From 9216da8928bc17878635ef50dac089f01a8c6466 Mon Sep 17 00:00:00 2001 From: WilliButz Date: Thu, 2 Aug 2018 15:27:00 +0200 Subject: nixos/prometheus-exporters: use nixos-fw chain Use nixos-fw chain instead of INPUT so that the rules don't keep stacking everytime the firewall is reloaded. This also adds a comment to each rule about the associated exporter. --- nixos/modules/services/monitoring/prometheus/exporters.nix | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/nixos/modules/services/monitoring/prometheus/exporters.nix b/nixos/modules/services/monitoring/prometheus/exporters.nix index 9c58a15bcd73..1d5f400250fd 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters.nix @@ -73,7 +73,7 @@ let description = '' Specify a filter for iptables to use when - is true. It is used as `ip46tables -I INPUT -j ACCEPT`. + is true. It is used as `ip46tables -I nixos-fw -j nixos-fw-accept`. ''; }; user = mkOption { @@ -116,9 +116,10 @@ let mkExporterConf = { name, conf, serviceOpts }: mkIf conf.enable { - networking.firewall.extraCommands = mkIf conf.openFirewall '' - ip46tables -I INPUT ${conf.firewallFilter} -j ACCEPT - ''; + networking.firewall.extraCommands = mkIf conf.openFirewall (concatStrings [ + "ip46tables -I nixos-fw ${conf.firewallFilter} " + "-m comment --comment ${name}-exporter -j nixos-fw-accept" + ]); systemd.services."prometheus-${name}-exporter" = mkMerge ([{ wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; -- cgit 1.4.1