274 lines
6.6 KiB
Nix
274 lines
6.6 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
hosts = (import ../../lib/hosts.nix { inherit pkgs; }).hosts;
|
|
|
|
monitoringHosts = filterAttrs (name: host:
|
|
attrByPath ["clerie" "monitoring" "enable"] false host.config)
|
|
hosts;
|
|
|
|
monitoringHostsNames = mapAttrs' (name: host:
|
|
nameValuePair "fd00:327:327:327::${host.config.clerie.monitoring.id}" ["${host.config.networking.hostName}.mon.clerie.de"])
|
|
monitoringHosts;
|
|
|
|
monitoringPeers = mapAttrsToList (name: host: {
|
|
allowedIPs = [ "fd00:327:327:327::${host.config.clerie.monitoring.id}/128" ];
|
|
publicKey = host.config.clerie.monitoring.pubkey;
|
|
})
|
|
monitoringHosts;
|
|
|
|
monitoringTargets = mapAttrsToList (name: host:
|
|
"${host.config.networking.hostName}.mon.clerie.de:9100")
|
|
monitoringHosts;
|
|
|
|
in {
|
|
imports =
|
|
[
|
|
./hardware-configuration.nix
|
|
../../configuration/common
|
|
../../configuration/proxmox-vm
|
|
];
|
|
|
|
boot.loader.grub.enable = true;
|
|
boot.loader.grub.version = 2;
|
|
boot.loader.grub.device = "/dev/sda";
|
|
|
|
networking.hostName = "monitoring-3";
|
|
|
|
networking.useDHCP = false;
|
|
networking.interfaces.ens18.ipv4.addresses = [ { address = "192.168.10.32"; prefixLength = 24; } ];
|
|
networking.interfaces.ens19.ipv6.addresses = [ { address = "2001:638:904:ffca::7"; prefixLength = 64; } ];
|
|
networking.defaultGateway = { address = "192.168.10.1"; interface = "ens18"; };
|
|
networking.defaultGateway6 = { address = "2001:638:904:ffca::1"; interface = "ens19"; };
|
|
networking.nameservers = [ "2001:638:904:ffcc::3" "2001:638:904:ffcc::4" "141.24.40.3" "141.24.40.4" ];
|
|
|
|
networking.hosts = {
|
|
"::1" = [ "monitoring-3.mon.clerie.de" ]; # fd00:327:327:327::1
|
|
}
|
|
// monitoringHostsNames;
|
|
|
|
networking.wireguard.enable = true;
|
|
networking.wireguard.interfaces = {
|
|
wg-monitoring = {
|
|
ips = [ "fd00:327:327:327::1/64" ];
|
|
listenPort = 54523;
|
|
peers = monitoringPeers;
|
|
privateKeyFile = "/var/src/secrets/wireguard/wg-monitoring";
|
|
};
|
|
};
|
|
|
|
networking.firewall.allowedUDPPorts = [ 54523 ];
|
|
|
|
services.prometheus.exporters.node.enable = true;
|
|
services.prometheus.exporters.smokeping = {
|
|
enable = true;
|
|
listenAddress = "[::1]";
|
|
port = 9374;
|
|
hosts = [
|
|
"clerie.de"
|
|
"fluorine.net.clerie.de"
|
|
"www.fem.tu-ilmenau.de"
|
|
"www.heise.de"
|
|
"212.218.154.100" # ie10-ffm1
|
|
];
|
|
};
|
|
|
|
services.prometheus.xmpp-alerts = {
|
|
enable = true;
|
|
settings = {
|
|
jid = "feuer@fem-net.de";
|
|
password_command = "cat /var/src/secrets/xmpp-alert/password";
|
|
listen_address = "::1";
|
|
listen_port = 9199;
|
|
to_jid = "clerie@fem-net.de";
|
|
format = "short";
|
|
};
|
|
};
|
|
|
|
services.prometheus.alertmanager = {
|
|
enable = true;
|
|
listenAddress = "[::1]";
|
|
port = 9093;
|
|
configuration = {
|
|
route = {
|
|
receiver = "xmpp-receiver";
|
|
group_by = [ "instance" ];
|
|
};
|
|
receivers = [
|
|
{
|
|
name = "xmpp-receiver";
|
|
webhook_configs = [
|
|
{
|
|
url = "http://[::1]:9199/alert";
|
|
}
|
|
];
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
services.prometheus = {
|
|
enable = true;
|
|
listenAddress = "[::1]";
|
|
scrapeConfigs = [
|
|
{
|
|
job_name = "prometheus";
|
|
scrape_interval = "20s";
|
|
scheme = "http";
|
|
static_configs = [
|
|
{
|
|
targets = [
|
|
"monitoring-3.mon.clerie.de:9090"
|
|
];
|
|
}
|
|
];
|
|
}
|
|
{
|
|
job_name = "node-exporter";
|
|
scrape_interval = "20s";
|
|
static_configs = [
|
|
{
|
|
targets = [
|
|
"monitoring-3.mon.clerie.de:9100"
|
|
]
|
|
++ monitoringTargets;
|
|
}
|
|
];
|
|
}
|
|
{
|
|
job_name = "zimmer-temp";
|
|
scrape_interval = "20s";
|
|
scheme = "https";
|
|
metrics_path = "/data/zimmer-temp/";
|
|
static_configs = [
|
|
{
|
|
targets = [
|
|
"iot-data.clerie.de"
|
|
];
|
|
}
|
|
];
|
|
}
|
|
{
|
|
job_name = "outdoor-temp";
|
|
scrape_interval = "20s";
|
|
scheme = "https";
|
|
metrics_path = "/data/outdoor-temp/";
|
|
static_configs = [
|
|
{
|
|
targets = [
|
|
"iot-data.clerie.de"
|
|
];
|
|
}
|
|
];
|
|
}
|
|
{
|
|
job_name = "xmpp-alerts";
|
|
scrape_interval = "20s";
|
|
static_configs = [
|
|
{
|
|
targets = [
|
|
"monitoring-3.mon.clerie.de:9199"
|
|
];
|
|
}
|
|
];
|
|
}
|
|
{
|
|
job_name = "smokeping";
|
|
scrape_interval = "20s";
|
|
static_configs = [
|
|
{
|
|
targets = [
|
|
"monitoring-3.mon.clerie.de:9374"
|
|
];
|
|
}
|
|
];
|
|
}
|
|
];
|
|
alertmanagers = [
|
|
{
|
|
static_configs = [ {
|
|
targets = [
|
|
"[::1]:9093"
|
|
];
|
|
} ];
|
|
}
|
|
];
|
|
rules = [ (readFile ./rules.yml) ];
|
|
};
|
|
|
|
services.grafana = {
|
|
enable = true;
|
|
domain = "grafana.monitoring.clerie.de";
|
|
rootUrl = "https://grafana.monitoring.clerie.de";
|
|
port = 3001;
|
|
addr = "::1";
|
|
auth.anonymous.enable = true;
|
|
|
|
provision = {
|
|
enable = true;
|
|
datasources = [
|
|
{
|
|
type = "prometheus";
|
|
name = "Prometheus";
|
|
url = "http://[::1]:9090";
|
|
isDefault = true;
|
|
}
|
|
];
|
|
dashboards = [
|
|
{
|
|
options.path = ./dashboards;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
users.users.uptimestatus = {
|
|
description = "Uptime Status Service";
|
|
group = "uptimestatus";
|
|
home = "/var/lib/uptimestatus/";
|
|
useDefaultShell = true;
|
|
isSystemUser = true;
|
|
};
|
|
users.groups.uptimestatus = {};
|
|
|
|
systemd.services.uptimestatus = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
RuntimeDirectory = "uptimestatus";
|
|
StateDirectory = "uptimestatus";
|
|
User = "uptimestatus";
|
|
Group = "uptimestatus";
|
|
};
|
|
script = "gunicorn -w 4 -b [::1]:8235 uptimestatus:app";
|
|
path = with pkgs; [ (python3.withPackages (ps: [ ps.gunicorn uptimestatus ])) ];
|
|
};
|
|
|
|
services.nginx = {
|
|
enable = true;
|
|
|
|
virtualHosts = {
|
|
"prometheus.monitoring.clerie.de" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
locations."/".proxyPass = "http://[::1]:9090/";
|
|
};
|
|
"grafana.monitoring.clerie.de" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
locations."/".proxyPass = "http://[::1]:3001/";
|
|
};
|
|
"status.monitoring.clerie.de" = {
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
locations."/".proxyPass = "http://[::1]:8235/";
|
|
};
|
|
};
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
|
|
|
system.stateVersion = "21.03";
|
|
}
|