feat(yate): add snmp monitoring
This commit is contained in:
@@ -40,6 +40,7 @@
|
||||
enable = true;
|
||||
ruleset = let
|
||||
tcpPorts = lib.concatStringsSep ", " (map toString config.networking.firewall.allowedTCPPorts);
|
||||
udpPorts = lib.concatStringsSep ", " (map toString config.networking.firewall.allowedUDPPorts);
|
||||
in ''
|
||||
table inet filter {
|
||||
chain input {
|
||||
@@ -55,6 +56,7 @@
|
||||
|
||||
tcp dport 22 accept
|
||||
tcp dport { ${tcpPorts} } accept
|
||||
udp dport { ${udpPorts} } accept
|
||||
|
||||
ip saddr { 10.42.10.6, 217.10.68.150 } accept
|
||||
ip6 saddr { 2a01:4f8:1c0c:8221::6, 2001:ab7::0/64 } accept
|
||||
|
@@ -15,9 +15,15 @@
|
||||
ysipchan.general = {
|
||||
ignorevia = "yes";
|
||||
};
|
||||
ysnmpagent = {
|
||||
general.port = 161;
|
||||
snmp_v2.ro_community = "yate";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
networking.firewall.allowedUDPPorts = [ 161 ];
|
||||
|
||||
sops.secrets.sipgate_password = {
|
||||
owner = "yate";
|
||||
restartUnits = [ "yate.service" ];
|
||||
|
Reference in New Issue
Block a user