Use common module

This commit is contained in:
pazpi 2025-01-08 14:33:52 +01:00
parent b48e25aa7d
commit ae24ddfe1a
9 changed files with 64 additions and 115 deletions

View file

@ -6,7 +6,10 @@
}:
{
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services.media-mgr = {
programs.enable = true;
@ -17,18 +20,8 @@
};
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
};
networking = {
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.05";
}

View file

@ -23,7 +23,10 @@ in
};
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services = {
@ -123,30 +126,15 @@ in
};
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
iperf3 = {
enable = true;
openFirewall = true;
};
prometheus.exporters = {
node = {
enable = true;
enabledCollectors = [ "systemd" ];
};
};
};
networking = {
firewall.allowedTCPPorts = [ 9100 ];
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.05";

View file

@ -6,6 +6,7 @@
}:
let
tailscaleMagicDNS = "neon-dory.ts.net";
defaultNodePort = toString config.services.prometheus.exporters.node.port;
in
{
@ -18,7 +19,10 @@ in
};
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services.media-mgr = {
exportMetrics.enable = true;
@ -47,39 +51,28 @@ in
};
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
prometheus.scrapeConfigs = [
{
job_name = "host-metrics";
static_configs = [
{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }
];
}
{
job_name = "host-caddy";
static_configs = [
{ targets = [ "caddy.internal:${toString config.services.prometheus.exporters.node.port}" ]; }
{
targets = [
"metrics.internal:${defaultNodePort}"
"caddy.internal:${defaultNodePort}"
"arr.internal:${defaultNodePort}"
"nextcloud.internal:${defaultNodePort}"
"vaultwarden.internal:${defaultNodePort}"
"plex.internal:${defaultNodePort}"
"portainer.internal:${defaultNodePort}"
];
}
];
}
];
prometheus.exporters = {
node = {
enable = true;
enabledCollectors = [ "systemd" ];
};
};
};
networking = {
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.05";

View file

@ -16,7 +16,10 @@
};
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services.nextcloud = {
enable = true;
@ -32,19 +35,8 @@
virtualisation.proxmox.enable = true;
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
};
networking = {
firewall.allowedTCPPorts = [ 80 ];
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.05";
}

View file

@ -6,7 +6,10 @@
}:
{
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services.plex = {
enable = true;
@ -22,18 +25,8 @@
virtualisation.proxmox.enable = true;
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
};
networking = {
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.11";
}

View file

@ -12,7 +12,10 @@ in
age.secrets.watchtowerSecrets.file = ../../secrets/watchtower-secrets.age;
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
virtualisation = {
proxmox.enable = true;
portainer = {
@ -23,18 +26,8 @@ in
};
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
};
networking = {
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.11";
}

View file

@ -9,7 +9,11 @@
age.secrets.vaultwarden-admin-pwd.file = ../../secrets/vaultwarden-admin-pwd.age;
my = {
utils.commons.enable = true;
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services.vaultwarden = {
enable = true;
adminPasswordFile = config.age.secrets.vaultwarden-admin-pwd.path;
@ -18,22 +22,8 @@
virtualisation.proxmox.enable = true;
};
time.timeZone = "Europe/Rome";
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
openssh.enable = true;
};
networking = {
firewall.allowedTCPPorts = [
80
443
];
nameservers = [ "192.168.1.2" ];
};
system.stateVersion = "24.11";
}