1
0
Fork 0
nixfiles/hosts/palladium/configuration.nix

54 lines
1.4 KiB
Nix
Raw Normal View History

2021-04-30 23:36:48 +02:00
{ config, pkgs, ... }:
{
imports =
[
./hardware-configuration.nix
../../configuration/common
2021-12-07 19:31:17 +01:00
./backup-scripts.nix
2021-04-30 23:36:48 +02:00
];
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
networking.hostName = "palladium";
networking.useDHCP = false;
2022-05-26 10:54:01 +02:00
networking.interfaces.enp3s0.ipv6.addresses = [
{ address = "fd00:152:152:4::11"; prefixLength = 64; }
{ address = "2001:4cd8:100:1337::11"; prefixLength = 64; }
];
networking.defaultGateway6 = { address = "fe80::1"; interface = "enp3s0"; };
2022-01-11 19:48:43 +01:00
networking.nameservers = [ "fd00:152:152::1" ];
2021-04-30 23:36:48 +02:00
2021-05-01 13:01:08 +02:00
# Keeping the harddrives quiet
services.udev.extraRules = ''
KERNEL=="sd?[0-9]", ENV{ID_MODEL}=="ST1000DM003-1SB102", ACTION=="add", RUN+="${pkgs.hdparm}/sbin/hdparm -S 24 /dev/%k"
'';
2022-06-12 21:51:19 +02:00
services.borgbackup.repos = {
clerie-backup = {
path = "/mnt/palladium/clerie-backup";
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFyk716RnbenPMkhLolyIkU8ywUSg8x7hjsXFFQoJx4I root@clerie-backup"
];
};
external-drive = {
path = "/mnt/external-drive/clerie-backup";
authorizedKeysAppendOnly = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPuh74Esdp8JPgIZzM372DaCwtAl2QNtRratnIFG0NRB root@clerie-backup"
];
};
2021-05-07 16:26:24 +02:00
};
2021-04-30 23:54:43 +02:00
clerie.monitoring = {
enable = true;
id = "206";
pubkey = "fHOYNZ5I3E2JPrd9dUrNBmu75weX4KbDih5q+GCk8Xk=";
};
2021-04-30 23:36:48 +02:00
system.stateVersion = "21.03";
}