nix/hosts/metrics/default.nix

94 lines
2.1 KiB
Nix

{
config,
pkgs,
lib,
...
}:
let
defaultNodePort = toString config.services.prometheus.exporters.node.port;
p = import ../parameters.nix;
in
{
age.secrets = {
exportarr-secrets.file = ../../secrets/exportarr-secrets.age;
tailscale-authKey.file = ../../secrets/tailscale-authKey.age;
grafana-admin-pwd = {
file = ../../secrets/grafana-admin-pwd.age;
owner = "grafana";
};
grafana-secret-auth = {
file = ../../secrets/grafana-secret-auth.age;
owner = "grafana";
};
};
my = {
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
services.media-mgr = {
exportMetrics = {
enable = true;
apiKeyFile = config.age.secrets.exportarr-secrets.path;
};
proxy.host = p.hosts.arr;
};
monitoring = {
grafana = {
enable = true;
adminPasswordFile = config.age.secrets.grafana-admin-pwd.path;
auth = {
enable = true;
baseUrl = "auth.${p.domains.public}";
sectetKeyFile = config.age.secrets.grafana-secret-auth.path;
};
proxy.domain = p.domains.public;
};
prometheus.enable = true;
loki.enable = true;
};
networking = {
tailscale = {
enable = true;
magicDNSDomain = p.domains.tsDns;
authKeyFile = config.age.secrets.tailscale-authKey.path;
};
};
virtualisation = {
proxmox.enable = true;
};
};
# Extra packages
environment.systemPackages = with pkgs; [ ];
services = {
prometheus.scrapeConfigs = [
{
job_name = "host-metrics";
static_configs = [
{
targets = [
"metrics.internal:${defaultNodePort}"
"caddy.internal:${defaultNodePort}"
"arr.internal:${defaultNodePort}"
"nextcloud.internal:${defaultNodePort}"
"vaultwarden.internal:${defaultNodePort}"
"plex.internal:${defaultNodePort}"
"portainer.internal:${defaultNodePort}"
];
}
];
}
];
};
system.stateVersion = "24.05";
}