Skip to content
Snippets Groups Projects
Commit 8d52252c authored by Jean-Paul Calderone's avatar Jean-Paul Calderone
Browse files

Monitoring-related documentation and cleanups

parent 1a6d0248
No related branches found
No related tags found
3 merge requests!140Merge staging into production,!118Merge develop into staging,!109Regularize (somewhat) the definition of grids for Morph
{ hostsMap
# Define a function which returns a value which fills in all the holes left by
# ``monitoring.nix``.
{
# A set mapping VPN IP addresses as strings to lists of hostnames as
# strings. The system's ``/etc/hosts`` will be populated with this
# information.
hostsMap
# See ``customize-issuer.nix``.
, monitoringvpnKeyDir
, publicIPv4
, monitoringvpnIPv4
# XXX To be removed
, publicIPv4
# A list of VPN IP addresses as strings indicating which clients will be
# allowed onto the VPN.
, vpnClientIPs
# A list of VPN clients (IP addresses or hostnames) as strings indicating
# which nodes to scrape metrics from.
, nodeExporterTargets
# ...
, nginxExporterTargets ? []
# A string giving the NixOS state version for the system.
, stateVersion
, ...
}: {
......
# Similar to ``issuer.nix`` but for a "monitoring"-type system. Holes are
# filled by ``customize-monitoring.nix``.
rec {
deployment = {
secrets = {
"monitoringvpn-private-key" = {
# source = ...;
destination = "/run/keys/monitoringvpn/server.key";
owner.user = "root";
owner.group = "root";
......@@ -10,7 +11,6 @@ rec {
action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
};
"monitoringvpn-preshared-key" = {
# source = ...;
destination = "/run/keys/monitoringvpn/preshared.key";
owner.user = "root";
owner.group = "root";
......@@ -29,25 +29,9 @@ rec {
# ../../nixos/modules/monitoring/server/loki.nix
];
services.private-storage.monitoring.vpn.server = {
# enable = ...;
# ip = ...;
# vpnClientIPs = ...;
# pubKeysPath = ...;
};
services.private-storage.monitoring.grafana = {
domain = "monitoring.private.storage";
prometheusUrl = "http://localhost:9090/";
lokiUrl = "http://localhost:3100/";
};
services.private-storage.monitoring.prometheus = {
# nodeExporterTargets = ...;
# nginxExporterTargets = ...;
};
# system.stateVersion = ...;
# networking.hosts = ...;
}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment