aboutsummaryrefslogtreecommitdiff
path: root/modules/monitoring/default.nix
blob: fe49c00faed53f8959a150ff673c5c8cbb076926 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
{ self, config, lib, pkgs, ... }:

with self.lib.nginx;
with self.lib.mon;
let exp = config.services.prometheus.exporters;
in {
  services.prometheus = {
    enable = true;
    enableReload = true;
    retentionTime = "14d";

    listenAddress = "10.10.0.1";
    webExternalUrl = "https://prometheus.vapor.systems";

    globalConfig = {
      scrape_interval = "10s";
    };

    scrapeConfigs = [
      (mkScrapeConfig "node" [ "ettves" "phaenn" "fra01" "nyc01" "sin01" ] exp.node.port)
      (mkScrapeConfig "zfs" [ "ettves" "phaenn" ] exp.zfs.port)
      (mkScrapeConfig "smartctl" [ "ettves" "phaenn" ] exp.smartctl.port)
      (mkScrapeConfig "nginx" [ "ettves" "phaenn" "fra01" "nyc01" "sin01" ] exp.nginx.port)
      
      (mkScrapeConfig "postgres" [ "ettves" ] exp.postgres.port)
      (mkScrapeConfig "quassel" [ "localhost" ] config.services.quassel.settings.metrics.port)

      { 
        job_name = "authentik"; 
        static_configs = [
          { targets = [ "ettves:9300" "ettves:9303" "ettves:9304" ]; }
        ]; 
        relabel_configs = relabelConfig;
      }
      
      (mkScrapeConfig "garage" [ "fra01" "nyc01" "sin01" ] 3903)
      (mkScrapeConfig "pdns" [ "ettves" "fra01" "nyc01" "sin01" ] 8081)
      
      (mkScrape "minecraft" [ "ettves:25585" "ettves:9150" ])
    ];
  };

  services.udev.extraRules = ''
    SUBSYSTEM=="nvme", KERNEL=="nvme[0-9]*", GROUP="disk"
  '';

  security.acme.certs = {
    "vapor.systems" = {
      extraDomainNames = [ "*.vapor.systems" ];
    };
  };

  services.nginx = {
    enable = true;
    virtualHosts = {
      "prometheus.vapor.systems" = (proxyDomainAuth "vapor.systems" "http://10.10.0.1:9090/");
    };
  };
}