diff options
Diffstat (limited to 'hosts/vidhar/prometheus/default.nix')
| -rw-r--r-- | hosts/vidhar/prometheus/default.nix | 68 |
1 files changed, 68 insertions, 0 deletions
diff --git a/hosts/vidhar/prometheus/default.nix b/hosts/vidhar/prometheus/default.nix index 094f9f7a..df135b58 100644 --- a/hosts/vidhar/prometheus/default.nix +++ b/hosts/vidhar/prometheus/default.nix | |||
| @@ -145,6 +145,17 @@ in { | |||
| 145 | ]; | 145 | ]; |
| 146 | scrape_interval = "15s"; | 146 | scrape_interval = "15s"; |
| 147 | } | 147 | } |
| 148 | { job_name = "zte"; | ||
| 149 | static_configs = [ | ||
| 150 | { targets = ["localhost:9900"]; } | ||
| 151 | ]; | ||
| 152 | relabel_configs = [ | ||
| 153 | { replacement = "dsl01"; | ||
| 154 | target_label = "instance"; | ||
| 155 | } | ||
| 156 | ]; | ||
| 157 | scrape_interval = "15s"; | ||
| 158 | } | ||
| 148 | { job_name = "unbound"; | 159 | { job_name = "unbound"; |
| 149 | static_configs = [ | 160 | static_configs = [ |
| 150 | { targets = ["localhost:${toString config.services.prometheus.exporters.unbound.port}"]; } | 161 | { targets = ["localhost:${toString config.services.prometheus.exporters.unbound.port}"]; } |
| @@ -288,6 +299,22 @@ in { | |||
| 288 | } | 299 | } |
| 289 | ]; | 300 | ]; |
| 290 | } | 301 | } |
| 302 | { name = "dsl-disconnects"; | ||
| 303 | rules = [ | ||
| 304 | { record = "dsl_uptime_seconds:resets_per_hour"; | ||
| 305 | expr = "resets(dsl_uptime_seconds[1h])"; | ||
| 306 | } | ||
| 307 | { record = "dsl_uptime_seconds:resets_per_day"; | ||
| 308 | expr = "resets(dsl_uptime_seconds[1d])"; | ||
| 309 | } | ||
| 310 | { record = "dsl_uptime_seconds:resets_per_week"; | ||
| 311 | expr = "resets(dsl_uptime_seconds[1w])"; | ||
| 312 | } | ||
| 313 | { record = "dsl_uptime_seconds:avg_resets_per_day"; | ||
| 314 | expr = "avg_over_time(dsl_uptime_seconds:resets_per_day[1w])"; | ||
| 315 | } | ||
| 316 | ]; | ||
| 317 | } | ||
| 291 | ]; | 318 | ]; |
| 292 | }) | 319 | }) |
| 293 | ]; | 320 | ]; |
| @@ -425,6 +452,47 @@ in { | |||
| 425 | }; | 452 | }; |
| 426 | }; | 453 | }; |
| 427 | 454 | ||
| 455 | systemd.services."prometheus-zte-exporter@dsl01.mgmt.yggdrasil" = { | ||
| 456 | wantedBy = [ "multi-user.target" ]; | ||
| 457 | after = [ "network.target" ]; | ||
| 458 | serviceConfig = { | ||
| 459 | Restart = "always"; | ||
| 460 | PrivateTmp = true; | ||
| 461 | WorkingDirectory = "/tmp"; | ||
| 462 | DynamicUser = true; | ||
| 463 | CapabilityBoundingSet = [""]; | ||
| 464 | DeviceAllow = [""]; | ||
| 465 | LockPersonality = true; | ||
| 466 | MemoryDenyWriteExecute = true; | ||
| 467 | NoNewPrivileges = true; | ||
| 468 | PrivateDevices = true; | ||
| 469 | ProtectClock = true; | ||
| 470 | ProtectControlGroups = true; | ||
| 471 | ProtectHome = true; | ||
| 472 | ProtectHostname = true; | ||
| 473 | ProtectKernelLogs = true; | ||
| 474 | ProtectKernelModules = true; | ||
| 475 | ProtectKernelTunables = true; | ||
| 476 | ProtectSystem = "strict"; | ||
| 477 | RemoveIPC = true; | ||
| 478 | RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; | ||
| 479 | RestrictNamespaces = true; | ||
| 480 | RestrictRealtime = true; | ||
| 481 | RestrictSUIDSGID = true; | ||
| 482 | SystemCallArchitectures = "native"; | ||
| 483 | UMask = "0077"; | ||
| 484 | |||
| 485 | Type = "simple"; | ||
| 486 | ExecStart = "${pkgs.zte-prometheus-exporter}/bin/zte-prometheus-exporter"; | ||
| 487 | Environment = "ZTE_BASEURL=http://10.141.1.3 ZTE_HOSTNAME=localhost ZTE_PORT=9900"; | ||
| 488 | EnvironmentFile = config.sops.secrets."zte_dsl01.mgmt.yggdrasil".path; | ||
| 489 | }; | ||
| 490 | }; | ||
| 491 | sops.secrets."zte_dsl01.mgmt.yggdrasil" = { | ||
| 492 | format = "binary"; | ||
| 493 | sopsFile = ./zte_dsl01.mgmt.yggdrasil; | ||
| 494 | }; | ||
| 495 | |||
| 428 | services.nginx = { | 496 | services.nginx = { |
| 429 | upstreams.prometheus = { | 497 | upstreams.prometheus = { |
| 430 | servers = { "localhost:${toString config.services.prometheus.port}" = {}; }; | 498 | servers = { "localhost:${toString config.services.prometheus.port}" = {}; }; |
