2024-07-05 11:25:27 +00:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
lib,
|
2024-07-07 14:05:48 +00:00
|
|
|
pkgs,
|
2024-07-05 11:25:27 +00:00
|
|
|
...
|
|
|
|
}:
|
|
|
|
let
|
|
|
|
cfg = config.bagel.services.prometheus;
|
|
|
|
inherit (lib) mkEnableOption mkIf;
|
|
|
|
|
2024-07-07 14:05:48 +00:00
|
|
|
mimirPort = config.services.mimir.configuration.server.http_listen_port;
|
2024-07-05 11:25:27 +00:00
|
|
|
in
|
|
|
|
{
|
|
|
|
options.bagel.services.prometheus.enable = mkEnableOption "Prometheus scraper";
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
2024-07-07 14:58:51 +00:00
|
|
|
age.secrets = {
|
|
|
|
metrics-push-htpasswd = {
|
|
|
|
file = ../../../secrets/metrics-push-htpasswd.age;
|
|
|
|
owner = "nginx";
|
|
|
|
};
|
|
|
|
mimir-environment.file = ../../../secrets/mimir-environment.age;
|
|
|
|
};
|
2024-07-05 11:25:27 +00:00
|
|
|
|
|
|
|
services.mimir = {
|
|
|
|
enable = true;
|
|
|
|
extraFlags = ["--config.expand-env=true"];
|
|
|
|
configuration = {
|
2024-07-07 14:05:48 +00:00
|
|
|
target = "all,alertmanager";
|
|
|
|
|
2024-07-05 11:25:27 +00:00
|
|
|
multitenancy_enabled = false;
|
|
|
|
|
|
|
|
common.storage = {
|
|
|
|
backend = "s3";
|
|
|
|
s3 = {
|
|
|
|
endpoint = "s3.delroth.net";
|
|
|
|
bucket_name = "bagel-mimir";
|
|
|
|
secret_access_key = "\${S3_KEY}"; # This is a secret injected via an environment variable
|
|
|
|
access_key_id = "\${S3_KEY_ID}";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
server = {
|
|
|
|
http_listen_port = 9009;
|
|
|
|
grpc_server_max_recv_msg_size = 104857600;
|
|
|
|
grpc_server_max_send_msg_size = 104857600;
|
|
|
|
grpc_server_max_concurrent_streams = 1000;
|
|
|
|
};
|
|
|
|
|
|
|
|
ingester.ring.replication_factor = 1;
|
|
|
|
|
|
|
|
blocks_storage.backend = "s3";
|
|
|
|
ruler_storage = {
|
|
|
|
backend = "local";
|
2024-07-07 14:05:48 +00:00
|
|
|
local.directory = pkgs.runCommand "mimir-rules" {} ''
|
|
|
|
mkdir -p $out
|
|
|
|
ln -s ${./alerts} $out/anonymous
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
alertmanager = {
|
|
|
|
sharding_ring.replication_factor = 1;
|
|
|
|
fallback_config_file = pkgs.writers.writeYAML "alertmanager.yaml" {
|
|
|
|
route = {
|
|
|
|
group_by = ["alertname"];
|
|
|
|
receiver = "matrix";
|
|
|
|
};
|
|
|
|
receivers = [
|
|
|
|
{
|
|
|
|
name = "matrix";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
2024-07-05 11:25:27 +00:00
|
|
|
};
|
2024-07-07 14:05:48 +00:00
|
|
|
alertmanager_storage.backend = "filesystem";
|
|
|
|
|
|
|
|
ruler.alertmanager_url = "http://localhost:${toString mimirPort}/alertmanager";
|
2024-07-05 11:25:27 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
systemd.services.mimir.serviceConfig.EnvironmentFile = [ config.age.secrets.mimir-environment.path ];
|
2024-07-07 14:05:48 +00:00
|
|
|
|
|
|
|
services.nginx.virtualHosts."mimir.forkos.org" = {
|
|
|
|
enableACME = true;
|
|
|
|
forceSSL = true;
|
2024-07-07 14:58:51 +00:00
|
|
|
locations."/api/v1/push" = {
|
2024-07-07 14:05:48 +00:00
|
|
|
proxyPass = "http://localhost:${toString mimirPort}";
|
2024-07-07 14:58:51 +00:00
|
|
|
basicAuthFile = config.age.secrets.metrics-push-htpasswd.path;
|
2024-07-07 14:05:48 +00:00
|
|
|
};
|
|
|
|
};
|
2024-07-05 11:25:27 +00:00
|
|
|
};
|
|
|
|
}
|