Compare commits
No commits in common. "c98d2fe2890b6742423a7bcfd0c29d0216308b6d" and "62fe085b31e1cb022ac91bb8ff33baca5aa47e1c" have entirely different histories.
c98d2fe289
...
62fe085b31
6 changed files with 86 additions and 166 deletions
|
@ -14,12 +14,6 @@ in
|
||||||
config = {
|
config = {
|
||||||
isBandwagon = builtins.elem config.networking.hostName bwgHosts;
|
isBandwagon = builtins.elem config.networking.hostName bwgHosts;
|
||||||
isLightsail = builtins.elem config.networking.hostName awsHosts;
|
isLightsail = builtins.elem config.networking.hostName awsHosts;
|
||||||
|
|
||||||
commonSettings = {
|
|
||||||
auth.enable = true;
|
|
||||||
nix.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops = {
|
sops = {
|
||||||
secrets = {
|
secrets = {
|
||||||
wg_private_key = {
|
wg_private_key = {
|
||||||
|
@ -58,6 +52,33 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
custom.kanidm-client = {
|
||||||
|
enable = true;
|
||||||
|
uri = "https://auth.xinyang.life/";
|
||||||
|
asSSHAuth = {
|
||||||
|
enable = true;
|
||||||
|
allowedGroups = [ "linux_users" ];
|
||||||
|
};
|
||||||
|
sudoers = [ "xin@auth.xinyang.life" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
services.openssh = {
|
||||||
|
settings = {
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
KbdInteractiveAuthentication = false;
|
||||||
|
PermitRootLogin = lib.mkForce "no";
|
||||||
|
GSSAPIAuthentication = "no";
|
||||||
|
KerberosAuthentication = "no";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.fail2ban.enable = true;
|
||||||
|
programs.mosh.enable = true;
|
||||||
|
|
||||||
|
security.sudo = {
|
||||||
|
execWheelOnly = true;
|
||||||
|
wheelNeedsPassword = false;
|
||||||
|
};
|
||||||
|
|
||||||
services.sing-box = let
|
services.sing-box = let
|
||||||
singTls = {
|
singTls = {
|
||||||
enabled = true;
|
enabled = true;
|
||||||
|
|
|
@ -8,11 +8,6 @@
|
||||||
./services.nix
|
./services.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
customSettings = {
|
|
||||||
auth.enable = true;
|
|
||||||
nix.enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
sops = {
|
sops = {
|
||||||
defaultSopsFile = ./secrets.yaml;
|
defaultSopsFile = ./secrets.yaml;
|
||||||
age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
age.sshKeyPaths = [ "/etc/ssh/ssh_host_ed25519_key" ];
|
||||||
|
@ -58,5 +53,33 @@
|
||||||
hostName = "massicot";
|
hostName = "massicot";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
custom.kanidm-client = {
|
||||||
|
enable = true;
|
||||||
|
uri = "https://auth.xinyang.life/";
|
||||||
|
asSSHAuth = {
|
||||||
|
enable = true;
|
||||||
|
allowedGroups = [ "linux_users" ];
|
||||||
|
};
|
||||||
|
sudoers = [ "xin@auth.xinyang.life" ];
|
||||||
|
};
|
||||||
|
|
||||||
|
security.sudo = {
|
||||||
|
execWheelOnly = true;
|
||||||
|
wheelNeedsPassword = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
KbdInteractiveAuthentication = false;
|
||||||
|
PermitRootLogin = "no";
|
||||||
|
GSSAPIAuthentication = "no";
|
||||||
|
KerberosAuthentication = "no";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
services.fail2ban.enable = true;
|
||||||
|
programs.mosh.enable = true;
|
||||||
|
|
||||||
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
||||||
}
|
}
|
||||||
|
|
|
@ -61,7 +61,6 @@
|
||||||
hedgedoc = {
|
hedgedoc = {
|
||||||
displayName = "HedgeDoc";
|
displayName = "HedgeDoc";
|
||||||
originUrl = "https://docs.xinyang.life/";
|
originUrl = "https://docs.xinyang.life/";
|
||||||
originLanding = "https://docs.xinyang.life/auth/oauth2";
|
|
||||||
allowInsecureClientDisablePkce = true;
|
allowInsecureClientDisablePkce = true;
|
||||||
scopeMaps = {
|
scopeMaps = {
|
||||||
hedgedoc-users = [ "openid" "email" "profile" ];
|
hedgedoc-users = [ "openid" "email" "profile" ];
|
||||||
|
|
|
@ -62,19 +62,6 @@ in
|
||||||
group = "kanidm";
|
group = "kanidm";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.ntfy-sh = {
|
|
||||||
enable = true;
|
|
||||||
group = "caddy";
|
|
||||||
settings = {
|
|
||||||
listen-unix = "/var/run/ntfy-sh/ntfy.sock";
|
|
||||||
listen-unix-mode = 432; # octal 0660
|
|
||||||
base-url = "https://ntfy.xinyang.life";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.services.ntfy-sh.serviceConfig.RuntimeDirectory = "ntfy-sh";
|
|
||||||
|
|
||||||
services.kanidm = {
|
services.kanidm = {
|
||||||
package = pkgs.kanidm.withSecretProvisioning;
|
package = pkgs.kanidm.withSecretProvisioning;
|
||||||
enableServer = true;
|
enableServer = true;
|
||||||
|
@ -174,11 +161,6 @@ in
|
||||||
};
|
};
|
||||||
users.groups.git = { };
|
users.groups.git = { };
|
||||||
|
|
||||||
users.users = {
|
|
||||||
${config.services.caddy.user}.extraGroups = [
|
|
||||||
config.services.ntfy-sh.group
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -209,14 +191,5 @@ in
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
virtualHosts."https://ntfy.xinyang.life".extraConfig = ''
|
|
||||||
reverse_proxy unix/${config.services.ntfy-sh.settings.listen-unix}
|
|
||||||
@httpget {
|
|
||||||
protocol http
|
|
||||||
method GET
|
|
||||||
path_regexp ^/([-_a-z0-9]{0,64}$|docs/|static/)
|
|
||||||
}
|
|
||||||
redir @httpget https://{host}{uri}
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -77,7 +77,7 @@ in
|
||||||
reverse_proxy unix/${config.services.hedgedoc.settings.path}
|
reverse_proxy unix/${config.services.hedgedoc.settings.path}
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
users.users.${config.services.caddy.user}.extraGroups = mkIf cfg.caddy [ "hedgedoc" ];
|
users.users.caddy.extraGroups = mkIf cfg.caddy [ "hedgedoc" ];
|
||||||
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -32,16 +32,15 @@ in
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
services.restic.server.prometheus = cfg.enable;
|
services.restic.server.prometheus = cfg.enable;
|
||||||
services.gotosocial.settings = mkIf cfg.enable {
|
services.gotosocial.settings = {
|
||||||
metrics-enabled = true;
|
metrics-enable = true;
|
||||||
};
|
};
|
||||||
services.prometheus = mkIf cfg.enable {
|
services.prometheus = mkIf cfg.enable {
|
||||||
enable = true;
|
enable = true;
|
||||||
port = 9091;
|
port = 9091;
|
||||||
globalConfig.external_labels = { hostname = config.networking.hostName; };
|
globalConfig.external_labels = { hostname = config.networking.hostName; };
|
||||||
remoteWrite = mkIf cfg.grafana.enable [
|
remoteWrite = mkIf cfg.grafana.enable [
|
||||||
{
|
{ name = "grafana";
|
||||||
name = "grafana";
|
|
||||||
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push";
|
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push";
|
||||||
basic_auth = {
|
basic_auth = {
|
||||||
username = "1340065";
|
username = "1340065";
|
||||||
|
@ -52,140 +51,45 @@ in
|
||||||
exporters = {
|
exporters = {
|
||||||
node = {
|
node = {
|
||||||
enable = true;
|
enable = true;
|
||||||
enabledCollectors = [
|
enabledCollectors = [ "systemd" ];
|
||||||
"conntrack"
|
|
||||||
"diskstats"
|
|
||||||
"entropy"
|
|
||||||
"filefd"
|
|
||||||
"filesystem"
|
|
||||||
"loadavg"
|
|
||||||
"meminfo"
|
|
||||||
"netdev"
|
|
||||||
"netstat"
|
|
||||||
"stat"
|
|
||||||
"time"
|
|
||||||
"vmstat"
|
|
||||||
"systemd"
|
|
||||||
"logind"
|
|
||||||
"interrupts"
|
|
||||||
"ksmd"
|
|
||||||
];
|
|
||||||
port = 9100;
|
port = 9100;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
scrapeConfigs = [
|
scrapeConfigs = [
|
||||||
{
|
{ job_name = "prometheus";
|
||||||
job_name = "prometheus";
|
|
||||||
static_configs = [
|
static_configs = [
|
||||||
{ targets = [ "localhost:${toString config.services.prometheus.port}" ]; }
|
{ targets = [ "localhost:${toString config.services.prometheus.port}" ]; }
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
{
|
{ job_name = "node";
|
||||||
job_name = "node";
|
|
||||||
static_configs = [
|
static_configs = [
|
||||||
{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }
|
{ targets = [ "localhost:${toString config.services.prometheus.exporters.node.port}" ]; }
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
|
|
||||||
alertmanager = {
|
|
||||||
enable = true;
|
|
||||||
listenAddress = "127.0.0.1";
|
|
||||||
extraFlags = [
|
|
||||||
"--cluster.advertise-address=127.0.0.1:9093"
|
|
||||||
];
|
|
||||||
configuration = {
|
|
||||||
route = {
|
|
||||||
receiver = "ntfy";
|
|
||||||
};
|
|
||||||
receivers = [
|
|
||||||
{
|
|
||||||
name = "ntfy";
|
|
||||||
webhook_configs = [
|
|
||||||
{
|
|
||||||
url = "${config.services.ntfy-sh.settings.base-url}/prometheus-alerts";
|
|
||||||
send_resolved = true;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
alertmanagers = [
|
|
||||||
{
|
|
||||||
scheme = "http";
|
|
||||||
path_prefix = "/alertmanager";
|
|
||||||
static_configs = [
|
|
||||||
{
|
|
||||||
targets = [
|
|
||||||
"${config.services.prometheus.alertmanager.listenAddress}:${toString config.services.prometheus.alertmanager.port}"
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
rules = [
|
|
||||||
''
|
|
||||||
groups:
|
|
||||||
- name: system_alerts
|
|
||||||
rules:
|
|
||||||
- alert: SystemdFailedUnits
|
|
||||||
expr: node_systemd_unit_state{state="failed"} > 0
|
|
||||||
for: 5m
|
|
||||||
labels:
|
|
||||||
severity: critical
|
|
||||||
annotations:
|
|
||||||
summary: "Systemd has failed units on {{ $labels.instance }}"
|
|
||||||
description: "There are {{ $value }} failed units on {{ $labels.instance }}. Immediate attention required!"
|
|
||||||
|
|
||||||
- alert: HighLoadAverage
|
|
||||||
expr: node_load1 > 0.8 * count without (cpu) (node_cpu_seconds_total{mode="idle"})
|
|
||||||
for: 1m
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
annotations:
|
|
||||||
summary: "High load average detected on {{ $labels.instance }}"
|
|
||||||
description: "The 1-minute load average ({{ $value }}) exceeds 80% the number of CPUs."
|
|
||||||
|
|
||||||
- alert: HighTransmitTraffic
|
|
||||||
expr: rate(node_network_transmit_bytes_total{device!="lo"}[5m]) > 100000000
|
|
||||||
for: 1m
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
annotations:
|
|
||||||
summary: "High network transmit traffic on {{ $labels.instance }} ({{ $labels.device }})"
|
|
||||||
description: "The network interface {{ $labels.device }} on {{ $labels.instance }} is transmitting data at a rate exceeding 100 MB/s for the last 1 minute."
|
|
||||||
''
|
|
||||||
(if config.services.restic.server.enable then
|
|
||||||
''
|
|
||||||
groups:
|
|
||||||
- name: restic_alerts
|
|
||||||
'' else "")
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
services.prometheus.scrapeConfigs = [
|
services.prometheus.scrapeConfigs = [
|
||||||
(mkIf config.services.caddy.enable {
|
( mkIf config.services.caddy.enable {
|
||||||
job_name = "caddy";
|
job_name = "caddy";
|
||||||
static_configs = [
|
static_configs = [
|
||||||
{ targets = [ "localhost:2019" ]; }
|
{ targets = [ "localhost:2019" ]; }
|
||||||
];
|
];
|
||||||
})
|
})
|
||||||
(mkIf config.services.restic.server.enable {
|
( mkIf config.services.restic.server.enable {
|
||||||
job_name = "restic";
|
job_name = "restic";
|
||||||
static_configs = [
|
static_configs = [
|
||||||
{ targets = [ config.services.restic.server.listenAddress ]; }
|
{ targets = [ config.services.restic.server.listenAddress ]; }
|
||||||
];
|
];
|
||||||
})
|
})
|
||||||
(mkIf config.services.gotosocial.enable {
|
( mkIf config.services.gotosocial.enable {
|
||||||
job_name = "gotosocial";
|
job_name = "gotosocial";
|
||||||
static_configs = [
|
static_configs = [
|
||||||
{ targets = [ "localhost:${toString config.services.gotosocial.settings.port}" ]; }
|
{ targets = [ "localhost:${toString config.services.gotosocial.settings.port}" ]; }
|
||||||
];
|
];
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
}]);
|
}
|
||||||
|
]);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue