Format using alejandra
All checks were successful
/ Build Nix targets (push) Successful in 3m36s

This commit is contained in:
Théo Barnouin 2025-01-23 14:13:19 +01:00
parent 1a25b198ef
commit 781ce2d5e9
24 changed files with 610 additions and 505 deletions

387
flake.nix
View file

@ -13,200 +13,205 @@
agenix.url = "github:yaxitech/ragenix"; agenix.url = "github:yaxitech/ragenix";
}; };
outputs = inputs@{ self, nixpkgs, home-manager, microvm, agenix, ... }: outputs = inputs @ {
let self,
system = "x86_64-linux"; nixpkgs,
username = "tbarnouin"; home-manager,
proxy_host = "192.168.1.40"; microvm,
pgsql_host = "192.168.1.13"; agenix,
in ...
{ }: let
nixosConfigurations = { system = "x86_64-linux";
nixmox-curiosity = nixpkgs.lib.nixosSystem { username = "tbarnouin";
inherit system; proxy_host = "192.168.1.40";
modules = [ pgsql_host = "192.168.1.13";
agenix.nixosModules.default in {
./hosts/nixmox-curiosity/configuration.nix nixosConfigurations = {
{ nixmox-curiosity = nixpkgs.lib.nixosSystem {
networking.hostName = "nixmox-curiosity"; inherit system;
} modules = [
home-manager.nixosModules.home-manager agenix.nixosModules.default
{ ./hosts/nixmox-curiosity/configuration.nix
home-manager.useGlobalPkgs = true; {
home-manager.useUserPackages = true; networking.hostName = "nixmox-curiosity";
home-manager.users.${username} = import ./hosts/nixmox-curiosity/home.nix; }
} home-manager.nixosModules.home-manager
microvm.nixosModules.host {
{ home-manager.useGlobalPkgs = true;
microvm = { home-manager.useUserPackages = true;
autostart = []; home-manager.users.${username} = import ./hosts/nixmox-curiosity/home.nix;
vms = {}; }
}; microvm.nixosModules.host
} {
]; microvm = {
autostart = [];
vms = {};
};
}
];
specialArgs = { specialArgs = {
inherit inputs; inherit inputs;
inherit username; inherit username;
inherit proxy_host; inherit proxy_host;
inherit pgsql_host; inherit pgsql_host;
inherit system;
};
};
nginx = nixpkgs.lib.nixosSystem {
inherit system; inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
networking.hostName = "nginx";
services.vm_nginx = {
enable = true;
};
}
];
};
onlyoffice = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
networking.hostName = "onlyoffice";
services.vm_onlyoffice = {
enable = true;
pgsql_ip = pgsql_host;
};
}
];
};
# template = nixpkgs.lib.nixosSystem {
# inherit system;
# modules = [
# agenix.nixosModules.default
# "${inputs.self}/systems/minimalVMConfig.nix"
# {
# networking.hostName = "nixos";
# }
# ];
# };
jellyfin = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
microvm.nixosModules.microvm
"${inputs.self}/systems/minimalVMConfig.nix"
"${inputs.self}/services"
{
services.vm_jellyfin = {
enable = true;
};
}
];
};
redis = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
networking.hostName = "redis";
services.vm_redis = {
enable = true;
};
}
];
};
grafana-lxc = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
services.vm_grafana = {
enable = true;
vm_ip = "192.168.1.27";
proxy_ip = proxy_host;
pgsql_ip = pgsql_host;
};
}
];
};
grafana = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
microvm.nixosModules.microvm
"${inputs.self}/systems/minimalMicrovmConfig.nix"
"${inputs.self}/services"
{
services.vm_grafana = {
enable = true;
vm_ip = "192.168.1.27";
proxy_ip = proxy_host;
pgsql_ip = pgsql_host;
};
services.micro_vm = {
enable = true;
hostname = "grafana";
vm_ip = "192.168.1.20";
vm_cpu = 1;
vm_mem = 512;
macAddr = "02:00:00:00:00:20";
};
}
];
};
authentik = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
inputs.authentik-nix.nixosModules.default
{
services.authentik = {
enable = true;
environmentFile = "/run/secrets/authentik/authentik-env";
settings = {
disable_startup_analytics = true;
avatars = "initials";
};
};
services.vm_authentik = {
enable = true;
};
}
microvm.nixosModules.microvm
"${inputs.self}/systems/minimalMicrovmConfig.nix"
"${inputs.self}/services"
{
microvm = {
volumes = [
{
mountPoint = "/media";
image = "/var/lib/microvms/authentik/media.img";
size = 2048;
}
];
};
services.micro_vm = {
enable = true;
hostname = "authentik";
vm_ip = "192.168.1.25";
vm_cpu = 2;
vm_mem = 2048;
macAddr = "02:00:00:00:00:25";
};
}
];
}; };
}; };
nginx = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
networking.hostName = "nginx";
services.vm_nginx = {
enable = true;
};
}
];
};
onlyoffice = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
networking.hostName = "onlyoffice";
services.vm_onlyoffice = {
enable = true;
pgsql_ip = pgsql_host;
};
}
];
};
# template = nixpkgs.lib.nixosSystem {
# inherit system;
# modules = [
# agenix.nixosModules.default
# "${inputs.self}/systems/minimalVMConfig.nix"
# {
# networking.hostName = "nixos";
# }
# ];
# };
jellyfin = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
microvm.nixosModules.microvm
"${inputs.self}/systems/minimalVMConfig.nix"
"${inputs.self}/services"
{
services.vm_jellyfin = {
enable = true;
};
}
];
};
redis = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
networking.hostName = "redis";
services.vm_redis = {
enable = true;
};
}
];
};
grafana-lxc = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
"${inputs.nixpkgs}/nixos/modules/virtualisation/proxmox-lxc.nix"
"${inputs.self}/systems/minimalLXCConfig.nix"
"${inputs.self}/services"
{
services.vm_grafana = {
enable = true;
vm_ip = "192.168.1.27";
proxy_ip = proxy_host;
pgsql_ip = pgsql_host;
};
}
];
};
grafana = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
microvm.nixosModules.microvm
"${inputs.self}/systems/minimalMicrovmConfig.nix"
"${inputs.self}/services"
{
services.vm_grafana = {
enable = true;
vm_ip = "192.168.1.27";
proxy_ip = proxy_host;
pgsql_ip = pgsql_host;
};
services.micro_vm = {
enable = true;
hostname = "grafana";
vm_ip = "192.168.1.20";
vm_cpu = 1;
vm_mem = 512;
macAddr = "02:00:00:00:00:20";
};
}
];
};
authentik = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
agenix.nixosModules.default
inputs.authentik-nix.nixosModules.default
{
services.authentik = {
enable = true;
environmentFile = "/run/secrets/authentik/authentik-env";
settings = {
disable_startup_analytics = true;
avatars = "initials";
};
};
services.vm_authentik = {
enable = true;
};
}
microvm.nixosModules.microvm
"${inputs.self}/systems/minimalMicrovmConfig.nix"
"${inputs.self}/services"
{
microvm = {
volumes = [
{
mountPoint = "/media";
image = "/var/lib/microvms/authentik/media.img";
size = 2048;
}
];
};
services.micro_vm = {
enable = true;
hostname = "authentik";
vm_ip = "192.168.1.25";
vm_cpu = 2;
vm_mem = 2048;
macAddr = "02:00:00:00:00:25";
};
}
];
};
}; };
};
} }

View file

@ -1,11 +1,15 @@
{ config, lib, pkgs, ... }: {
config,
{ imports = [ ./hardware-configuration.nix ]; lib,
pkgs,
...
}: {
imports = [./hardware-configuration.nix];
nix = { nix = {
settings = { settings = {
experimental-features = [ "nix-command" "flakes" ]; experimental-features = ["nix-command" "flakes"];
trusted-users = [ "@wheel" ]; trusted-users = ["@wheel"];
auto-optimise-store = true; auto-optimise-store = true;
}; };
gc = { gc = {
@ -17,9 +21,9 @@
security.sudo.wheelNeedsPassword = false; security.sudo.wheelNeedsPassword = false;
networking= { networking = {
useNetworkd = true; useNetworkd = true;
firewall.allowedTCPPorts = [ 22 ]; firewall.allowedTCPPorts = [22];
}; };
systemd.network = { systemd.network = {
@ -104,5 +108,4 @@
}; };
system.stateVersion = "24.11"; # Did you read the comment? system.stateVersion = "24.11"; # Did you read the comment?
} }

View file

@ -1,13 +1,15 @@
{ lib, system, ... }:
{ {
lib,
system,
...
}: {
boot = { boot = {
# use latest kernel # use latest kernel
# kernelPackages = pkgs.linuxPackages_latest; # kernelPackages = pkgs.linuxPackages_latest;
supportedFilesystems = [ "ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs" ]; supportedFilesystems = ["ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs"];
growPartition = true; growPartition = true;
kernelModules = [ "kvm-intel" ]; kernelModules = ["kvm-intel"];
kernelParams = lib.mkForce [ ]; kernelParams = lib.mkForce [];
loader = { loader = {
grub = { grub = {
@ -20,8 +22,8 @@
}; };
initrd = { initrd = {
availableKernelModules = [ "9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi" ]; availableKernelModules = ["9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi"];
kernelModules = [ "virtio_balloon" "virtio_console" "virtio_rng" ]; kernelModules = ["virtio_balloon" "virtio_console" "virtio_rng"];
}; };
tmp.cleanOnBoot = true; tmp.cleanOnBoot = true;
@ -45,7 +47,6 @@
}; };
}; };
services.fstrim = { services.fstrim = {
enable = true; enable = true;
interval = "weekly"; interval = "weekly";

View file

@ -1,5 +1,8 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
home = { home = {
username = "tbarnouin"; username = "tbarnouin";
stateVersion = "24.11"; stateVersion = "24.11";
@ -75,17 +78,16 @@
}; };
oh-my-zsh = { oh-my-zsh = {
enable = true; enable = true;
plugins = plugins = [
[ "git"
"git" "terraform"
"terraform" "sudo"
"sudo" "docker"
"docker" "pip"
"pip" "python"
"python" "pyenv"
"pyenv" "pipenv"
"pipenv" ];
];
theme = "bira"; theme = "bira";
}; };
}; };

View file

@ -1,11 +1,15 @@
{ config, lib, pkgs, ... }: {
config,
{ imports = [ ./hardware-configuration.nix ]; lib,
pkgs,
...
}: {
imports = [./hardware-configuration.nix];
nix = { nix = {
settings = { settings = {
experimental-features = [ "nix-command" "flakes" ]; experimental-features = ["nix-command" "flakes"];
trusted-users = [ "@wheel" ]; trusted-users = ["@wheel"];
auto-optimise-store = true; auto-optimise-store = true;
}; };
gc = { gc = {
@ -17,9 +21,9 @@
security.sudo.wheelNeedsPassword = false; security.sudo.wheelNeedsPassword = false;
networking= { networking = {
useNetworkd = true; useNetworkd = true;
firewall.allowedTCPPorts = [ 22 ]; firewall.allowedTCPPorts = [22];
}; };
systemd.network = { systemd.network = {
@ -104,5 +108,4 @@
}; };
system.stateVersion = "24.11"; # Did you read the comment? system.stateVersion = "24.11"; # Did you read the comment?
} }

View file

@ -1,13 +1,15 @@
{ lib, system, ... }:
{ {
lib,
system,
...
}: {
boot = { boot = {
# use latest kernel # use latest kernel
# kernelPackages = pkgs.linuxPackages_latest; # kernelPackages = pkgs.linuxPackages_latest;
supportedFilesystems = [ "ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs" ]; supportedFilesystems = ["ext4" "btrfs" "xfs" "fat" "vfat" "cifs" "nfs"];
growPartition = true; growPartition = true;
kernelModules = [ "kvm-intel" ]; kernelModules = ["kvm-intel"];
kernelParams = lib.mkForce [ ]; kernelParams = lib.mkForce [];
loader = { loader = {
grub = { grub = {
@ -20,8 +22,8 @@
}; };
initrd = { initrd = {
availableKernelModules = [ "9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi" ]; availableKernelModules = ["9p" "9pnet_virtio" "ata_piix" "uhci_hcd" "virtio_blk" "virtio_mmio" "virtio_net" "virtio_pci" "virtio_scsi"];
kernelModules = [ "virtio_balloon" "virtio_console" "virtio_rng" ]; kernelModules = ["virtio_balloon" "virtio_console" "virtio_rng"];
}; };
tmp.cleanOnBoot = true; tmp.cleanOnBoot = true;

View file

@ -1,5 +1,8 @@
{ config, pkgs, ... }:
{ {
config,
pkgs,
...
}: {
home = { home = {
username = "tbarnouin"; username = "tbarnouin";
stateVersion = "24.11"; stateVersion = "24.11";
@ -75,17 +78,16 @@
}; };
oh-my-zsh = { oh-my-zsh = {
enable = true; enable = true;
plugins = plugins = [
[ "git"
"git" "terraform"
"terraform" "sudo"
"sudo" "docker"
"docker" "pip"
"pip" "python"
"python" "pyenv"
"pyenv" "pipenv"
"pipenv" ];
];
theme = "bira"; theme = "bira";
}; };
}; };

View file

@ -1,19 +1,17 @@
let let
tbarnouin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"; tbarnouin = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos";
users = [ tbarnouin ]; users = [tbarnouin];
forgejo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF2NAam+nseSCzJV/1UTyO2LgMjx0xT7/vTOOi5EG9HV root@forgejo-runner"; forgejo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF2NAam+nseSCzJV/1UTyO2LgMjx0xT7/vTOOi5EG9HV root@forgejo-runner";
grafana = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDQxvO9vdd2f9aV4F3LEQrrTJaLwLvSLbLtjB9qNxc4z root@grafana"; grafana = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDQxvO9vdd2f9aV4F3LEQrrTJaLwLvSLbLtjB9qNxc4z root@grafana";
onlyoffice = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGbnzv2/Or4XdQXLDjIbr7oIDTQEvgSMTX4aiNCQk4tC root@onlyoffice"; onlyoffice = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGbnzv2/Or4XdQXLDjIbr7oIDTQEvgSMTX4aiNCQk4tC root@onlyoffice";
systems = [ forgejo grafana ]; systems = [forgejo grafana];
in in {
{
"secrets/initialPassword.age".publicKeys = users ++ systems; "secrets/initialPassword.age".publicKeys = users ++ systems;
"services/grafana/secrets/grafana-db.age".publicKeys = [ tbarnouin grafana ]; "services/grafana/secrets/grafana-db.age".publicKeys = [tbarnouin grafana];
"services/grafana/secrets/grafana-oauth_secret.age".publicKeys = [ tbarnouin grafana ]; "services/grafana/secrets/grafana-oauth_secret.age".publicKeys = [tbarnouin grafana];
"services/grafana/secrets/kuma-token.age".publicKeys = [ tbarnouin grafana ]; "services/grafana/secrets/kuma-token.age".publicKeys = [tbarnouin grafana];
"services/onlyoffice/secrets/office-dbpass.age".publicKeys = [ tbarnouin onlyoffice ]; "services/onlyoffice/secrets/office-dbpass.age".publicKeys = [tbarnouin onlyoffice];
"services/onlyoffice/secrets/office-jwtpass.age".publicKeys = [ tbarnouin onlyoffice ]; "services/onlyoffice/secrets/office-jwtpass.age".publicKeys = [tbarnouin onlyoffice];
} }

View file

@ -1,14 +1,18 @@
{ inputs, config, lib, authentik-nix, ... }:
let
cfg = config.services.vm_authentik;
in
{ {
inputs,
config,
lib,
authentik-nix,
...
}: let
cfg = config.services.vm_authentik;
in {
options.services.vm_authentik = { options.services.vm_authentik = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
networking = { networking = {
firewall.allowedTCPPorts = [ 9000 9300 9443 ]; firewall.allowedTCPPorts = [9000 9300 9443];
}; };
}; };
} }

View file

@ -1,5 +1,4 @@
{ inputs, ... }: {inputs, ...}: {
{
imports = [ imports = [
./nginx ./nginx
./gitea ./gitea

View file

@ -1,8 +1,11 @@
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_gitea;
in
{ {
config,
pkgs,
lib,
...
}: let
cfg = config.services.vm_gitea;
in {
options.services.vm_gitea = { options.services.vm_gitea = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
db_ip = lib.mkOption { db_ip = lib.mkOption {
@ -27,6 +30,6 @@ in
passwordFile = "/run/secrets/gitea/gitea-dbpass"; passwordFile = "/run/secrets/gitea/gitea-dbpass";
}; };
}; };
networking.firewall.allowedTCPPorts = [ 3000 ]; networking.firewall.allowedTCPPorts = [3000];
}; };
} }

View file

@ -1,8 +1,11 @@
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_grafana;
in
{ {
lib,
config,
pkgs,
...
}: let
cfg = config.services.vm_grafana;
in {
options.services.vm_grafana = { options.services.vm_grafana = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
vm_ip = lib.mkOption { vm_ip = lib.mkOption {
@ -19,16 +22,16 @@ in
}; };
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
age.secrets ={ age.secrets = {
grafana-db = { grafana-db = {
file = ./secrets/grafana-db.age; file = ./secrets/grafana-db.age;
owner = "grafana"; owner = "grafana";
}; };
grafana-oauth_secret = { grafana-oauth_secret = {
file = ./secrets/grafana-oauth_secret.age; file = ./secrets/grafana-oauth_secret.age;
owner = "grafana"; owner = "grafana";
}; };
kuma-token.file = ./secrets/kuma-token.age; kuma-token.file = ./secrets/kuma-token.age;
}; };
services.rsyslogd = { services.rsyslogd = {
enable = true; enable = true;
@ -59,22 +62,22 @@ in
serve_from_sub_path = false; serve_from_sub_path = false;
}; };
database = { database = {
type = "postgres"; type = "postgres";
host = "${cfg.pgsql_ip}:5432"; host = "${cfg.pgsql_ip}:5432";
name = "grafana"; name = "grafana";
user = "grafana"; user = "grafana";
password = "\$__file{${config.age.secrets.grafana-db.path}}"; password = "\$__file{${config.age.secrets.grafana-db.path}}";
}; };
"auth.generic_oauth" = { "auth.generic_oauth" = {
enabled = "true"; enabled = "true";
name = "authentik"; name = "authentik";
allow_sign_up = "true"; allow_sign_up = "true";
client_id = "9HV82G8F92Jcbw4nP8eppMcPpLcAw5uYpejfReLy"; client_id = "9HV82G8F92Jcbw4nP8eppMcPpLcAw5uYpejfReLy";
client_secret = "\$__file{${config.age.secrets.grafana-oauth_secret.path}}"; client_secret = "\$__file{${config.age.secrets.grafana-oauth_secret.path}}";
scopes = "openid email profile"; scopes = "openid email profile";
auth_url = "https://authentik.le43.eu/application/o/authorize/"; auth_url = "https://authentik.le43.eu/application/o/authorize/";
token_url = "https://authentik.le43.eu/application/o/token/"; token_url = "https://authentik.le43.eu/application/o/token/";
api_url = "https://authentik.le43.eu/application/o/userinfo/"; api_url = "https://authentik.le43.eu/application/o/userinfo/";
role_attribute_path = "contains(groups, 'admin') && 'Admin' || contains(groups, 'admin') && 'Editor' || 'Viewer';role_attribute_strict = false"; role_attribute_path = "contains(groups, 'admin') && 'Admin' || contains(groups, 'admin') && 'Editor' || 'Viewer';role_attribute_strict = false";
allow_assign_grafana_admin = "true"; allow_assign_grafana_admin = "true";
}; };
@ -88,95 +91,125 @@ in
job_name = "kuma"; job_name = "kuma";
scrape_interval = "30s"; scrape_interval = "30s";
scheme = "http"; scheme = "http";
static_configs = [{ static_configs = [
targets = [ "192.168.1.90:3001" ]; {
}]; targets = ["192.168.1.90:3001"];
}
];
basic_auth.username = "tbarnouin"; basic_auth.username = "tbarnouin";
basic_auth.password_file = config.age.secrets.kuma-token.path; basic_auth.password_file = config.age.secrets.kuma-token.path;
} }
{ {
job_name = "grafana"; job_name = "grafana";
static_configs = [{ static_configs = [
targets = [ "127.0.0.1:9002" ]; {
}]; targets = ["127.0.0.1:9002"];
}
];
} }
{ {
job_name = "openmediavault_cadvisor"; job_name = "openmediavault_cadvisor";
static_configs = [{ static_configs = [
targets = [ "192.168.1.125:8080" ]; {
}]; targets = ["192.168.1.125:8080"];
}
];
} }
{ {
job_name = "opportunity"; job_name = "opportunity";
static_configs = [{ static_configs = [
targets = [ "192.168.1.125:9100" ]; {
}]; targets = ["192.168.1.125:9100"];
}
];
} }
{ {
job_name = "nginx"; job_name = "nginx";
static_configs = [{ static_configs = [
targets = [ "${cfg.proxy_ip}:9002" ]; {
}]; targets = ["${cfg.proxy_ip}:9002"];
}
];
} }
{ {
job_name = "redis"; job_name = "redis";
static_configs = [{ static_configs = [
targets = [ "192.168.1.16:9002" ]; {
}]; targets = ["192.168.1.16:9002"];
}
];
} }
{ {
job_name = "ingenuity"; job_name = "ingenuity";
static_configs = [{ static_configs = [
targets = [ "192.168.1.90:9100" ]; {
}]; targets = ["192.168.1.90:9100"];
}
];
} }
{ {
job_name = "gitea"; job_name = "gitea";
static_configs = [{ static_configs = [
targets = [ "192.168.1.14:9100" ]; {
}]; targets = ["192.168.1.14:9100"];
}
];
} }
{ {
job_name = "postgresql"; job_name = "postgresql";
static_configs = [{ static_configs = [
targets = [ "192.168.1.13:9100" ]; {
}]; targets = ["192.168.1.13:9100"];
}
];
} }
{ {
job_name = "nextcloud"; job_name = "nextcloud";
static_configs = [{ static_configs = [
targets = [ "192.168.1.44:9100" ]; {
}]; targets = ["192.168.1.44:9100"];
}
];
} }
{ {
job_name = "deluge"; job_name = "deluge";
static_configs = [{ static_configs = [
targets = [ "192.168.1.18:9100" ]; {
}]; targets = ["192.168.1.18:9100"];
}
];
} }
{ {
job_name = "netbox"; job_name = "netbox";
static_configs = [{ static_configs = [
targets = [ "192.168.1.45:9100" ]; {
}]; targets = ["192.168.1.45:9100"];
}
];
} }
{ {
job_name = "jellyfin"; job_name = "jellyfin";
static_configs = [{ static_configs = [
targets = [ "192.168.1.42:9100" ]; {
}]; targets = ["192.168.1.42:9100"];
}
];
} }
{ {
job_name = "authentik-ldap"; job_name = "authentik-ldap";
static_configs = [{ static_configs = [
targets = [ "192.168.1.41:9100" ]; {
}]; targets = ["192.168.1.41:9100"];
}
];
} }
{ {
job_name = "authentik"; job_name = "authentik";
static_configs = [{ static_configs = [
targets = [ "192.168.1.25:9002" ]; {
}]; targets = ["192.168.1.25:9002"];
}
];
} }
]; ];
}; };
@ -202,16 +235,18 @@ in
chunk_retain_period = "30s"; chunk_retain_period = "30s";
}; };
schema_config = { schema_config = {
configs = [{ configs = [
from = "2022-06-06"; {
store = "boltdb-shipper"; from = "2022-06-06";
object_store = "filesystem"; store = "boltdb-shipper";
schema = "v13"; object_store = "filesystem";
index = { schema = "v13";
prefix = "index_"; index = {
period = "24h"; prefix = "index_";
}; period = "24h";
}]; };
}
];
}; };
storage_config = { storage_config = {
boltdb_shipper = { boltdb_shipper = {
@ -255,14 +290,16 @@ in
positions = { positions = {
filename = "/tmp/positions.yaml"; filename = "/tmp/positions.yaml";
}; };
clients = [{ clients = [
url = "http://127.0.0.1:3100/loki/api/v1/push"; {
}]; url = "http://127.0.0.1:3100/loki/api/v1/push";
}
];
scrape_configs = [ scrape_configs = [
{ {
job_name = "syslog"; job_name = "syslog";
syslog = { syslog = {
listen_address = "0.0.0.0:1514"; listen_address = "0.0.0.0:1514";
listen_protocol = "tcp"; listen_protocol = "tcp";
idle_timeout = "60s"; idle_timeout = "60s";
labels = { labels = {
@ -271,27 +308,27 @@ in
}; };
relabel_configs = [ relabel_configs = [
{ {
source_labels = [ "__syslog_message_hostname" ]; source_labels = ["__syslog_message_hostname"];
target_label = "host"; target_label = "host";
} }
{ {
source_labels = [ "__syslog_message_hostname" ]; source_labels = ["__syslog_message_hostname"];
target_label = "hostname"; target_label = "hostname";
} }
{ {
source_labels = [ "__syslog_message_severity" ]; source_labels = ["__syslog_message_severity"];
target_label = "level"; target_label = "level";
} }
{ {
source_labels = [ "__syslog_message_app_name" ]; source_labels = ["__syslog_message_app_name"];
target_label = "application"; target_label = "application";
} }
{ {
source_labels = [ "__syslog_message_facility" ]; source_labels = ["__syslog_message_facility"];
target_label = "facility"; target_label = "facility";
} }
{ {
source_labels = [ "__syslog_connection_hostname" ]; source_labels = ["__syslog_connection_hostname"];
target_label = "connection_hostname"; target_label = "connection_hostname";
} }
]; ];
@ -301,7 +338,7 @@ in
}; };
# Open ports in the firewall. # Open ports in the firewall.
networking.firewall.allowedTCPPorts = [ 3000 3100 3101 8086 9001 1514 514 ]; networking.firewall.allowedTCPPorts = [3000 3100 3101 8086 9001 1514 514];
networking.firewall.allowedUDPPorts = [ 514 ]; networking.firewall.allowedUDPPorts = [514];
}; };
} }

View file

@ -1,13 +1,16 @@
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_jellyfin;
in
{ {
lib,
config,
pkgs,
...
}: let
cfg = config.services.vm_jellyfin;
in {
options.services.vm_jellyfin = { options.services.vm_jellyfin = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
environment.systemPackages = [ pkgs.cifs-utils ]; environment.systemPackages = [pkgs.cifs-utils];
services.jellyfin = { services.jellyfin = {
enable = true; enable = true;
user = "tbarnouin"; user = "tbarnouin";

View file

@ -1,20 +1,25 @@
{ config, pkgs, lib, inputs, modulesPath, ... }:
{ {
config,
pkgs,
lib,
inputs,
modulesPath,
...
}: {
imports = [ imports = [
./lxc.nix ./lxc.nix
./vm.nix ./vm.nix
]; ];
nix = { nix = {
settings.experimental-features = [ "nix-command" "flakes" ]; settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = [ "root" "@wheel" ]; settings.trusted-users = ["root" "@wheel"];
}; };
networking = { networking = {
firewall = { firewall = {
enable = true; enable = true;
allowedTCPPorts = [ 22 9002 ]; allowedTCPPorts = [22 9002];
}; };
}; };
@ -22,7 +27,7 @@
console.keyMap = "fr"; console.keyMap = "fr";
i18n.defaultLocale = "fr_FR.UTF-8"; i18n.defaultLocale = "fr_FR.UTF-8";
environment.sessionVariables = rec { environment.sessionVariables = rec {
TERM = "xterm-256color"; TERM = "xterm-256color";
}; };
nix.gc = { nix.gc = {
@ -35,7 +40,7 @@
users = { users = {
users.tbarnouin = { users.tbarnouin = {
isNormalUser = true; isNormalUser = true;
extraGroups = [ "wheel" ]; extraGroups = ["wheel"];
shell = pkgs.zsh; shell = pkgs.zsh;
openssh.authorizedKeys.keys = [ openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -58,7 +63,7 @@
}; };
ohMyZsh = { ohMyZsh = {
enable = true; enable = true;
plugins = [ "git" ]; plugins = ["git"];
theme = "bira"; theme = "bira";
}; };
}; };
@ -70,21 +75,21 @@
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
environment = { environment = {
localBinInPath = true; localBinInPath = true;
systemPackages = with pkgs; [ systemPackages = with pkgs; [
vim vim
bash bash
wget wget
curl curl
git git
htop htop
tree tree
dig dig
ncdu ncdu
nmap nmap
iperf3 iperf3
netcat-openbsd netcat-openbsd
]; ];
}; };
services = { services = {
openssh = { openssh = {
@ -110,7 +115,7 @@
exporters = { exporters = {
node = { node = {
enable = true; enable = true;
enabledCollectors = [ "systemd" ]; enabledCollectors = ["systemd"];
port = 9002; port = 9002;
}; };
}; };

View file

@ -1,8 +1,11 @@
{lib, config, modulesPath, ...}:
let
cfg = config.services.lxc;
in
{ {
lib,
config,
modulesPath,
...
}: let
cfg = config.services.lxc;
in {
options.services.lxc = { options.services.lxc = {
enable = lib.mkEnableOption "Enable LXC container config"; enable = lib.mkEnableOption "Enable LXC container config";
}; };

View file

@ -1,8 +1,11 @@
{lib, config, modulesPath, ...}:
let
cfg = config.services.vm;
in
{ {
lib,
config,
modulesPath,
...
}: let
cfg = config.services.vm;
in {
options.services.vm = { options.services.vm = {
enable = lib.mkEnableOption "Enable LXC container config"; enable = lib.mkEnableOption "Enable LXC container config";
}; };

View file

@ -1,8 +1,11 @@
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_nextcloud;
in
{ {
lib,
config,
pkgs,
...
}: let
cfg = config.services.vm_nextcloud;
in {
options.services.vm_nextcloud = { options.services.vm_nextcloud = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
proxy_ip = lib.mkOption { proxy_ip = lib.mkOption {
@ -53,8 +56,8 @@ in
"opcache.memory_consumption" = "512"; "opcache.memory_consumption" = "512";
}; };
settings = { settings = {
trusted_proxies = [ "${cfg.proxy_ip}" ]; trusted_proxies = ["${cfg.proxy_ip}"];
trusted_domains = [ "${cfg.proxy_ip}" ]; trusted_domains = ["${cfg.proxy_ip}"];
overwriteprotocol = "http"; overwriteprotocol = "http";
overwrite.cli.url = "http://${cfg.proxy_ip}/cloud/"; overwrite.cli.url = "http://${cfg.proxy_ip}/cloud/";
"overwritehost" = "${cfg.proxy_ip}"; "overwritehost" = "${cfg.proxy_ip}";
@ -68,11 +71,11 @@ in
dbuser = "nextcloud"; dbuser = "nextcloud";
dbtype = "pgsql"; dbtype = "pgsql";
dbpassFile = "/run/secrets/nextcloud/nextcloud-dbpass"; dbpassFile = "/run/secrets/nextcloud/nextcloud-dbpass";
adminuser = "tbarnouin"; adminuser = "tbarnouin";
adminpassFile = "/run/secrets/nextcloud/nextcloud-adminpass"; adminpassFile = "/run/secrets/nextcloud/nextcloud-adminpass";
}; };
}; };
}; };
networking.firewall.allowedTCPPorts = [ 80 ]; networking.firewall.allowedTCPPorts = [80];
}; };
} }

View file

@ -1,8 +1,11 @@
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_nginx;
in
{ {
config,
pkgs,
lib,
...
}: let
cfg = config.services.vm_nginx;
in {
options.services.vm_nginx = { options.services.vm_nginx = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
}; };
@ -158,6 +161,6 @@ in
}; };
}; };
}; };
networking.firewall.allowedTCPPorts = [ 80 443 ]; networking.firewall.allowedTCPPorts = [80 443];
}; };
} }

View file

@ -1,8 +1,11 @@
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_onlyoffice;
in
{ {
config,
pkgs,
lib,
...
}: let
cfg = config.services.vm_onlyoffice;
in {
options.services.vm_onlyoffice = { options.services.vm_onlyoffice = {
enable = lib.mkEnableOption "Enable OnlyOffice service"; enable = lib.mkEnableOption "Enable OnlyOffice service";
pgsql_ip = lib.mkOption { pgsql_ip = lib.mkOption {
@ -13,11 +16,11 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
age.secrets = { age.secrets = {
office-dbpass = { office-dbpass = {
file = ./secrets/office-dbpass.age; file = ./secrets/office-dbpass.age;
owner = "onlyoffice"; owner = "onlyoffice";
}; };
office-jwtpass = { office-jwtpass = {
file = ./secrets/office-jwtpass.age; file = ./secrets/office-jwtpass.age;
owner = "onlyoffice"; owner = "onlyoffice";
}; };
}; };
@ -33,6 +36,6 @@ in
jwtSecretFile = config.age.secrets.office-jwtpass.path; jwtSecretFile = config.age.secrets.office-jwtpass.path;
}; };
}; };
networking.firewall.allowedTCPPorts = [ 80 4369 5432 5672 6379 8000 8080 ]; networking.firewall.allowedTCPPorts = [80 4369 5432 5672 6379 8000 8080];
}; };
} }

View file

@ -1,8 +1,11 @@
{ lib, config, pkgs, ... }:
let
cfg = config.services.vm_postgresql;
in
{ {
lib,
config,
pkgs,
...
}: let
cfg = config.services.vm_postgresql;
in {
options.services.vm_postgresql = { options.services.vm_postgresql = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
}; };
@ -44,6 +47,6 @@ in
alter user nextcloud with password 'password'; alter user nextcloud with password 'password';
''; '';
}; };
networking.firewall.allowedTCPPorts = [ 5432 ]; networking.firewall.allowedTCPPorts = [5432];
}; };
} }

View file

@ -1,8 +1,11 @@
{ config, pkgs, lib, ... }:
let
cfg = config.services.vm_redis;
in
{ {
config,
pkgs,
lib,
...
}: let
cfg = config.services.vm_redis;
in {
options.services.vm_redis = { options.services.vm_redis = {
enable = lib.mkEnableOption "Enable minimal config"; enable = lib.mkEnableOption "Enable minimal config";
}; };
@ -16,8 +19,8 @@ in
settings = { settings = {
protected-mode = "no"; protected-mode = "no";
}; };
}; };
}; };
networking.firewall.allowedTCPPorts = [ 6379 ]; networking.firewall.allowedTCPPorts = [6379];
}; };
} }

View file

@ -1,15 +1,20 @@
{ config, pkgs, lib, inputs, modulesPath, ... }:
{ {
config,
pkgs,
lib,
inputs,
modulesPath,
...
}: {
nix = { nix = {
settings.experimental-features = [ "nix-command" "flakes" ]; settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = [ "root" "@wheel" ]; settings.trusted-users = ["root" "@wheel"];
}; };
networking = { networking = {
firewall = { firewall = {
enable = true; enable = true;
allowedTCPPorts = [ 22 9002 ]; allowedTCPPorts = [22 9002];
}; };
}; };
@ -30,7 +35,7 @@
console.keyMap = "fr"; console.keyMap = "fr";
i18n.defaultLocale = "fr_FR.UTF-8"; i18n.defaultLocale = "fr_FR.UTF-8";
environment.sessionVariables = rec { environment.sessionVariables = rec {
TERM = "xterm-256color"; TERM = "xterm-256color";
}; };
nix.gc = { nix.gc = {
@ -43,7 +48,7 @@
users = { users = {
users.tbarnouin = { users.tbarnouin = {
isNormalUser = true; isNormalUser = true;
extraGroups = [ "wheel" ]; extraGroups = ["wheel"];
shell = pkgs.zsh; shell = pkgs.zsh;
openssh.authorizedKeys.keys = [ openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -66,7 +71,7 @@
}; };
ohMyZsh = { ohMyZsh = {
enable = true; enable = true;
plugins = [ "git" ]; plugins = ["git"];
theme = "bira"; theme = "bira";
}; };
}; };
@ -78,21 +83,21 @@
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
environment = { environment = {
localBinInPath = true; localBinInPath = true;
systemPackages = with pkgs; [ systemPackages = with pkgs; [
vim vim
bash bash
wget wget
curl curl
git git
htop htop
tree tree
dig dig
ncdu ncdu
nmap nmap
iperf3 iperf3
netcat-openbsd netcat-openbsd
]; ];
}; };
services = { services = {
openssh = { openssh = {
@ -118,7 +123,7 @@
exporters = { exporters = {
node = { node = {
enable = true; enable = true;
enabledCollectors = [ "systemd" ]; enabledCollectors = ["systemd"];
port = 9002; port = 9002;
}; };
}; };

View file

@ -1,8 +1,14 @@
{ config, pkgs, lib, inputs, modulesPath, microvm, ... }:
let
cfg = config.services.micro_vm;
in
{ {
config,
pkgs,
lib,
inputs,
modulesPath,
microvm,
...
}: let
cfg = config.services.micro_vm;
in {
options.services.micro_vm = { options.services.micro_vm = {
enable = lib.mkEnableOption "Enable NixOS microvm config"; enable = lib.mkEnableOption "Enable NixOS microvm config";
hostname = lib.mkOption { hostname = lib.mkOption {
@ -53,11 +59,13 @@ in
mountPoint = "/run/secrets/${cfg.hostname}"; mountPoint = "/run/secrets/${cfg.hostname}";
} }
]; ];
interfaces = [ { interfaces = [
type = "tap"; {
id = "vm-${cfg.hostname}"; type = "tap";
mac = "${cfg.macAddr}"; id = "vm-${cfg.hostname}";
} ]; mac = "${cfg.macAddr}";
}
];
hypervisor = "qemu"; hypervisor = "qemu";
socket = "control.socket"; socket = "control.socket";
@ -76,14 +84,14 @@ in
}; };
nix = { nix = {
settings.experimental-features = [ "nix-command" "flakes" ]; settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = [ "root" "@wheel" ]; settings.trusted-users = ["root" "@wheel"];
}; };
networking = { networking = {
firewall = { firewall = {
enable = true; enable = true;
allowedTCPPorts = [ 22 9002 ]; allowedTCPPorts = [22 9002];
}; };
}; };
@ -91,7 +99,7 @@ in
console.keyMap = "fr"; console.keyMap = "fr";
i18n.defaultLocale = "fr_FR.UTF-8"; i18n.defaultLocale = "fr_FR.UTF-8";
environment.sessionVariables = rec { environment.sessionVariables = rec {
TERM = "xterm-256color"; TERM = "xterm-256color";
}; };
nix.gc = { nix.gc = {
@ -104,7 +112,7 @@ in
users = { users = {
users.tbarnouin = { users.tbarnouin = {
isNormalUser = true; isNormalUser = true;
extraGroups = [ "wheel" ]; extraGroups = ["wheel"];
shell = pkgs.zsh; shell = pkgs.zsh;
openssh.authorizedKeys.keys = [ openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -127,7 +135,7 @@ in
}; };
ohMyZsh = { ohMyZsh = {
enable = true; enable = true;
plugins = [ "git" ]; plugins = ["git"];
theme = "bira"; theme = "bira";
}; };
}; };
@ -139,21 +147,21 @@ in
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
environment = { environment = {
localBinInPath = true; localBinInPath = true;
systemPackages = with pkgs; [ systemPackages = with pkgs; [
vim vim
bash bash
wget wget
curl curl
git git
htop htop
tree tree
dig dig
ncdu ncdu
nmap nmap
iperf3 iperf3
netcat-openbsd netcat-openbsd
]; ];
}; };
services = { services = {
openssh = { openssh = {
@ -179,7 +187,7 @@ in
exporters = { exporters = {
node = { node = {
enable = true; enable = true;
enabledCollectors = [ "systemd" ]; enabledCollectors = ["systemd"];
port = 9002; port = 9002;
}; };
}; };
@ -192,4 +200,3 @@ in
}; };
}; };
} }

View file

@ -1,15 +1,20 @@
{ config, pkgs, lib, inputs, modulesPath, ... }:
{ {
config,
pkgs,
lib,
inputs,
modulesPath,
...
}: {
nix = { nix = {
settings.experimental-features = [ "nix-command" "flakes" ]; settings.experimental-features = ["nix-command" "flakes"];
settings.trusted-users = [ "root" "@wheel" ]; settings.trusted-users = ["root" "@wheel"];
}; };
networking = { networking = {
firewall = { firewall = {
enable = true; enable = true;
allowedTCPPorts = [ 22 9002 ]; allowedTCPPorts = [22 9002];
}; };
}; };
@ -17,7 +22,7 @@
console.keyMap = "fr"; console.keyMap = "fr";
i18n.defaultLocale = "fr_FR.UTF-8"; i18n.defaultLocale = "fr_FR.UTF-8";
environment.sessionVariables = rec { environment.sessionVariables = rec {
TERM = "xterm-256color"; TERM = "xterm-256color";
}; };
nix.gc = { nix.gc = {
@ -30,7 +35,7 @@
users = { users = {
users.tbarnouin = { users.tbarnouin = {
isNormalUser = true; isNormalUser = true;
extraGroups = [ "wheel" ]; extraGroups = ["wheel"];
shell = pkgs.zsh; shell = pkgs.zsh;
openssh.authorizedKeys.keys = [ openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAxccGxdfOFXeEClqz3ULl94ubzaJnk4pUus+ek18G0B tbarnouin@nixos"
@ -53,7 +58,7 @@
}; };
ohMyZsh = { ohMyZsh = {
enable = true; enable = true;
plugins = [ "git" ]; plugins = ["git"];
theme = "bira"; theme = "bira";
}; };
}; };
@ -65,21 +70,21 @@
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
environment = { environment = {
localBinInPath = true; localBinInPath = true;
systemPackages = with pkgs; [ systemPackages = with pkgs; [
vim vim
bash bash
wget wget
curl curl
git git
htop htop
tree tree
dig dig
ncdu ncdu
nmap nmap
iperf3 iperf3
netcat-openbsd netcat-openbsd
]; ];
}; };
services = { services = {
cloud-init.network.enable = true; cloud-init.network.enable = true;
@ -106,7 +111,7 @@
exporters = { exporters = {
node = { node = {
enable = true; enable = true;
enabledCollectors = [ "systemd" ]; enabledCollectors = ["systemd"];
port = 9002; port = 9002;
}; };
}; };