Commit Graph

1357 Commits

Author SHA1 Message Date
Elian Doran
2b0bf78df6 nixos/snmpd: init 2023-12-19 18:54:24 +02:00
WilliButz
92ad5c907c
Merge pull request #274543 from fugidev/sabnzbd-exporter-loadcredential
nixos/prometheus-sabnzbd-exporter: use LoadCredential for apiKeyFile
2023-12-18 15:09:35 +01:00
Peder Bergebakken Sundt
45052e5e52
Merge pull request #273397 from ipetkov/nut
nixos/ups: fix shutting down the UPS from primary monitors
2023-12-18 15:06:22 +01:00
Fugi
6430b7a181
nixos/prometheus-sabnzbd-exporter: use LoadCredential for apiKeyFile 2023-12-18 14:48:49 +01:00
Martin Weinelt
cd6ccb1737 Revert "kea: use separate runtime directories for each service"
This reverts commit 413011ddf4.

Using separate lockfile directories prevents the different kea daemons
from using the interprocess sync lockfile.

Keeping the runtime directory around might be the better approach.
2023-12-15 13:51:19 +01:00
Janne Heß
6ad3977ec9
Merge pull request #253184 from tilpner/prometheus-headers
nixos/prometheus: add remote{Read, Write}.headers options
2023-12-13 21:53:52 +01:00
Jonathan Davies
c57a4037f5 nixos/thanos: Changed query.replica-labels to a list parameter.
Fixes: #273432
2023-12-10 23:55:15 +00:00
Ivan Petkov
fc004b09e5
nixos/ups: install udev rules for nut
This is necessary to allow the usbhid driver to successfully send
commands to the attached UPS.

It is possible to work around this by explicitly using setting the user
flag (e.g. `upsdrvctl -u root shutdown`), though it is much simpler to
install the udev rules rather than patch things further.
2023-12-10 11:23:37 -08:00
Ryan Lahfa
b69fbe2670
Merge pull request #272996 from RaitoBezarius/netdata-improvements 2023-12-09 14:00:48 +01:00
Raito Bezarius
db1e415c07 nixos/netdata: ensure analytics reporting is truly opted-out
Fixes 260035.
2023-12-09 00:47:56 +01:00
Sandro Jäckel
8c972ce2c0
nixos/grafana: fix deprecation warning by using grafana server instead of grafana-server
Deprecation warning: The standalone 'grafana-server' program is deprecated and will be removed in the future. Please update all uses of 'grafana-server' to 'grafana server'
2023-12-06 23:40:30 +01:00
Sandro Jäckel
cff247a127
nixos/grafana: create plugins directory in provisioning
The error message was:
msg="Failed to read plugin provisioning files from directory" path=/nix/store/gs2cy8n6ndsa1f7msf7ndl8f85xl1pzg-grafana-provisioning/plugins
 error="open /nix/store/gs2cy8n6ndsa1f7msf7ndl8f85xl1pzg-grafana-provisioning/plugins: no such file or directory"
2023-12-06 23:40:29 +01:00
maxine
f73dbfa5f8
Merge pull request #213006 from Majiir/nut
nixos/ups: add options for essential config files
2023-12-05 23:14:37 +01:00
Victor Hugo Aguiar Pacce
5c6c35d0f8 nixos/prometheus: add enableAgentMode option
Required for running a prometheus service under agent mode

Signed-off-by: Victor Hugo Aguiar Pacce <victorhugoaguiarpacce@gmail.com>
2023-12-05 11:24:04 -03:00
undefined
3c4370ca2f
prometheus-mongodb-exporter: fix service ExecStart 2023-12-03 17:54:21 +08:00
Majiir Paktu
c1793ff623 nixos/ups: add {users,upsmon,upsd} config options 2023-12-02 22:44:07 -05:00
Majiir Paktu
09002e9d23 nixos/ups: various fixes & clean up
- Ensure NUT_STATEPATH exists (fixes service startup)
- Use mode option to enable services (fixes #113735)
- Remove extraneous slash in paths (fixes confusing logs)
- Support reload for upsmon and upsd
- Remove ExecStart wrapper scripts
2023-12-02 22:42:14 -05:00
h7x4
79d3d59f58
treewide: replace mkPackageOptionMD with mkPackageOption 2023-11-30 19:03:14 +01:00
Weijia Wang
feeae486de
Merge pull request #261702 from h7x4/replace-mkoption-with-mkpackageoption
treewide: use `mkPackageOption`
2023-11-30 02:49:30 +01:00
h7x4
0a37316d6c
treewide: use mkPackageOption
This commit replaces a lot of usages of `mkOption` with the package
type, to be `mkPackageOption`, in order to reduce the amount of code.
2023-11-27 01:28:36 +01:00
Jörg Thalheim
501680a656 nixos/telegraf: include procps if procstat input is configured 2023-11-26 20:26:48 +01:00
Nick Cao
0840c28c43
Merge pull request #268991 from undefined-moe/mongodb-exporter
add prometheus-mongodb-exporter
2023-11-22 09:29:50 -05:00
undefined
b46ec2c40f
nixos/prometheus-mongodb-exporter: init module 2023-11-22 09:42:27 +08:00
Mario Rodas
c93541b24e
Merge pull request #264910 from anthonyroussel/ocsinventory-agent+nixos
nixos/ocsinventory-agent: init
2023-11-19 18:55:06 -05:00
Artturi
b736459b60
Merge pull request #260089 from anthonyroussel/thanos_0_32_4 2023-11-19 18:37:48 +02:00
Ryan Lahfa
ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Ilan Joselevich
d7e7a2136e
Merge pull request #267761 from jpds/grafana-restart-on-failure
nixos/grafana: Set systemd unit to restart on failure
2023-11-17 00:59:25 +00:00
Kim Lindberger
9c4df4d618
Merge pull request #246992 from cransom/cransom-parsedmarc-smtp
nixos/parsedmarc: fix validation for smtp
2023-11-16 15:06:20 +01:00
Jonathan Davies
58cbf94b38 nixos/grafana: Set systemd unit to restart on failure 2023-11-15 23:20:59 +00:00
Felix Bühler
f2fc5b4195
Merge pull request #265696 from Stunkymonkey/nixos-exportarr
nixos/exportarr: init
2023-11-13 22:58:32 +01:00
Maximilian Bosch
48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
Anthony Roussel
d4d6602ce3
nixos/thanos: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-12 11:21:47 +01:00
Anthony Roussel
65be712043
nixos/thanos: use mkPackageOptionMD 2023-11-12 11:08:53 +01:00
Anthony Roussel
9abb2a2116
nixos/thanos: remove deprecations
* replaced store.grpc.series-sample-limit by store.limits.request-samples
* replaced query.replica-label by query.replica-labels
* replaced store.addresses by endpoints
* removed block-sync-concurrency (removed upstream)
2023-11-12 11:08:52 +01:00
Anthony Roussel
abed24c0d6
nixos/thanos: fix documentation 2023-11-12 11:08:52 +01:00
Anthony Roussel
312e7f8ae0
nixos/thanos: add ExecReload command to SystemD services 2023-11-12 11:08:52 +01:00
Anthony Roussel
0d9bef343b
nixos/thanos: fix services.thanos.receive.labels config 2023-11-12 11:08:51 +01:00
Anthony Roussel
2074409c86
nixos/thanos: add query-frontend SystemD service 2023-11-12 11:08:51 +01:00
Anthony Roussel
e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Ryan Lahfa
bc2b72df73
Merge pull request #264234 from guiguid/guiguid-patch-netdata-systemd-journal
netdata: 1.43.0 -> 1.43.2 and add systemd-journal plugin
2023-11-08 13:30:43 +01:00
Felix Buehler
4d1680ccc7 nixos/exportarr: init 2023-11-07 20:56:32 +01:00
Ryan Lahfa
0cd6f66fb7
Merge pull request #247376 from RageKnify/fix/smartd-mail 2023-11-07 18:00:56 +01:00
Maximilian Bosch
dbb68f0b49
Merge pull request #263558 from Ma27/fix-image-renderer-callback
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
2023-11-02 15:49:23 +01:00
Anthony Roussel
efdbdab8b5
nixos/ocsinventory-agent: init 2023-11-02 14:20:45 +01:00
Guillaume DELVIT
043522789b nixos/services/netdata: add systemd-journald plugin as a privileged wrapper
https://learn.netdata.cloud/docs/logs/systemd-journal/
need acces to

    Kernel Logs (dmesg):
        Capability: CAP_SYSLOG
        Description: This capability allows the program to read kernel logs using the dmesg command or by reading the /dev/kmsg file.

    System Logs (e.g., /var/log/syslog):
        Capability: CAP_DAC_READ_SEARCH
        Description: This capability allows the program to read system logs located in directories such as /var/log/.

    User Logs (e.g., /var/log/auth.log):
        Capability: CAP_DAC_READ_SEARCH
        Description: This capability allows the program to read user logs located in directories such as /var/log/.
2023-11-01 00:16:30 +01:00
Peder Bergebakken Sundt
37c7104f53
Merge pull request #262915 from chayleaf/certspotter
certspotter: init at 0.17.0; nixos/certspotter: init
2023-10-29 05:10:04 +01:00
Linus Heckemann
8670794565
Merge pull request #263203 from nikstur/replace-activation
Replace simple activationScripts
2023-10-28 10:17:15 +02:00
chayleaf
f4aeeb9e81
nixos/certspotter: init 2023-10-28 14:19:36 +07:00
Anthony Roussel
3a2d3bc3d8
nixos/goss: init 2023-10-27 08:00:48 +02:00
Maximilian Bosch
15e17917fc
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
Otherwise the callback won't work Grafana is configured to listen on a
different IP address by default.
2023-10-26 12:57:39 +02:00
nikstur
1b2b1364de nixos/ups: replace activationScript via tmpfiles 2023-10-25 23:44:01 +02:00
chayleaf
413011ddf4 kea: use separate runtime directories for each service
Kea may clean the runtime directory when starting (or maybe systemd does
it). I ran into this issue when restarting Kea after changing its
configuration, so I think the fact it normally doesn't clean it is a
race condition (it's cleaned on service start, and normally all Kea
services start at roughly the same time).
2023-10-26 02:51:43 +07:00
Rebecca Kelly
855223de8f nixos/munin: fix internAndFixPlugins mangling store paths
The previous implementation works fine when the plugins do not already
contain store paths, which is the case for stuff from munin-contrib.
However, for plugins generated via nix (e.g. with writeShellScriptBin),
it tries to fix the paths in it which already point to the nix store,
ruining everything.
2023-10-25 09:00:45 +02:00
Rebecca Kelly
0f7fb5cdcf nixos/munin: fix key-context error when using extraAutoPlugins
If extraAutoPlugins contains values that carry context (e.g. it comes
from a flake input), the keys generated from them using baseNameOf
inherit that context and the config doesn't compile.

This doesn't actually need to be an attrset anyways, so a bit of
internal refactoring lets us fix this without changing the visible API.
2023-10-25 09:00:45 +02:00
Martin Weinelt
589ccfdac1
nixos/prometheus-exporters/knot: update for new exporter
The new exporter has proper console scripts definition, that sets up
another executable name.

The package now also shells out to pidof, which is why we require procps
in the unit PATH.
2023-10-23 13:19:52 +02:00
Bjørn Forsman
142074c2a8 nixos: fix bad mkEnableOption descriptions
Fix descriptions that don't account for (1) the "Whether to enable"
prefix or (2) the automatically added trailing dot.
2023-10-20 16:22:40 +01:00
Jennifer Graul
e94820dfb2 nixos/librenms: init 2023-10-16 13:28:22 +02:00
Alexandre Iooss
925a8806dc nixos/prometheus: fix cross-compilation 2023-10-14 16:45:18 +02:00
Arnout Engelen
6071292b2a
Merge pull request #243338 from raboof/prometheus-imap-mailstat-exporter-init-at-2023-06-20
prometheus-imap-mailstat-exporter: init at 0.0.1
2023-10-11 17:33:25 -03:00
1000101
3b094812b1 prometheus-pgbouncer-exporter: init at 0.7.0 2023-10-07 11:44:40 +02:00
WilliButz
2d30a37d9f
Merge pull request #248925 from FugiMuffi/prometheus-sabnzbd-exporter
prometheus-sabnzbd-exporter: init at 0.1.70
2023-09-25 12:09:36 +02:00
hexchen
8ec182e570 nixos/prometheus: fix blackbox exporter 2023-09-21 08:49:10 +02:00
Arnout Engelen
69ecad6acb
Merge pull request #254563 from raboof/prometheus-exporter-nextcloud-fixup
prometheus-exporter-nextcloud: require either tokenFile or passwordFile
2023-09-20 22:33:10 +02:00
Arnout Engelen
81daaece83
prometheus-imap-mailstat-exporter: init at 0.0.1
To be able to monitor the number of (unread) mails in mailboxes
2023-09-20 22:29:57 +02:00
Arnout Engelen
1bf360af28
prometheus-exporter-nextcloud: require either tokenFile or passwordFile
follow-up on 28b3156bc6 which broke
when tokenFile was left empty.

Making both options nullable also allows us to provide a more meaningful
error message when neither authentication method is configured.
2023-09-19 13:19:54 +02:00
Maximilian Bosch
b4dbea193a
Merge pull request #255179 from Ma27/rm-grafana-migration-error
nixos/grafana: remove hacky deprecation helper from dashbaords & datasources
2023-09-17 13:44:33 +02:00
Maximilian Bosch
698c640e77
nixos/grafana: remove hacky deprecation helper from dashbaords & datasources
The problem we had back then was that `mkRenamedOptionModule` doesn't
work if an option will be moved a level depper, i.e.

    services.grafana.provision.dashboards

became

    services.grafana.provision.dashboards.settings.provider

I actually planned to remove this before 23.05 (since the change was
already released in 22.11), but as you can see that didn't happen ;-)

I think the grace-period was quite long already. And if someone is
migrating from <22.11 to a current NixOS now, there are very precise
instructions on how to upgrade in the 22.11 release notes.
2023-09-14 22:12:53 +02:00
nicoo
46a0c5ebbe nixos/below: Document maintainer 2023-09-13 10:25:28 +00:00
tilpner
6e8591a8d1 nixos/mimir: add extraFlags option 2023-09-04 20:26:02 +00:00
tilpner
8562dc924d
nixos/prometheus: add remote{Read, Write}.headers options 2023-09-03 23:36:49 +02:00
Martin Weinelt
73c5a5a778
nixos/prometheus/unbound-exporter: update for new package
The command line interface changed slightly, but still supports the TCP
as well as the UDS control interface.
2023-08-28 23:21:52 +02:00
Janik
321734bc2b
Merge pull request #251157 from NetaliDev/vmagent-extra-options 2023-08-26 21:21:11 +02:00
Franz Pletz
fe907aa37e
Merge pull request #242365 from h7x4/add-mysqld-exporter
services/prometheus/exporters: add mysqld
2023-08-25 23:56:22 +02:00
Arnout Engelen
4dcaa04151
Merge pull request #242942 from raboof/prometheus-nextcloud-auth-token
prometheus-exporter-nextcloud: support for auth tokens
2023-08-25 09:54:23 +02:00
Jennifer Graul
f0b76e7d10
nixos/vmagent: add extraOptions option 2023-08-24 15:09:29 +02:00
h7x4
8981783b60
services/prometheus/exporters: add mysqld
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-08-13 19:46:30 +02:00
Fugi
5e75b36302
nixos/prometheus-sabnzbd-exporter: init 2023-08-13 16:31:52 +02:00
Mario Rodas
d8001aae54
Merge pull request #242116 from flurie/fix-datadog-agent
datadog-agent: 7.38.1 -> 7.45.1
2023-08-10 20:53:27 -05:00
Franz Pletz
8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
DDoSolitary
d410464c5d
nixos/netdata: fix position of NETDATA_PIPENAME
It was accidentally placed in a condition-guarded block, making the
setting only take effect when enableAnalyticsReporting = false.
2023-08-09 19:22:20 +08:00
João Borges
a53a73c74f
nixos/smartd: Fix mail recipient field
Having undisclosed recipients results in emails being considered spam as mentioned in #192147, by instead identifying the recipient the emails are no longer considered spam
2023-08-05 20:01:42 +01:00
DDoSolitary
060a47e1e4
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
Netdata creates its control socket at /tmp/netdata-ipc by default, which
is insecure and actually inaccessible with systemd's PrivateTmp enabled.

Originally we patched its source code to move the socket to
/run/netdata/ipc. However, it was removed due to incompatibility when
upgrading to v1.41.0: 1d2a2dc7d0

Fortunately, this new version of netdata adds support for setting the
location of the control socket via the environment variable
NETDATA_PIPENAME. So let's set it for the netdata service and the
command line utility so that they can communicate properly.
2023-08-05 18:19:08 +08:00
codec
47db2bfffb prometheus-idrac-exporter: init at unstable-2023-06-29 2023-08-04 00:57:19 +02:00
Casey Ransom
8f07186bb3 nixos/parsedmarc: fix validation for smtp
Update the ini generator so that a list of emails is accepted.
2023-08-03 12:33:33 -04:00
WilliButz
bf48dde359
Merge pull request #233659 from seberm/prometheus-ipmi-exporter-family-restriction
nixos/prometheus-ipmi-exporter: allow AF_UNIX address family
2023-07-31 13:57:15 +02:00
lewo
9a98962714
Merge pull request #245545 from nlewo/osquery-disable-database
nixos/osquery: do not use the local database for osqueryi
2023-07-26 17:58:09 +02:00
Antoine Eiche
8af1d49858 nixos/osquery: do not use the local database for osqueryi
Because the local database is used by the osquery deamon, running
osqueri fails with:

    IO error: While lock file: /var/lib/osquery/osquery.db/LOCK:    Resource temporarily unavailable
2023-07-26 17:22:22 +02:00
Sandro Jäckel
b0c67b4b6e
treewide: rename fonts.fonts to fonts.packages 2023-07-24 17:34:39 +02:00
Felix Bühler
0a2745684e
Merge pull request #239624 from Stunkymonkey/use-optionalString-then
treewide: use optionalString instead of 'then ""'
2023-07-22 13:02:47 +02:00
Stzx
3e8f45393d
Fix package ref 2023-07-21 18:56:49 +08:00
Antoine Eiche
da65d1dd20 nixos/osquery: init 2023-07-19 16:55:29 +02:00
Alexander Flurie
048f9a4adf fix whitespace issue 2023-07-18 00:20:46 -04:00
Alexander Flurie
c2861bcbdf add separate configurable datadog process agent 2023-07-17 10:34:50 -04:00
Arnout Engelen
7e26c8d097
prometheus-exporter-nextcloud: support for auth tokens
Fixes #176849
2023-07-12 00:32:17 +02:00
Gaël Reyrol
f856229c9a
nixos/prometheus/exporters: adjust scaphandre assertions 2023-06-30 15:10:38 +02:00
Gaël Reyrol
1a821e7bf5
nixos/prometheus-exporters: add php-fpm 2023-06-28 22:11:36 +02:00
Sandro
0a5cb5c47e
nixos/grafana: disable updater by default (#240323) 2023-06-28 14:09:55 +02:00
Gaël Reyrol
e11f06a951
services/prometheus/exporters: add scaphandre 2023-06-27 20:50:58 +02:00
Robin Gloster
61f41ba937
Merge pull request #234245 from nbraud/below
nixos/below: Add service module
2023-06-26 21:23:36 +02:00
Felix Buehler
f3719756b5 treewide: use optionalString instead of 'then ""' 2023-06-24 20:19:19 +02:00
Franz Pletz
48d0d69869
Merge pull request #239348 from Ma27/bump-grafana 2023-06-23 23:15:43 +02:00
Maximilian Bosch
6e6c2e6530
nixos/grafana: clarify that there's still a bit of time until notifiers are removed
See https://github.com/grafana/grafana/pull/66269
2023-06-23 13:45:56 +02:00
Domen Kožar
b37c9b89a4
Merge pull request #221169 from bouk/bouk/mainpr
opentelemetry-collector: add NixOS module
2023-06-21 13:07:50 +01:00
Joscha
daa75a4093 nixos/grafana: Fix and adjust config options 2023-06-20 23:19:45 +02:00
Joscha
5e4ec14596 nixos/grafana: update and add settings
I went through all categories that were already present in the grafana
module and added most options from the official docs at
https://grafana.com/docs/grafana/v9.5/setup-grafana/configure-grafana/

I also modified the descriptions of some existing options to match the
official docs more closely.
2023-06-18 22:23:48 +02:00
Joscha
2f68d8cb10 nixos/grafana: reformat 2023-06-18 22:23:39 +02:00
Raito Bezarius
2d7e29b60e nixos/netdata: fix claim_token_file -> claimTokenFile
It was forgotten in afc6f0d93b.
2023-06-17 17:51:45 +02:00
Ryan Lahfa
afc6f0d93b
Merge pull request #228479 from zimbatm/netdata-auto-claim 2023-06-16 11:30:30 +02:00
Jenny
3a86958c97
prometheus-junos-czerwonk-exporter: init at 0.10.1 + module (#235433) 2023-06-13 10:15:05 +02:00
Jacob Moody
39f220b6df
nixos/grafana: add jsonData datasource option (#234364) 2023-06-07 00:11:10 +02:00
Gabriel Fontes
dff2e184f4 nixos/prometheus.exporters.graphite: init 2023-06-03 03:13:09 +00:00
Aaron Andersen
d098eec2da nixos/vmalert: init 2023-05-30 07:41:00 -04:00
nicoo
942f0a01fe nixos/below: Explicitely mark descriptions as using Markdown 2023-05-27 11:52:07 +00:00
nicoo
405e1f1e54 nixos/below: Add service module 2023-05-27 11:52:07 +00:00
Otto Sabart
2c664e3a65
nixos/prometheus-ipmi-exporter: allow AF_UNIX address family
This family is required for ipmi collector.
2023-05-23 21:00:00 +02:00
figsoda
701bcdbead nixos: fix typos 2023-05-19 22:31:04 -04:00
K900
86c366b440
nixos/grafana-agent: remove deprecated option (#232375)
Deprecated in version 0.21: 323c1eb36d/docs/sources/static/upgrade-guide.md (L417)
2023-05-17 11:21:27 +02:00
happysalada
47bedc81f8 uptime-kuma: add defaults for simpler initial setup 2023-05-10 09:54:56 -04:00
Weijia Wang
419d7f9c8d
Merge pull request #230753 from fetsorn/typos
several typos
2023-05-09 19:16:12 +03:00
fetsorn
1a4e993104 nixos/prometheus: fix typo
"nixpgs" -> "nixpkgs"
2023-05-09 18:02:17 +04:00
Aaron Andersen
cf0327810b
Merge pull request #207093 from ymarkus/alertmanager
nixos/alertmanager: add checkConfig option
2023-05-08 20:15:17 -04:00
Raito Bezarius
16658f7634 nixos/netdata: introduce deadlineBeforeStopSec
Previously, we hardcoded a 60 second timer to stop netdata if we didn't have any answer back.
This is wrong and can cause data loss because the SIGTERM sent by systemd can sometimes be not honored.
Which in turn becomes a SIGKILL, causing potential data loss / corruption.

Offer a flag to users and bump the deadline to 2 minutes.
2023-05-08 19:29:13 +02:00
Jonas Chevalier
db8b28dc5d
Update nixos/modules/services/monitoring/netdata.nix
Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>
2023-05-05 18:41:56 +02:00
Jonas Chevalier
14793fac6c
Update nixos/modules/services/monitoring/netdata.nix
Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>
2023-05-05 18:41:51 +02:00
Emily Lange
549bee9851
nixos/grafana-agent: add extraFlags option (#228883) 2023-05-05 15:14:41 +02:00
Matthieu Coudron
7fe4909bee
services.datadog: remove python2 from systemd service (#228312)
which caused a security warning. seems to work without it so let's ditch it
2023-05-01 16:37:34 +02:00
Maximilian Bosch
5c9977a524
Merge pull request #224891 from KFearsoff/fix-grafana-assertions-in-yaml
nixos/grafana: fix assertions leaking into YAML
2023-04-30 11:39:48 +02:00
zimbatm
f4d5a76a81 netdata module: add automatic claim
Allow machines to auto-register themselves by passing the claim token.
2023-04-27 10:30:32 +02:00
Artturi
b83db86a9e
Merge pull request #222080 from Stunkymonkey/nixos-optionalString 2023-04-20 16:07:30 +03:00
ajs124
6fc4e722c4 nixos/prometheus-smartctl-exporter: fix evaluation after adding cfg.extraFlags
was done in 3c61665b7f but does not evaluate
error: value is a string with context while a list was expected
2023-04-13 17:32:50 +02:00
Florian Klink
4496a91077
Merge pull request #225973 from IndeedNotJames/grafana-agent
grafana-agent: 0.30.2 -> 0.32.1, remove obsolete test fix; nixos/grafana-agent: use `lib.getExe`
2023-04-13 17:29:48 +02:00
IndeedNotJames
845a6e9784
nixos/grafana-agent: use lib.getExe as binary names changed between updates
and `lib.getExe` allows a safe handling and potential backport of this.
But for that to work it would require 22.11 to set `pkgs.grafana-agent.meta.mainProgram = "agent"`

Relevant upstream release: https://github.com/grafana/agent/releases/tag/v0.31.0
2023-04-13 10:43:02 +02:00
Jakub Sokołowski
3c61665b7f
nixos/prometheus-smartctl-exporter: support extraFlags
Seems to be ignored currently. Useful for `-verbose` flag.

Signed-off-by: Jakub Sokołowski <jakub@status.im>
2023-04-12 23:56:32 +02:00
Felix Buehler
327b0cff7a treewide: use more lib.optionalString 2023-04-07 13:38:33 +02:00
KFears
51fdf00ecb nixos/grafana: fix assertions leaking into YAML
This commit deletes the assertions that were added in 4ec456b. Those
assertions weren't even working to begin with, and they also cause
assertions leak into the generated YAML.
2023-04-06 02:35:23 +04:00
K900
8f172ed10a nixos/grafana-image-renderer: fix setting name 2023-04-02 16:48:36 +03:00
IndeedNotJames
f8f3eb7a48
nixos/loki: add package option 2023-03-30 14:35:53 +02:00
Justinas Stankevicius
eddd1e46e6 prometheus-exporters: support nftables 2023-03-21 22:24:37 +02:00
Alvar Penning
0810a6e018 nixos/prometheus.alertmanagerIrcRelay: init
Co-authored-by: Martin Weinelt <mweinelt@users.noreply.github.com>
2023-03-20 15:57:11 +01:00
Bouke van der Bijl
cf90db8b70 nixiso/opentelemetry-collector: init 2023-03-17 19:18:59 +01:00
Franz Pletz
bc0a1dd982
Merge pull request #220461 from SuperSandro2000/prometheus
prometheus: 2.41.0 -> 2.42.0, split outputs, other cleanups
2023-03-14 05:28:59 +01:00
Artturin
cab4a24c34 treewide: fix lints
Arg to lib.optional is a list

build time tool in buildInputs
2023-03-11 00:55:17 +02:00
Sandro Jäckel
da2f281453
prometheus: split doc and cli into extra outputs 2023-03-10 11:45:45 +01:00
Sandro
bca9ab3d26
Merge pull request #205060 from jslight90/patch-8
nixos/prometheus: Add new relabel_configs actions
2023-03-10 11:19:31 +01:00
Sandro
7606d0e004
Merge pull request #199798 from j2ghz/patch-1
Add package override to mimir
2023-02-21 09:37:57 +01:00
Kim Lindberger
30ed4863cd
Merge pull request #209147 from vojta001/parsedmarc_grafana
nixos/parsedmarc: fix Grafana provisioning
2023-02-18 23:38:33 +01:00
pennae
bf4c0c1900 nixos/*: remove trailing period in mkEnableOptions
those are added by mkEnableOption, and .. is replaced to … by markdown
processing.
2023-02-08 15:23:34 +01:00
Jozef Hollý
3cb385953b mimir: add package override 2023-02-06 21:49:23 +01:00
Anderson Torres
f7e045e149
Merge pull request #209192 from lucasew/cockpit
cockpit: init at 284
2023-02-06 16:02:27 -03:00
Pol Dellaiera
4e7f20ade9 nixos/prometheus-pihole-exporter: update configuration options
The `interval` configuration option doesn't exist and has been removed.
The `timeout` configuration option has been added.
2023-02-06 11:35:51 +01:00
lucasew
c0d9f21f50 nixos/cockpit: init
Signed-off-by: lucasew <lucas59356@gmail.com>
2023-02-02 14:47:46 -03:00
Ben Collins
dc9fc99c53
Fix mistake in command execution parameter
Invoking cadvisor sent the command line parameter `-storage_driver_user` twice, once passing `cfg.storageDriverHost`. Fix the typo and pass the host config option to the command line parameter `-storage_driver_host`
2023-02-02 10:43:44 -05:00
Thomas Gerbet
34f5d8cd24
Merge pull request #213534 from drupol/add-prometheus-shelly-exporter
prometheus-shelly-exporter: init at 1.0.0
2023-02-02 00:11:56 +01:00
Pol Dellaiera
9f17e032e7
prometheus-shelly-exporter: add NixOS module 2023-02-01 19:49:33 +01:00
pennae
0a6e6cf7e6 nixos/manual: render module chapters with nixos-render-docs
this converts meta.doc into an md pointer, not an xml pointer. since we
no longer need xml for manual chapters we can also remove support for
manual chapters from md-to-db.sh

since pandoc converts smart quotes to docbook quote elements and our
nixos-render-docs does not we lose this distinction in the rendered
output. that's probably not that bad, our stylesheet didn't make use of
this anyway (and pre-23.05 versions of the chapters didn't use quote
elements either).

also updates the nixpkgs manual to clarify that option docs support all
extensions (although it doesn't support headings at all, so heading
anchors don't work by extension).
2023-01-27 20:07:34 +01:00
Julien Malka
808663bd02
nixos/uptime-kuma: add ping in path (#212001)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-01-22 23:03:45 +01:00
Maximilian Bosch
ad6cd4173f
Merge pull request #211894 from chvp/grafana-image-renderer-use-module
nixos/grafana-image-renderer: use grafana freeform settings in provisioning
2023-01-22 19:06:35 +01:00
Julien Malka
85c34d334b nixos/uptime-kuma: add julienmalka as maintainer 2023-01-22 17:39:22 +01:00
Evils
e6fe2eb0ed nixos/tuptime: 5.2.2 renamed option -x to -q 2023-01-21 21:01:26 +01:00
Charlotte Van Petegem
f8a3c4e94f
nixos/grafana-image-renderer: use grafana freeform settings in provisioning 2023-01-21 10:16:41 +01:00
Ryan Lahfa
f8dd03989e
Merge pull request #208038 from SuperSandro2000/uptime-kuma-apprise
nixos/uptime-kuma: add option to enable apprise support
2023-01-15 17:59:00 +01:00
Sandro
fa8ae2120d
Merge pull request #208715 from elohmeier/prom-rspamd-fix
Fixes https://github.com/NixOS/nixpkgs/issues/210390
2023-01-15 02:49:52 +01:00
pennae
53fc887582 nixos/manual: move "edit the MD file" comments to generated XML 2023-01-10 12:34:37 +01:00
pennae
bf92eaebe4 nixos/manual: generate module chapters with md-to-db.sh 2023-01-10 10:32:00 +01:00
pennae
dc7788efb8 nixos/manual: regenerate chapter xml files
apparently pandoc has changed behavior over the past releases, so the
files are no longer in sync. occasionally this requires edits
to the markdown source to not remove an anchor that was there
before (albeit wth a very questionable id), or where things were simply
being misrendered due to syntax errors.
2023-01-10 10:31:59 +01:00
pennae
23ea73b416 nixos/manual: enable smart quotes for all MD chapters 2023-01-10 10:31:59 +01:00
pennae
ce319f60ad nixos/prometheus/exporters: convert manual chapter to MD 2023-01-10 10:31:57 +01:00
Ross Gardiner
b199b821c2 nixos/grafana: fix spelling 2023-01-09 13:02:36 +01:00
Sandro Jäckel
5703c16118
nixos/uptime-kuma: add option to enable apprise support 2023-01-06 16:51:18 +01:00
Vojtěch Káně
d2dcc7a169 nixos/parsedmarc: fix Grafana provisioning
The options' structure was changed in 957e368f3d
2023-01-05 12:20:12 +01:00
Bjørn Forsman
295c552dc9 nixos/apcupsd: wrap CLI with "-f ${configFile}"
This ensures that the CLI is in sync with the service configuration.

(I tried building apcupsd with --sysconfdir=/etc instead, but it wants
to install stuff there at build time, so I backed out.)

Fixes https://github.com/NixOS/nixpkgs/issues/208204.
2023-01-04 21:45:58 +01:00
Enno Richter
ed060ff92b prometheus-exporters: update rspamd exporter for prometheus-json-exporter >=0.5.0 2023-01-02 06:36:22 +01:00
Moritz 'e1mo' Fromm
59c28cab1c
nixos/parsedmarc: follow upstream configuration
> Starting in version 8.0.0, most options from the `imap` section have
been moved to the `mailbox` section.

6b2131f0e8
2022-12-31 16:42:41 +01:00
figsoda
403c65ab00
Merge pull request #207875 from SuperSandro2000/nixos-kuma-fix-link
nixos/uptime-kuma: fix link
2022-12-29 10:18:21 -05:00
Sandro
de1b8b9c0f
Update nixos/modules/services/monitoring/uptime-kuma.nix
Co-authored-by: figsoda <figsoda@pm.me>
2022-12-29 15:41:04 +01:00
Sandro Jäckel
7e0588b2fb
nixos/grafana: listen on localhost by default (again) 2022-12-29 03:00:14 +01:00
Sandro
9bc0aeb745
nixos/uptime-kuma: fix link 2022-12-26 21:52:30 +01:00
Yannick Markus
060f0dd496
nixos/alertmanager: add checkConfig option 2022-12-21 12:29:48 +01:00
Maximilian Bosch
f37f1de422
Merge pull request #204537 from squalus/grafana-role
nixos/grafana: add Admin to valid auto_assign_org_role values
2022-12-20 21:14:47 +01:00
Sandro
bf46d7b626
Merge pull request #172084 from priegger/prometheus-statsd-exporter 2022-12-19 23:16:02 +01:00
Franz Pletz
6f8f1b0454
Merge pull request #205865 from DeeUnderscore/fix/grafana-socket 2022-12-19 12:04:22 +01:00
figsoda
6bb0dbf91f nixos: fix typos 2022-12-17 19:31:14 -05:00
Shawn8901
6e530b9eda prometheus: Adds an option for web.config.file which can specity settings including authorization. 2022-12-15 10:14:42 +01:00
Shawn8901
470247d433 prometheus: Use yaml format generator instaed json for prometheus.yml
Additionally remove an unused variable
2022-12-15 10:11:25 +01:00
D Anzorge
9be81d0acf nixos/grafana: allow @chown syscalls when using unix sockets
Grafana will unconditionally call chown on the socket after creating it,
even if the configuration does not ask for a different socket gid.
2022-12-13 02:47:50 +01:00
Bobby Rong
9015c9f389
Merge pull request #205525 from SuperSandro2000/prometheus2
nixos/alertmanager: fix renamed option
2022-12-12 18:08:36 +08:00
Sandro Jäckel
a49606696e
nixos/alertmanager: fix renamed option 2022-12-10 20:11:18 +01:00
Martin Weinelt
fdcc9e8202
nixos/prometheus.exporters.smartctl: Simplify DeviceAllow logic
Setting up the DeviceAllow list with explicitly configured devices was a
nice idea, but sometimes a configured device (`/dev/nvme0n1` an NVMe
namespace) has a parent device (`/dev/nvme0`) that smartctl needs to
access to query metrics.

Falling back to the block and character definitions is probably a valid
fallback.
2022-12-09 01:40:01 +01:00
Sergey Lukjanov
a49feed255 nixos/prometheus.exporters.smartctl: use cli args instead of config
Config support was dropped and replaced with CLI args
2022-12-08 15:31:33 -08:00
Naïm Favier
0ff3b35356 nixos/doc: fix some options 2022-12-08 17:52:52 +01:00
Jeff Slight
61840f7181
nixos/prometheus: Add new relabel_configs actions
The relabel_configs option for scrape_configs is missing two options: lowercase and uppercase

https://prometheus.io/docs/prometheus/latest/configuration/configuration/#relabel_config
2022-12-07 15:22:04 -08:00
Daniel Nagy
ad866e565d
treewide: switch to port type for nixos modules 2022-12-08 00:00:00 +01:00
squalus
ef90ce7093 nixos/grafana: add Admin to valid auto_assign_org_role values 2022-12-04 13:10:19 -08:00
Luke Granger-Brown
c7918fed9e nixos/prometheus/unifi-poller: rename to unpoller. 2022-12-03 20:12:54 +00:00
Luke Granger-Brown
ffcd97b521 nixos/unifi-poller: rename to unpoller. 2022-12-03 20:12:54 +00:00
Sandro
068e7cb340
Merge pull request #201817 from jhh/nut-exporter 2022-12-03 02:22:48 +01:00
Daniel Nagy
dbe8182e74
treewide: switch to port type for nixos modules 2022-12-01 22:30:00 +01:00
Sandro
03b9249971
Merge pull request #202087 from Shawn8901/pve-load-credential 2022-11-28 23:17:26 +01:00
Jeff Hutchison
a587e528c5
Add prometheus-nut-exporter module 2022-11-24 07:50:09 -05:00
Mathieu Fenniak
eed28ead0c Workaround for upstream crash when !datadog 2022-11-23 12:58:07 -07:00
Mathieu Fenniak
e7f761fe60 Fix executable name 2022-11-23 10:31:46 -07:00
Shawn8901
5ed08d83f7 nixos/prometheus-pve-exporter: Use LoadCredentials to make configFiles readable to DynamicUser 2022-11-21 20:20:50 +01:00
Maximilian Bosch
98cadbcf70
nixos/grafana: review fixes 2022-11-20 19:54:44 +01:00
Maximilian Bosch
6ee5ae3e48
nixos/grafana: make warning more clear 2022-11-20 18:21:41 +01:00
Maximilian Bosch
9d7e9c5965
nixos/grafana: allow using both directories or single YAML files for non-Nix provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch
2f1dfb0db3
nixos/grafana: fix w/o datasources or dashboard provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch
4ec456b725
nixos/grafana: fix secret-related warnings
Closes #198646

* The options `password`/`basicAuthPassword` were removed for
  datasources in Grafana 9. The only option to declare them now is to use
  `secureJsonData`.
* Fix description for contactPoints provisioning: when using file/env
  providers, nothing will be leaked into the store.
* Fix regex in file-provider usage check: it's also possible to either
  use `$__env{FOO}` or `$FOO` to fetch secrets from the environment.
* Fix warning for datasources: `password`/`basicAuthPassword` was
  removed, also check for each setting in `secureJsonData` if
  env/file-provider was used (then no warning is needed!).
2022-11-20 18:21:40 +01:00
Maximilian Bosch
45e1ce7e3a
nixos/grafana: get rid of unnecessary flatten for warnings 2022-11-20 18:21:39 +01:00
Maximilian Bosch
25b5824696
nixos/grafana: mark services.grafana.extraOptions as removed 2022-11-20 18:21:38 +01:00
Maximilian Bosch
957e368f3d
nixos/grafana: provision.{datasources,dashboards} can't be a list anymore
The hack with `either` had the side-effect that the sub-options of the
submodule didn't appear in the manual. I decided to remove this because
the "migration" isn't that hard, you just need to fix some module
declarations.

However, `mkRenamedOptionModule` wouldn't work here because it'd create
a "virtual" option for the deprecated path (i.e.
`services.grafana.provision.{datasources,dashboards}`), but that's the
already a new option, i.e. the submodule for the new stuff.

To make sure that you still get errors, I implemented a small hack using
`coercedTo` which throws an error if a list is specified (as it would be
done on 22.05) which explains what to do instead to make the migration
easier.

Also, I linkified the options in the manual now to make it easier to
navigate between those.
2022-11-20 18:21:35 +01:00
happysalada
4a3aa6ff98 tremor-rs: module init 2022-11-19 11:41:21 -05:00
Franz Pletz
8cc2dcce7d
Merge pull request #199524 from ymarkus/zfs-exporter
nixos/prometheus-zfs-exporter: init
2022-11-11 02:01:13 +01:00
Franz Pletz
286f868a5c
Merge pull request #162057 from jdheyburn/jdheyburn-unifi-prometheus-exporter-loki 2022-11-11 01:31:41 +01:00
Franz Pletz
8e9f00682d
nixos/prometheus-zfs-exporter: mdDoc descriptions 2022-11-11 01:29:10 +01:00
Daniel Nagy
b4674b39c1
treewide: use mkEnableOption in nixos modules 2022-11-10 09:30:00 +01:00
Daniel Nagy
095269c862
treewide: use types.port in nixos modules 2022-11-10 09:30:00 +01:00
Robert Hensing
93a905ec4f
Merge pull request #194759 from hercules-ci/fqdn-or-hostname
nixos: Add `networking.fqdnOrHostName`
2022-11-09 13:53:57 +01:00
Maximilian Bosch
dcb32beda0
nixos/prometheus: fix startup w/hardened service
See the discussion below the original PR[1] and #197443 for more
context.

I guess I missed that upon review because the branch was too old and I
cherry-picked the commit onto my deployment branch which is based on
22.05. Sorry for that!

[1] https://github.com/NixOS/nixpkgs/pull/162784#issuecomment-1306848036
2022-11-08 17:46:35 +01:00
David Arnold
2aa5c8d3ab nixos/teamviewer: fix for non-NetworkManager environments 2022-11-07 19:54:25 +01:00
Maximilian Bosch
58227c4de0
Merge pull request #162784 from amarshall/prom-svc-harden
nixos/prometheus: Harden systemd service
2022-11-07 15:03:43 +01:00
Franz Pletz
7519cb2c7c
Merge pull request #198638 from KFearsoff/fix-node-exporter-netdev-collector
nixos/prometheus-node-exporter: fix netdev collect
2022-11-06 12:05:09 +01:00
Yannick Markus
50f308b059 nixos/prometheus-zfs-exporter: init 2022-11-04 14:43:01 +01:00
Sandro
b99b28431c
Merge pull request #197987 from SuperSandro2000/grafana-socket 2022-10-31 01:45:42 +01:00
KFears
b3782f29ff nixos/prometheus-node-exporter: fix netdev collect
Netdev collector needs AF_NETLINK permissions to work. It will fail with
the message "couldn't get netstats: socket: address family is not
supported by protocol" otherwise.
2022-10-30 14:59:05 +04:00
Yorick van Pelt
af4a43e36a
treewide: convert fake octal ints to strings
These were being cast to strings later and then reinterpreted as
octal.
2022-10-28 17:23:44 +02:00
Martin Weinelt
96d7f29087
Merge pull request #176553 from MalteT/fix/smartctl-exporter-override 2022-10-27 15:50:54 +02:00
Sandro Jäckel
95a7b35b1c
nixos/grafana: add default value back to settings.server.socket 2022-10-27 00:53:46 +02:00
KFears
f2e74bdf57 nixos/grafana: fix secrets-related warnings 2022-10-26 21:03:57 +04:00
MidAutumnMoon
afb8d0e5a6
nixos/prometheus-smartctl: set proper SystemCallFilter 2022-10-25 16:47:09 +08:00
KFears
f3cb29a5b8 nixos/grafana: fix issues with rfc42 refactoring 2022-10-24 19:31:50 +04:00
Maximilian Bosch
f9afc634e3
Merge pull request #191768 from KFearsoff/grafana-rfc42
nixos/grafana: refactor for RFC42
2022-10-23 13:28:25 +02:00
Julien Malka
b54ae5a868 nixos/uptime-kuma: init module 2022-10-23 12:44:16 +02:00
KFears
9f963f36e5 nixos/grafana: refactor settings for RFC42 2022-10-22 23:56:14 +04:00
KFears
c7cd659710 nixos/grafana: fix markdown docs 2022-10-22 23:54:32 +04:00
KFears
7908ef062f nixos/grafana: add alerting 2022-10-22 23:54:32 +04:00
KFears
34c2ea6750 nixos/grafana: deprecate notifiers 2022-10-22 23:54:31 +04:00
KFears
0852dc859e nixos/grafana: refactor datasources for RFC42
This commit refactors `services.grafana.provision.datasources` towards
the RFC42 style. To preserve backwards compatibility, we have to jump
through a ton of hoops, introducing esoteric type signatures and bizarre
structs. The Grafana module definition should hopefully become a lot
cleaner after a release cycle or two once the old configuration style is
completely deprecated.
2022-10-22 23:53:24 +04:00
KFears
89e30315e0 nixos/grafana: refactor dashboards for RFC42
This commit refactors `services.grafana.provision.dashboards` towards
the RFC42 style. To preserve backwards compatibility, we have to jump
through a ton of hoops, introducing esoteric type signatures and bizarre
structs. The Grafana module definition should hopefully become a lot
cleaner after a release cycle or two once the old configuration style is
completely deprecated.
2022-10-21 16:42:30 +04:00
Martin Weinelt
5d2330ddb5
Merge pull request #195760 from jmbaur/prometheus-kea-exporter 2022-10-19 14:02:15 +02:00
Sandro
2917c9a67e
Merge pull request #195205 from NULLx76/vmagent 2022-10-18 21:16:10 +02:00
Sandro
7307c3ae6c
Merge pull request #191922 from NukaDuka/karma 2022-10-18 21:10:04 +02:00
victor
28d2fcc400 vmagent: init at 1.82.0 2022-10-13 13:32:47 +02:00
Maximilian Bosch
0df6c52026
nixos/grafana: ensure that declarative prometheus data-sources don't use direct access
Support for that was permanently dropped in Grafana 9.2.0, see also
f30795b088
2022-10-13 10:28:29 +02:00
Jared Baur
5d79c93d77
nixos/prometheus-kea-exporter: Fix ExecStart arguments
The current `ExecStart` will not allow for multiple sockets to properly
be passed to the program since the extra newline character is interpreted to
be part of the socket path.
2022-10-12 20:39:09 -07:00
Kartik Gokte
8d5a404437 nixos/karma: init 2022-10-10 10:46:25 +05:30
Robert Hensing
185f12d96f nixos/smartd: Refactor to use config.networking.fqdnOrHostName 2022-10-06 16:24:34 +02:00
Martin Weinelt
b76d66b4fd nixos/sachet: replace literalExample with literalExpression 2022-09-29 21:13:50 -04:00
Sandro
d374d79d89
Merge pull request #190496 from NukaDuka/kthxbye 2022-09-25 23:43:29 +02:00
Kartik Gokte
5a93846946 nixos/kthxbye: init 2022-09-26 00:16:03 +05:30
Domen Kožar
efdea4930c
Merge pull request #187857 from Sohalt/remove-dd-agent
dd-agent: remove
2022-09-14 13:25:50 +01:00