
* keep ./services for instances ./profiles is for config-only modules ./services are like profiles, but configure a single instance of a service. Those are fronted by Nginx as the load-balancer and have a DNS entry as well. * ci: build build03 as well * move hydra to services * move matterbridge to services * move marvin-mk2 to services * build01: share the remainder profiles * build02: use the nix-community-cache * fixup kexec * rename profiles to roles * README: sync with reality
82 lines
2.8 KiB
Nix
82 lines
2.8 KiB
Nix
{ pkgs, lib, config, ... }: let
|
|
isVM = lib.any (mod: mod == "xen-blkfront" || mod == "virtio_console") config.boot.initrd.kernelModules;
|
|
in {
|
|
config = {
|
|
systemd.services.telegraf.path = [ pkgs.nvme-cli ];
|
|
networking.firewall.allowedTCPPorts = [ 9273 ];
|
|
|
|
services.telegraf = {
|
|
enable = true;
|
|
extraConfig = {
|
|
agent.interval = "60s";
|
|
inputs = {
|
|
kernel_vmstat = {};
|
|
smart = lib.mkIf (!isVM) {
|
|
path = pkgs.writeShellScript "smartctl" ''
|
|
exec /run/wrappers/bin/sudo ${pkgs.smartmontools}/bin/smartctl "$@"
|
|
'';
|
|
};
|
|
system = {};
|
|
mem = {};
|
|
file = [{
|
|
data_format = "influx";
|
|
file_tag = "name";
|
|
files = [ "/var/log/telegraf/*" ];
|
|
}] ++ lib.optional (lib.any (fs: fs == "ext4") config.boot.supportedFilesystems) {
|
|
name_override = "ext4_errors";
|
|
files = [ "/sys/fs/ext4/*/errors_count" ];
|
|
data_format = "value";
|
|
};
|
|
exec = {
|
|
## Commands array
|
|
commands = [
|
|
(pkgs.runCommandNoCC "mdraid-health" {
|
|
buildInputs = [ pkgs.bash ];
|
|
} ''
|
|
install -m755 ${./mdraid-health.sh} $out
|
|
patchShebangs $out
|
|
'')
|
|
] ++ lib.optional (lib.any (fs: fs == "zfs") config.boot.supportedFilesystems) (pkgs.writeScript "zpool-health" ''
|
|
#!${pkgs.gawk}/bin/awk -f
|
|
BEGIN {
|
|
while ("${pkgs.zfs}/bin/zpool status" | getline) {
|
|
if ($1 ~ /pool:/) { printf "zpool_status,name=%s ", $2 }
|
|
if ($1 ~ /state:/) { printf " state=\"%s\",", $2 }
|
|
if ($1 ~ /errors:/) {
|
|
if (index($2, "No")) printf "errors=0i\n"; else printf "errors=%di\n", $2
|
|
}
|
|
}
|
|
}
|
|
'');
|
|
data_format = "influx";
|
|
};
|
|
systemd_units = {};
|
|
swap = {};
|
|
disk.tagdrop = {
|
|
fstype = [ "tmpfs" "ramfs" "devtmpfs" "devfs" "iso9660" "overlay" "aufs" "squashfs" ];
|
|
device = [ "rpc_pipefs" "lxcfs" "nsfs" "borgfs" ];
|
|
};
|
|
};
|
|
outputs.prometheus_client = {
|
|
listen = ":9273";
|
|
metric_version = 2;
|
|
};
|
|
};
|
|
};
|
|
security.sudo.extraRules = lib.mkIf (!isVM) [{
|
|
users = [ "telegraf" ];
|
|
commands = [ {
|
|
command = "${pkgs.smartmontools}/bin/smartctl";
|
|
options = [ "NOPASSWD" ];
|
|
}];
|
|
}];
|
|
# avoid logging sudo use
|
|
security.sudo.configFile = ''
|
|
Defaults:telegraf !syslog,!pam_session
|
|
'';
|
|
# create dummy file to avoid telegraf errors
|
|
systemd.tmpfiles.rules = [
|
|
"f /var/log/telegraf/dummy 0444 root root - -"
|
|
];
|
|
};
|
|
}
|