 +01:00
};
};
};
2022-12-10 20:08:03 +01:00
sops = {
defaultSopsFile = ./secrets.yaml;
secrets."nginx/httpAuth".owner = config.systemd.services.nginx.serviceConfig.User;
2022-12-10 21:44:44 +01:00
secrets."alertmanager/xmpp-password".owner = config.systemd.services.prometheus-xmpp-alerts.serviceConfig.User;
2022-12-17 00:47:47 +01:00
secrets."alert2muc/config".owner = config.services.alert2muc.user;
2022-12-10 20:08:03 +01:00
};
system.stateVersion = "22.11";
2022-12-10 21:44:44 +01:00
systemd.services.prometheus-xmpp-alerts.serviceConfig = {
DynamicUser = lib.mkForce false;
User = "prometheus";
};
}