Compare commits

...

2 commits

Author SHA1 Message Date
uku
373e2dd386
chore: cleanups 2024-12-31 16:08:29 +01:00
uku
250c600a48
chore(vesuvio): split config into multiple files 2024-12-31 16:06:33 +01:00
6 changed files with 97 additions and 90 deletions

View file

@ -1,4 +1,3 @@
{ ... }:
{
services.immich = {
enable = true;

View file

@ -24,51 +24,53 @@ in
};
};
services.grafana = {
enable = true;
settings = {
server = {
http_port = 2432;
root_url = "https://grafana.uku3lig.net";
services = {
grafana = {
enable = true;
settings = {
server = {
http_port = 2432;
root_url = "https://grafana.uku3lig.net";
};
};
};
};
services.victoriametrics = {
enable = true;
listenAddress = "127.0.0.1:9090";
retentionPeriod = "5y";
};
victoriametrics = {
enable = true;
listenAddress = "127.0.0.1:9090";
retentionPeriod = "5y";
};
services.vmagent = {
enable = true;
prometheusConfig = {
global.scrape_interval = "15s";
vmagent = {
enable = true;
prometheusConfig = {
global.scrape_interval = "15s";
# node scraping is sent to vm directly via vmauth
scrape_configs = [
# node scraping is sent to vm directly via vmauth
scrape_configs = [
{
job_name = "victoriametrics";
static_configs = [ { targets = [ "${builtins.toString vmcfg.listenAddress}" ]; } ];
}
{
job_name = "api-rs";
static_configs = [ { targets = [ "localhost:5001" ]; } ];
}
];
};
};
vmauth = {
enable = true;
listenAddress = "127.0.0.1:9089";
environmentFile = vmauthEnv.path;
authConfig.users = [
{
job_name = "victoriametrics";
static_configs = [ { targets = [ "${builtins.toString vmcfg.listenAddress}" ]; } ];
}
{
job_name = "api-rs";
static_configs = [ { targets = [ "localhost:5001" ]; } ];
bearer_token = "%{VM_AUTH_TOKEN}";
url_prefix = "http://${vmcfg.listenAddress}";
}
];
};
};
services.vmauth = {
enable = true;
listenAddress = "127.0.0.1:9089";
environmentFile = vmauthEnv.path;
authConfig.users = [
{
bearer_token = "%{VM_AUTH_TOKEN}";
url_prefix = "http://${vmcfg.listenAddress}";
}
];
};
}

View file

@ -43,7 +43,7 @@
replacements = [
{
oldDependency = pkgs.ffmpeg-full;
newDependency = (pkgs.ffmpeg-full.override { withUnfree = true; });
newDependency = pkgs.ffmpeg-full.override { withUnfree = true; };
}
];
};

View file

@ -1,60 +1,17 @@
{ pkgs, ... }:
{
pkgs,
config,
_utils,
...
}:
let
secrets = _utils.setupSharedSecrets config { secrets = [ "frpToken" ]; };
in
{
imports = [ secrets.generate ];
zramSwap.enable = true;
imports = [
./frp.nix
./hetzner.nix
];
environment.systemPackages = with pkgs; [
dig
traceroute
];
services = {
openssh.ports = [ 4269 ];
# Needed by the Hetzner Cloud password reset feature.
qemuGuest.enable = true;
resolved = {
dnssec = "allow-downgrade";
dnsovertls = "false";
};
frp = {
enable = true;
role = "server";
settings = {
bindPort = 7000;
auth = {
method = "token";
token = "{{ .Envs.FRP_TOKEN }}";
};
};
};
};
systemd.services = {
frp.serviceConfig.EnvironmentFile = secrets.get "frpToken";
# https://discourse.nixos.org/t/qemu-guest-agent-on-hetzner-cloud-doesnt-work/8864/2
qemu-guest-agent.path = [ pkgs.shadow ];
};
networking.firewall = {
allowedTCPPorts = [ 22 ]; # forgejo-ssh
allowedTCPPortRanges = [
{
from = 6000;
to = 7000;
}
];
services.openssh = {
ports = [ 4269 ];
openFirewall = true;
};
}

31
systems/vesuvio/frp.nix Normal file
View file

@ -0,0 +1,31 @@
{ config, _utils, ... }:
let
secrets = _utils.setupSharedSecrets config { secrets = [ "frpToken" ]; };
in
{
imports = [ secrets.generate ];
services.frp = {
enable = true;
role = "server";
settings = {
bindPort = 7000;
auth = {
method = "token";
token = "{{ .Envs.FRP_TOKEN }}";
};
};
};
networking.firewall = {
allowedTCPPorts = [ 22 ]; # forgejo-ssh
allowedTCPPortRanges = [
{
from = 6000;
to = 7000;
}
];
};
systemd.services.frp.serviceConfig.EnvironmentFile = secrets.get "frpToken";
}

View file

@ -0,0 +1,18 @@
{ pkgs, ... }:
{
services = {
# Needed by the Hetzner Cloud password reset feature.
qemuGuest.enable = true;
# Hetzner DNS does not work with DoT
resolved = {
dnssec = "allow-downgrade";
dnsovertls = "false";
};
};
# https://discourse.nixos.org/t/qemu-guest-agent-on-hetzner-cloud-doesnt-work/8864/2
systemd.services.qemu-guest-agent.path = [ pkgs.shadow ];
zramSwap.enable = true;
}