Commit Graph

1111 Commits

Author SHA1 Message Date
Ryan Lahfa
0cd6f66fb7
Merge pull request #247376 from RageKnify/fix/smartd-mail 2023-11-07 18:00:56 +01:00
Maximilian Bosch
dbb68f0b49
Merge pull request #263558 from Ma27/fix-image-renderer-callback
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
2023-11-02 15:49:23 +01:00
Peder Bergebakken Sundt
37c7104f53
Merge pull request #262915 from chayleaf/certspotter
certspotter: init at 0.17.0; nixos/certspotter: init
2023-10-29 05:10:04 +01:00
Linus Heckemann
8670794565
Merge pull request #263203 from nikstur/replace-activation
Replace simple activationScripts
2023-10-28 10:17:15 +02:00
chayleaf
f4aeeb9e81
nixos/certspotter: init 2023-10-28 14:19:36 +07:00
Anthony Roussel
3a2d3bc3d8
nixos/goss: init 2023-10-27 08:00:48 +02:00
Maximilian Bosch
15e17917fc
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
Otherwise the callback won't work Grafana is configured to listen on a
different IP address by default.
2023-10-26 12:57:39 +02:00
nikstur
1b2b1364de nixos/ups: replace activationScript via tmpfiles 2023-10-25 23:44:01 +02:00
chayleaf
413011ddf4 kea: use separate runtime directories for each service
Kea may clean the runtime directory when starting (or maybe systemd does
it). I ran into this issue when restarting Kea after changing its
configuration, so I think the fact it normally doesn't clean it is a
race condition (it's cleaned on service start, and normally all Kea
services start at roughly the same time).
2023-10-26 02:51:43 +07:00
Rebecca Kelly
855223de8f nixos/munin: fix internAndFixPlugins mangling store paths
The previous implementation works fine when the plugins do not already
contain store paths, which is the case for stuff from munin-contrib.
However, for plugins generated via nix (e.g. with writeShellScriptBin),
it tries to fix the paths in it which already point to the nix store,
ruining everything.
2023-10-25 09:00:45 +02:00
Rebecca Kelly
0f7fb5cdcf nixos/munin: fix key-context error when using extraAutoPlugins
If extraAutoPlugins contains values that carry context (e.g. it comes
from a flake input), the keys generated from them using baseNameOf
inherit that context and the config doesn't compile.

This doesn't actually need to be an attrset anyways, so a bit of
internal refactoring lets us fix this without changing the visible API.
2023-10-25 09:00:45 +02:00
Martin Weinelt
589ccfdac1
nixos/prometheus-exporters/knot: update for new exporter
The new exporter has proper console scripts definition, that sets up
another executable name.

The package now also shells out to pidof, which is why we require procps
in the unit PATH.
2023-10-23 13:19:52 +02:00
Bjørn Forsman
142074c2a8 nixos: fix bad mkEnableOption descriptions
Fix descriptions that don't account for (1) the "Whether to enable"
prefix or (2) the automatically added trailing dot.
2023-10-20 16:22:40 +01:00
Jennifer Graul
e94820dfb2 nixos/librenms: init 2023-10-16 13:28:22 +02:00
Alexandre Iooss
925a8806dc nixos/prometheus: fix cross-compilation 2023-10-14 16:45:18 +02:00
Arnout Engelen
6071292b2a
Merge pull request #243338 from raboof/prometheus-imap-mailstat-exporter-init-at-2023-06-20
prometheus-imap-mailstat-exporter: init at 0.0.1
2023-10-11 17:33:25 -03:00
1000101
3b094812b1 prometheus-pgbouncer-exporter: init at 0.7.0 2023-10-07 11:44:40 +02:00
WilliButz
2d30a37d9f
Merge pull request #248925 from FugiMuffi/prometheus-sabnzbd-exporter
prometheus-sabnzbd-exporter: init at 0.1.70
2023-09-25 12:09:36 +02:00
hexchen
8ec182e570 nixos/prometheus: fix blackbox exporter 2023-09-21 08:49:10 +02:00
Arnout Engelen
69ecad6acb
Merge pull request #254563 from raboof/prometheus-exporter-nextcloud-fixup
prometheus-exporter-nextcloud: require either tokenFile or passwordFile
2023-09-20 22:33:10 +02:00
Arnout Engelen
81daaece83
prometheus-imap-mailstat-exporter: init at 0.0.1
To be able to monitor the number of (unread) mails in mailboxes
2023-09-20 22:29:57 +02:00
Arnout Engelen
1bf360af28
prometheus-exporter-nextcloud: require either tokenFile or passwordFile
follow-up on 28b3156bc6 which broke
when tokenFile was left empty.

Making both options nullable also allows us to provide a more meaningful
error message when neither authentication method is configured.
2023-09-19 13:19:54 +02:00
Maximilian Bosch
b4dbea193a
Merge pull request #255179 from Ma27/rm-grafana-migration-error
nixos/grafana: remove hacky deprecation helper from dashbaords & datasources
2023-09-17 13:44:33 +02:00
Maximilian Bosch
698c640e77
nixos/grafana: remove hacky deprecation helper from dashbaords & datasources
The problem we had back then was that `mkRenamedOptionModule` doesn't
work if an option will be moved a level depper, i.e.

    services.grafana.provision.dashboards

became

    services.grafana.provision.dashboards.settings.provider

I actually planned to remove this before 23.05 (since the change was
already released in 22.11), but as you can see that didn't happen ;-)

I think the grace-period was quite long already. And if someone is
migrating from <22.11 to a current NixOS now, there are very precise
instructions on how to upgrade in the 22.11 release notes.
2023-09-14 22:12:53 +02:00
nicoo
46a0c5ebbe nixos/below: Document maintainer 2023-09-13 10:25:28 +00:00
tilpner
6e8591a8d1 nixos/mimir: add extraFlags option 2023-09-04 20:26:02 +00:00
Martin Weinelt
73c5a5a778
nixos/prometheus/unbound-exporter: update for new package
The command line interface changed slightly, but still supports the TCP
as well as the UDS control interface.
2023-08-28 23:21:52 +02:00
Janik
321734bc2b
Merge pull request #251157 from NetaliDev/vmagent-extra-options 2023-08-26 21:21:11 +02:00
Franz Pletz
fe907aa37e
Merge pull request #242365 from h7x4/add-mysqld-exporter
services/prometheus/exporters: add mysqld
2023-08-25 23:56:22 +02:00
Arnout Engelen
4dcaa04151
Merge pull request #242942 from raboof/prometheus-nextcloud-auth-token
prometheus-exporter-nextcloud: support for auth tokens
2023-08-25 09:54:23 +02:00
Jennifer Graul
f0b76e7d10
nixos/vmagent: add extraOptions option 2023-08-24 15:09:29 +02:00
h7x4
8981783b60
services/prometheus/exporters: add mysqld
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-08-13 19:46:30 +02:00
Fugi
5e75b36302
nixos/prometheus-sabnzbd-exporter: init 2023-08-13 16:31:52 +02:00
Mario Rodas
d8001aae54
Merge pull request #242116 from flurie/fix-datadog-agent
datadog-agent: 7.38.1 -> 7.45.1
2023-08-10 20:53:27 -05:00
Franz Pletz
8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
DDoSolitary
d410464c5d
nixos/netdata: fix position of NETDATA_PIPENAME
It was accidentally placed in a condition-guarded block, making the
setting only take effect when enableAnalyticsReporting = false.
2023-08-09 19:22:20 +08:00
João Borges
a53a73c74f
nixos/smartd: Fix mail recipient field
Having undisclosed recipients results in emails being considered spam as mentioned in #192147, by instead identifying the recipient the emails are no longer considered spam
2023-08-05 20:01:42 +01:00
DDoSolitary
060a47e1e4
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
Netdata creates its control socket at /tmp/netdata-ipc by default, which
is insecure and actually inaccessible with systemd's PrivateTmp enabled.

Originally we patched its source code to move the socket to
/run/netdata/ipc. However, it was removed due to incompatibility when
upgrading to v1.41.0: 1d2a2dc7d0

Fortunately, this new version of netdata adds support for setting the
location of the control socket via the environment variable
NETDATA_PIPENAME. So let's set it for the netdata service and the
command line utility so that they can communicate properly.
2023-08-05 18:19:08 +08:00
codec
47db2bfffb prometheus-idrac-exporter: init at unstable-2023-06-29 2023-08-04 00:57:19 +02:00
WilliButz
bf48dde359
Merge pull request #233659 from seberm/prometheus-ipmi-exporter-family-restriction
nixos/prometheus-ipmi-exporter: allow AF_UNIX address family
2023-07-31 13:57:15 +02:00
lewo
9a98962714
Merge pull request #245545 from nlewo/osquery-disable-database
nixos/osquery: do not use the local database for osqueryi
2023-07-26 17:58:09 +02:00
Antoine Eiche
8af1d49858 nixos/osquery: do not use the local database for osqueryi
Because the local database is used by the osquery deamon, running
osqueri fails with:

    IO error: While lock file: /var/lib/osquery/osquery.db/LOCK:    Resource temporarily unavailable
2023-07-26 17:22:22 +02:00
Sandro Jäckel
b0c67b4b6e
treewide: rename fonts.fonts to fonts.packages 2023-07-24 17:34:39 +02:00
Felix Bühler
0a2745684e
Merge pull request #239624 from Stunkymonkey/use-optionalString-then
treewide: use optionalString instead of 'then ""'
2023-07-22 13:02:47 +02:00
Stzx
3e8f45393d
Fix package ref 2023-07-21 18:56:49 +08:00
Antoine Eiche
da65d1dd20 nixos/osquery: init 2023-07-19 16:55:29 +02:00
Alexander Flurie
048f9a4adf fix whitespace issue 2023-07-18 00:20:46 -04:00
Alexander Flurie
c2861bcbdf add separate configurable datadog process agent 2023-07-17 10:34:50 -04:00
Arnout Engelen
7e26c8d097
prometheus-exporter-nextcloud: support for auth tokens
Fixes #176849
2023-07-12 00:32:17 +02:00
Gaël Reyrol
f856229c9a
nixos/prometheus/exporters: adjust scaphandre assertions 2023-06-30 15:10:38 +02:00