134 lines
3.6 KiB
Nix
134 lines
3.6 KiB
Nix
{ cluster, config, depot, lib, pkgs, ... }:
|
|
let
|
|
inherit (depot.lib.meta) domain;
|
|
|
|
inherit (cluster.config.links) loki-ingest prometheus-ingest;
|
|
|
|
inherit (cluster.config) hostLinks;
|
|
|
|
inherit (config.networking) hostName;
|
|
|
|
svc = cluster.config.services.monitoring;
|
|
|
|
iniList = lib.concatStringsSep " ";
|
|
|
|
login = x: "https://login.${domain}/auth/realms/master/protocol/openid-connect/${x}";
|
|
in
|
|
{
|
|
age.secrets = {
|
|
grafana-db-credentials = {
|
|
file = ./secrets/grafana-db-credentials.age;
|
|
owner = "grafana";
|
|
};
|
|
grafana-secrets.file = ./secrets/grafana-secrets.age;
|
|
};
|
|
|
|
services.grafana = {
|
|
enable = true;
|
|
package = depot.packages.grafana;
|
|
settings = {
|
|
server = {
|
|
root_url = "https://monitoring.${domain}/";
|
|
http_addr = hostLinks.${hostName}.grafana.ipv4;
|
|
http_port = hostLinks.${hostName}.grafana.port;
|
|
};
|
|
database = {
|
|
type = "postgres";
|
|
host = cluster.config.links.patroni-pg-access.tuple;
|
|
user = "grafana";
|
|
password = "$__file{${config.age.secrets.grafana-db-credentials.path}}";
|
|
};
|
|
analytics.reporting_enabled = false;
|
|
"auth.generic_oauth" = {
|
|
enabled = true;
|
|
allow_sign_up = true;
|
|
client_id = "net.privatevoid.monitoring1";
|
|
auth_url = login "auth";
|
|
token_url = login "token";
|
|
api_url = login "userinfo";
|
|
scopes = iniList [ "openid" "profile" "email" "roles" ];
|
|
role_attribute_strict = true;
|
|
role_attribute_path = "resource_access.monitoring.roles[0]";
|
|
};
|
|
security = {
|
|
cookie_secure = true;
|
|
disable_gravatar = true;
|
|
};
|
|
feature_toggles.enable = iniList [
|
|
"tempoSearch"
|
|
"tempoBackendSearch"
|
|
"tempoServiceGraph"
|
|
];
|
|
};
|
|
provision = {
|
|
enable = true;
|
|
datasources.settings.datasources = [
|
|
{
|
|
name = "Prometheus";
|
|
uid = "PBFA97CFB590B2093";
|
|
inherit (prometheus-ingest) url;
|
|
type = "prometheus";
|
|
isDefault = true;
|
|
}
|
|
{
|
|
name = "Loki";
|
|
uid = "P8E80F9AEF21F6940";
|
|
inherit (loki-ingest) url;
|
|
type = "loki";
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
systemd.services = {
|
|
grafana = {
|
|
distributed = {
|
|
enable = true;
|
|
registerService = "grafana";
|
|
};
|
|
serviceConfig = {
|
|
EnvironmentFile = config.age.secrets.grafana-secrets.path;
|
|
Restart = "on-failure";
|
|
RestartSec = "10s";
|
|
};
|
|
};
|
|
};
|
|
|
|
services.nginx = {
|
|
upstreams.grafana-ha.servers = lib.mapAttrs' (_: links: lib.nameValuePair links.grafana.tuple {}) (lib.getAttrs (svc.nodes.grafana) hostLinks);
|
|
|
|
virtualHosts."monitoring.${domain}" = lib.recursiveUpdate (depot.lib.nginx.vhosts.proxy "http://grafana-ha") {
|
|
locations."/".proxyWebsockets = true;
|
|
};
|
|
};
|
|
|
|
security.acme.certs."monitoring.${domain}" = {
|
|
dnsProvider = "exec";
|
|
webroot = lib.mkForce null;
|
|
};
|
|
|
|
consul.services.grafana = {
|
|
mode = "manual";
|
|
definition = rec {
|
|
name = "grafana";
|
|
address = depot.reflection.interfaces.primary.addrPublic;
|
|
port = 443;
|
|
checks = [
|
|
rec {
|
|
name = "Frontend";
|
|
id = "service:grafana:frontend";
|
|
interval = "30s";
|
|
http = "https://${address}/healthz";
|
|
tls_server_name = "monitoring.${domain}";
|
|
header.Host = lib.singleton tls_server_name;
|
|
}
|
|
{
|
|
name = "Backend";
|
|
id = "service:grafana:backend";
|
|
interval = "5s";
|
|
http = "${hostLinks.${hostName}.grafana.url}/healthz";
|
|
}
|
|
];
|
|
};
|
|
};
|
|
}
|