diff options
author | Gauvain 'GovanifY' Roussel-Tarbouriech <gauvain@govanify.com> | 2021-07-10 12:23:04 +0200 |
---|---|---|
committer | Winter <winter@winter.cafe> | 2022-08-27 12:41:54 -0400 |
commit | f7e49fae0d5f35978314d341b6e6f2a78d157bad (patch) | |
tree | 2abf6f3bc0bfa489ce5743baedb067948dc6d966 /nixos/modules | |
parent | 6953eca70de848407939484ff78d1a460b503165 (diff) | |
download | nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.tar nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.tar.gz nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.tar.bz2 nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.tar.lz nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.tar.xz nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.tar.zst nixlib-f7e49fae0d5f35978314d341b6e6f2a78d157bad.zip |
nixos/prometheus.sachet: add module
Diffstat (limited to 'nixos/modules')
-rw-r--r-- | nixos/modules/module-list.nix | 1 | ||||
-rw-r--r-- | nixos/modules/services/monitoring/prometheus/sachet.nix | 88 |
2 files changed, 89 insertions, 0 deletions
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index e632a760f892..6e95c45f0d56 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -692,6 +692,7 @@ ./services/monitoring/prometheus/alertmanager.nix ./services/monitoring/prometheus/exporters.nix ./services/monitoring/prometheus/pushgateway.nix + ./services/monitoring/prometheus/sachet.nix ./services/monitoring/prometheus/xmpp-alerts.nix ./services/monitoring/riemann.nix ./services/monitoring/riemann-dash.nix diff --git a/nixos/modules/services/monitoring/prometheus/sachet.nix b/nixos/modules/services/monitoring/prometheus/sachet.nix new file mode 100644 index 000000000000..f40229df8f1e --- /dev/null +++ b/nixos/modules/services/monitoring/prometheus/sachet.nix @@ -0,0 +1,88 @@ +{ config, pkgs, lib, ... }: + +with lib; + +let + cfg = config.services.prometheus.sachet; + configFile = pkgs.writeText "sachet.yml" (builtins.toJSON cfg.configuration); +in +{ + options = { + services.prometheus.sachet = { + enable = mkEnableOption "Sachet, an SMS alerting tool for the Prometheus Alertmanager"; + + configuration = mkOption { + type = types.nullOr types.attrs; + default = null; + example = literalExample '' + { + providers = { + twilio = { + # environment variables gets expanded at runtime + account_sid = "$TWILIO_ACCOUNT"; + auth_token = "$TWILIO_TOKEN"; + }; + }; + templates = [ ./some-template.tmpl ]; + receivers = [{ + name = "pager"; + provider = "twilio"; + to = [ "+33123456789" ]; + text = "{{ template \"message\" . }}"; + }]; + } + ''; + description = '' + Sachet's configuration as a nix attribute set. + ''; + }; + + address = mkOption { + type = types.str; + default = "localhost"; + description = '' + The address Sachet will listen to. + ''; + }; + + port = mkOption { + type = types.port; + default = 9876; + description = '' + The port Sachet will listen to. + ''; + }; + + }; + }; + + config = mkIf cfg.enable { + assertions = singleton { + assertion = cfg.configuration != null; + message = "Cannot enable Sachet without a configuration."; + }; + + systemd.services.sachet = { + wantedBy = [ "multi-user.target" ]; + after = [ "network.target" "network-online.target" ]; + script = '' + ${pkgs.envsubst}/bin/envsubst -i "${configFile}" > /tmp/sachet.yaml + exec ${pkgs.prometheus-sachet}/bin/sachet -config /tmp/sachet.yaml -listen-address ${cfg.address}:${builtins.toString cfg.port} + ''; + + serviceConfig = { + Restart = "always"; + + ProtectSystem = "strict"; + ProtectHome = true; + ProtectKernelTunables = true; + ProtectKernelModules = true; + ProtectControlGroups = true; + + DynamicUser = true; + PrivateTmp = true; + WorkingDirectory = "/tmp/"; + }; + }; + }; +} |