forked from rarias/jungle
		
	
		
			
				
	
	
		
			218 lines
		
	
	
		
			6.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			218 lines
		
	
	
		
			6.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, lib, pkgs, ... }:
 | 
						|
 | 
						|
{
 | 
						|
  imports = [
 | 
						|
    ../module/meteocat-exporter.nix
 | 
						|
    ../module/upc-qaire-exporter.nix
 | 
						|
    ../module/nix-daemon-exporter.nix
 | 
						|
  ];
 | 
						|
 | 
						|
  age.secrets.grafanaJungleRobotPassword = {
 | 
						|
    file = ../../secrets/jungle-robot-password.age;
 | 
						|
    owner = "grafana";
 | 
						|
    mode = "400";
 | 
						|
  };
 | 
						|
 | 
						|
  services.grafana = {
 | 
						|
    enable = true;
 | 
						|
    settings = {
 | 
						|
      server = {
 | 
						|
        domain = "jungle.bsc.es";
 | 
						|
        root_url = "%(protocol)s://%(domain)s/grafana";
 | 
						|
        serve_from_sub_path = true;
 | 
						|
        http_port = 2342;
 | 
						|
        http_addr = "127.0.0.1";
 | 
						|
      };
 | 
						|
      smtp = {
 | 
						|
        enabled = true;
 | 
						|
        from_address = "jungle-robot@bsc.es";
 | 
						|
        user = "jungle-robot";
 | 
						|
        # Read the password from a file, which is only readable by grafana user
 | 
						|
        # https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider
 | 
						|
        password = "$__file{${config.age.secrets.grafanaJungleRobotPassword.path}}";
 | 
						|
        host = "mail.bsc.es:465";
 | 
						|
        startTLS_policy = "NoStartTLS";
 | 
						|
      };
 | 
						|
      feature_toggles.publicDashboards = true;
 | 
						|
      "auth.anonymous".enabled = true;
 | 
						|
      log.level = "warn";
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  services.prometheus = {
 | 
						|
    enable = true;
 | 
						|
    port = 9001;
 | 
						|
    retentionTime = "5y";
 | 
						|
    listenAddress = "127.0.0.1";
 | 
						|
  };
 | 
						|
 | 
						|
  # We need access to the devices to monitor the disk space
 | 
						|
  systemd.services.prometheus-node-exporter.serviceConfig.PrivateDevices = lib.mkForce false;
 | 
						|
  systemd.services.prometheus-node-exporter.serviceConfig.ProtectHome = lib.mkForce "read-only";
 | 
						|
 | 
						|
  # Credentials for IPMI exporter
 | 
						|
  age.secrets.ipmiYml = {
 | 
						|
    file = ../../secrets/ipmi.yml.age;
 | 
						|
    owner = "ipmi-exporter";
 | 
						|
  };
 | 
						|
 | 
						|
  # Create an IPMI group and assign the ipmi0 device
 | 
						|
  users.groups.ipmi = {};
 | 
						|
  services.udev.extraRules = ''
 | 
						|
    SUBSYSTEM=="ipmi", KERNEL=="ipmi0", GROUP="ipmi", MODE="0660"
 | 
						|
  '';
 | 
						|
 | 
						|
  # Add a new ipmi-exporter user that can read the ipmi0 device
 | 
						|
  users.users.ipmi-exporter = {
 | 
						|
    isSystemUser = true;
 | 
						|
    group = "ipmi";
 | 
						|
  };
 | 
						|
 | 
						|
  # Disable dynamic user so we have the ipmi-exporter user available for the credentials
 | 
						|
  systemd.services.prometheus-ipmi-exporter.serviceConfig = {
 | 
						|
    DynamicUser = lib.mkForce false;
 | 
						|
    PrivateDevices = lib.mkForce false;
 | 
						|
    User = lib.mkForce "ipmi-exporter";
 | 
						|
    Group = lib.mkForce "ipmi";
 | 
						|
    RestrictNamespaces = lib.mkForce false;
 | 
						|
    # Fake uid to 0 so it shuts up
 | 
						|
    ExecStart = let
 | 
						|
      cfg = config.services.prometheus.exporters.ipmi;
 | 
						|
    in lib.mkForce (lib.concatStringsSep " " ([
 | 
						|
      "${pkgs.util-linux}/bin/unshare --map-user 0"
 | 
						|
      "${pkgs.prometheus-ipmi-exporter}/bin/ipmi_exporter"
 | 
						|
      "--web.listen-address ${cfg.listenAddress}:${toString cfg.port}"
 | 
						|
      "--config.file ${lib.escapeShellArg cfg.configFile}"
 | 
						|
    ] ++ cfg.extraFlags));
 | 
						|
  };
 | 
						|
 | 
						|
  services.prometheus = {
 | 
						|
    exporters = {
 | 
						|
      ipmi = {
 | 
						|
        enable = true;
 | 
						|
        configFile = config.age.secrets.ipmiYml.path;
 | 
						|
        #extraFlags = [ "--log.level=debug" ];
 | 
						|
        listenAddress = "127.0.0.1";
 | 
						|
      };
 | 
						|
      node = {
 | 
						|
        enable = true;
 | 
						|
        enabledCollectors = [ "logind" ];
 | 
						|
        port = 9002;
 | 
						|
        listenAddress = "127.0.0.1";
 | 
						|
      };
 | 
						|
      blackbox = {
 | 
						|
        enable = true;
 | 
						|
        listenAddress = "127.0.0.1";
 | 
						|
        configFile = ./blackbox.yml;
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
    scrapeConfigs = [
 | 
						|
      {
 | 
						|
        job_name = "local";
 | 
						|
        static_configs = [{
 | 
						|
          targets = [
 | 
						|
            "127.0.0.1:9002" # Node exporter
 | 
						|
            #"127.0.0.1:9115" # Blackbox exporter
 | 
						|
            "127.0.0.1:9290" # IPMI exporter for local node
 | 
						|
            "127.0.0.1:9928" # UPC Qaire custom exporter
 | 
						|
            "127.0.0.1:9929" # Meteocat custom exporter
 | 
						|
            "127.0.0.1:9999" # Nix-daemon custom exporter
 | 
						|
          ];
 | 
						|
        }];
 | 
						|
      }
 | 
						|
      {
 | 
						|
        job_name = "blackbox-http";
 | 
						|
        metrics_path = "/probe";
 | 
						|
        params = { module = [ "http_2xx" ]; };
 | 
						|
        static_configs = [{
 | 
						|
          targets = [
 | 
						|
            "https://www.google.com/robots.txt"
 | 
						|
            "https://pm.bsc.es/"
 | 
						|
            "https://pm.bsc.es/gitlab/"
 | 
						|
            "https://jungle.bsc.es/"
 | 
						|
            "https://gitlab.bsc.es/"
 | 
						|
          ];
 | 
						|
        }];
 | 
						|
        relabel_configs = [
 | 
						|
          {
 | 
						|
            # Takes the address and sets it in the "target=<xyz>" URL parameter
 | 
						|
            source_labels = [ "__address__" ];
 | 
						|
            target_label = "__param_target";
 | 
						|
          }
 | 
						|
          {
 | 
						|
            # Sets the "instance" label with the remote host we are querying
 | 
						|
            source_labels = [ "__param_target" ];
 | 
						|
            target_label = "instance";
 | 
						|
          }
 | 
						|
          {
 | 
						|
            # Shows the host target address instead of the blackbox address
 | 
						|
            target_label = "__address__";
 | 
						|
            replacement = "127.0.0.1:9115";
 | 
						|
          }
 | 
						|
        ];
 | 
						|
      }
 | 
						|
      {
 | 
						|
        job_name = "blackbox-icmp";
 | 
						|
        metrics_path = "/probe";
 | 
						|
        params = { module = [ "icmp" ]; };
 | 
						|
        static_configs = [{
 | 
						|
          targets = [
 | 
						|
            "1.1.1.1"
 | 
						|
            "8.8.8.8"
 | 
						|
            "ssfhead"
 | 
						|
            "raccoon"
 | 
						|
            "anella-bsc.cesca.cat"
 | 
						|
            "upc-anella.cesca.cat"
 | 
						|
            "fox.ac.upc.edu"
 | 
						|
            "fox-ipmi.ac.upc.edu"
 | 
						|
            "arenys5.ac.upc.edu"
 | 
						|
            "arenys0-2.ac.upc.edu"
 | 
						|
            "epi01.bsc.es"
 | 
						|
            "axle.bsc.es"
 | 
						|
          ];
 | 
						|
        }];
 | 
						|
        relabel_configs = [
 | 
						|
          {
 | 
						|
            # Takes the address and sets it in the "target=<xyz>" URL parameter
 | 
						|
            source_labels = [ "__address__" ];
 | 
						|
            target_label = "__param_target";
 | 
						|
          }
 | 
						|
          {
 | 
						|
            # Sets the "instance" label with the remote host we are querying
 | 
						|
            source_labels = [ "__param_target" ];
 | 
						|
            target_label = "instance";
 | 
						|
          }
 | 
						|
          {
 | 
						|
            # Shows the host target address instead of the blackbox address
 | 
						|
            target_label = "__address__";
 | 
						|
            replacement = "127.0.0.1:9115";
 | 
						|
          }
 | 
						|
        ];
 | 
						|
      }
 | 
						|
      {
 | 
						|
        job_name = "ipmi-raccoon";
 | 
						|
        metrics_path = "/ipmi";
 | 
						|
        static_configs = [
 | 
						|
          { targets = [ "127.0.0.1:9290" ]; }
 | 
						|
        ];
 | 
						|
        params = {
 | 
						|
          target = [ "raccoon-ipmi" ];
 | 
						|
          module = [ "raccoon" ];
 | 
						|
        };
 | 
						|
      }
 | 
						|
      {
 | 
						|
        job_name = "ipmi-fox";
 | 
						|
        metrics_path = "/ipmi";
 | 
						|
        static_configs = [
 | 
						|
          { targets = [ "127.0.0.1:9290" ]; }
 | 
						|
        ];
 | 
						|
        params = {
 | 
						|
          target = [ "fox-ipmi.ac.upc.edu" ];
 | 
						|
          module = [ "fox" ];
 | 
						|
        };
 | 
						|
      }
 | 
						|
    ];
 | 
						|
  };
 | 
						|
}
 |