303 lines
8.7 KiB
Nix
303 lines
8.7 KiB
Nix
{ config
|
|
, lib
|
|
, pkgs
|
|
, ... }:
|
|
|
|
let
|
|
cfg = config.server;
|
|
synapseMetricsPort = 8009;
|
|
synapseMetricsAddr = "127.0.0.1";
|
|
collectListeners = names:
|
|
map
|
|
(x: "127.0.0.1:${toString x.port}")
|
|
(builtins.attrValues
|
|
(lib.filterAttrs (k: v: builtins.elem k names && v.enable) config.services.prometheus.exporters));
|
|
in {
|
|
# a bunch of services for personal use not intended for the public
|
|
services.grafana = {
|
|
enable = true;
|
|
settings = {
|
|
"auth.basic".enabled = false;
|
|
# nginx login is used so this is fine, hopefully
|
|
"auth.anonymous" = {
|
|
enabled = true;
|
|
# org_role = "Admin";
|
|
};
|
|
server.root_url = "https://home.${cfg.domainName}/grafana/";
|
|
server.domain = "home.${cfg.domainName}";
|
|
server.http_addr = "127.0.0.1";
|
|
server.protocol = "socket";
|
|
security.admin_user = "chayleaf";
|
|
security.admin_password = "$__file{/secrets/grafana_password_file}";
|
|
security.secret_key = "$__file{/secrets/grafana_key_file}";
|
|
};
|
|
};
|
|
services.nginx.upstreams.grafana.servers."unix:/${config.services.grafana.settings.server.socket}" = {};
|
|
|
|
services.nginx.virtualHosts."home.${cfg.domainName}" = {
|
|
quic = true;
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
basicAuthFile = "/secrets/home_password";
|
|
extraConfig = ''
|
|
satisfy any;
|
|
${lib.optionalString (cfg.lanCidrV4 != "0.0.0.0/0") "allow ${cfg.lanCidrV4};"}
|
|
${lib.optionalString (cfg.lanCidrV6 != "::/0") "allow ${cfg.lanCidrV6};"}
|
|
deny all;
|
|
'';
|
|
# locations."/.well-known/acme-challenge".extraConfig = "auth_basic off;";
|
|
locations."/".root = "/var/www/home.${cfg.domainName}/";
|
|
locations."/grafana/" = {
|
|
proxyPass = "http://grafana/";
|
|
proxyWebsockets = true;
|
|
};
|
|
locations."/grafana/public/".alias = "${config.services.grafana.settings.server.static_root_path}/";
|
|
};
|
|
services.nginx.virtualHosts."hydra.${cfg.domainName}" = {
|
|
quic = true;
|
|
enableACME = true;
|
|
forceSSL = true;
|
|
basicAuthFile = "/secrets/home_password";
|
|
extraConfig = ''
|
|
satisfy any;
|
|
${lib.optionalString (cfg.lanCidrV4 != "0.0.0.0/0") "allow ${cfg.lanCidrV4};"}
|
|
${lib.optionalString (cfg.lanCidrV6 != "::/0") "allow ${cfg.lanCidrV6};"}
|
|
deny all;
|
|
'';
|
|
locations."/".proxyPass = "http://${lib.quoteListenAddr config.services.hydra.listenHost}:${toString config.services.hydra.port}/";
|
|
locations."/static/".root = "${config.services.hydra.package}/libexec/hydra/root/";
|
|
};
|
|
users.users.nginx.extraGroups = [ "grafana" ];
|
|
|
|
services.nix-serve = {
|
|
enable = true;
|
|
package = pkgs.nix-serve-ng.override {
|
|
nix = config.nix.package;
|
|
};
|
|
bindAddress = "127.0.0.1";
|
|
secretKeyFile = "/secrets/cache-priv-key.pem";
|
|
};
|
|
nix.settings.allowed-users = [ "nix-serve" "hydra" ];
|
|
services.nginx.virtualHosts."binarycache.${cfg.domainName}" = {
|
|
quic = true;
|
|
enableACME = true;
|
|
addSSL = true;
|
|
basicAuthFile = "/secrets/home_password";
|
|
locations."/".proxyPass = "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
|
|
};
|
|
|
|
services.hydra = {
|
|
enable = true;
|
|
package = pkgs.hydra_unstable.override {
|
|
nix = config.nix.package;
|
|
};
|
|
hydraURL = "home.${cfg.domainName}/hydra";
|
|
listenHost = "127.0.0.1";
|
|
minimumDiskFree = 30;
|
|
notificationSender = "noreply@${cfg.domainName}";
|
|
# smtpHost = "mail.${cfg.domainName}";
|
|
useSubstitutes = true;
|
|
};
|
|
systemd.services.nix-daemon = {
|
|
serviceConfig.CPUQuota = "50%";
|
|
};
|
|
|
|
services.nginx.statusPage = true;
|
|
services.gitea.settings.metrics.ENABLED = true;
|
|
services.akkoma.config.":prometheus"."Pleroma.Web.Endpoint.MetricsExporter" = {
|
|
enabled = true;
|
|
auth = [ ((pkgs.formats.elixirConf { }).lib.mkRaw ":basic") "prometheus" {
|
|
_secret = "/secrets/akkoma/prometheus_password";
|
|
} ];
|
|
ip_whitelist = ["127.0.0.1"];
|
|
path = "/api/pleroma/app_metrics";
|
|
format = (pkgs.formats.elixirConf { }).lib.mkRaw ":text";
|
|
};
|
|
services.prometheus = {
|
|
enable = true;
|
|
exporters = {
|
|
node = {
|
|
enable = true;
|
|
enabledCollectors = [ "logind" "systemd" ];
|
|
port = 9101; # cups is 9100
|
|
};
|
|
dovecot = {
|
|
enable = true;
|
|
scopes = [ "user" "global" ];
|
|
};
|
|
nextcloud = {
|
|
enable = true;
|
|
url = "https://cloud.${cfg.domainName}";
|
|
username = "nextcloud-exporter";
|
|
passwordFile = "/secrets/nextcloud_exporter_password";
|
|
};
|
|
nginx = { enable = true; };
|
|
nginxlog = {
|
|
enable = true;
|
|
group = "nginx";
|
|
settings.namespaces = [
|
|
{
|
|
name = "comments";
|
|
format = "{\"ip\":\"$remote_addr\",\"time\":\"$time_iso8601\",\"referer\":\"$http_referer\",\"body\":\"$request_body\",\"ua\":\"$http_user_agent\"}";
|
|
source.files = [ "/var/log/nginx/comments.log" ];
|
|
}
|
|
];
|
|
};
|
|
postfix = { enable = true; };
|
|
postgres = { enable = true; };
|
|
process.enable = true;
|
|
redis.enable = true;
|
|
rspamd.enable = true;
|
|
smartctl.enable = true;
|
|
};
|
|
checkConfig = "syntax-only";
|
|
scrapeConfigs = [
|
|
{
|
|
job_name = "local_frequent";
|
|
scrape_interval = "1m";
|
|
static_configs = [ {
|
|
targets = collectListeners [
|
|
"node"
|
|
"nginx"
|
|
"process"
|
|
];
|
|
labels.machine = "server";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "local_medium_freq";
|
|
scrape_interval = "15m";
|
|
static_configs = [ {
|
|
targets = [ "127.0.0.1:9548" ];
|
|
labels.machine = "server";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "local_infrequent";
|
|
scrape_interval = "1h";
|
|
static_configs = [ {
|
|
targets = collectListeners [
|
|
"dovecot"
|
|
"nextcloud"
|
|
"nginxlog"
|
|
"postfix"
|
|
"postgres"
|
|
"redis"
|
|
"rspamd"
|
|
"smartctl"
|
|
];
|
|
labels.machine = "server";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "gitea";
|
|
bearer_token_file = "/secrets/prometheus_bearer";
|
|
scrape_interval = "1h";
|
|
static_configs = [ {
|
|
targets = [ "git.${cfg.domainName}" ];
|
|
labels.machine = "server";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "router_frequent";
|
|
scrape_interval = "1m";
|
|
static_configs = [ {
|
|
targets = [
|
|
"retracker.local:9101"
|
|
"retracker.local:9256"
|
|
"retracker.local:9167"
|
|
];
|
|
labels.machine = "router";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "router_infrequent";
|
|
scrape_interval = "10m";
|
|
static_configs = [ {
|
|
targets = [
|
|
"retracker.local:9430"
|
|
"retracker.local:9547"
|
|
];
|
|
labels.machine = "router";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "synapse";
|
|
metrics_path = "/_synapse/metrics";
|
|
scrape_interval = "15s";
|
|
static_configs = [ {
|
|
targets = [ "${lib.quoteListenAddr synapseMetricsAddr}:${toString synapseMetricsPort}" ];
|
|
labels.machine = "server";
|
|
} ];
|
|
}
|
|
{
|
|
job_name = "akkoma";
|
|
metrics_path = "/api/pleroma/app_metrics";
|
|
scrape_interval = "10m";
|
|
basic_auth.username = "prometheus";
|
|
basic_auth.password_file = "/secrets/akkoma/prometheus_password";
|
|
static_configs = [ {
|
|
targets = [ "pleroma.${cfg.domainName}" ];
|
|
labels.machine = "server";
|
|
} ];
|
|
}
|
|
];
|
|
};
|
|
services.matrix-synapse.settings = {
|
|
enable_metrics = true;
|
|
federation_metrics_domains = [ "matrix.org" ];
|
|
/*
|
|
normally you're supposed to use
|
|
- port: 9000
|
|
type: metrics
|
|
bind_addresses: ['::1', '127.0.0.1']
|
|
|
|
but the NixOS module doesn't allow creating such a listener
|
|
*/
|
|
listeners = [ {
|
|
port = synapseMetricsPort;
|
|
bind_addresses = [ synapseMetricsAddr ];
|
|
type = "metrics";
|
|
tls = false;
|
|
resources = [ ];
|
|
} ];
|
|
};
|
|
|
|
/*
|
|
# this uses elasticsearch, rip
|
|
services.parsedmarc = {
|
|
enable = true;
|
|
provision = {
|
|
localMail = {
|
|
enable = true;
|
|
hostname = cfg.domainName;
|
|
};
|
|
grafana = {
|
|
datasource = true;
|
|
dashboard = true;
|
|
};
|
|
};
|
|
};*/
|
|
|
|
networking.firewall.allowedTCPPorts = [ 631 9100 ];
|
|
services.printing = {
|
|
enable = true;
|
|
allowFrom = [ cfg.lanCidrV4 cfg.lanCidrV6 ];
|
|
browsing = true;
|
|
clientConf = ''
|
|
ServerName home.${cfg.domainName}
|
|
'';
|
|
listenAddresses = [ "*:631" "*:9100" ];
|
|
defaultShared = true;
|
|
drivers = [ pkgs.hplip ];
|
|
startWhenNeeded = false;
|
|
};
|
|
services.avahi = {
|
|
enable = true;
|
|
hostName = "home";
|
|
publish.enable = true;
|
|
publish.addresses = true;
|
|
publish.userServices = true;
|
|
};
|
|
}
|