nix machine / user configurations

feat(wolumonde): collect metrics from netbird [skip ci]

ptr.pet 13a05010 188fdf7b

verified
Changed files
+17 -2
hosts
wolumonde
modules
+17 -2
hosts/wolumonde/modules/netbird.nix
···
{ config, ... }:
let
oidcUrl = config.services.pocket-id.settings.APP_URL;
oidcClientId = "41f4ea08-a20f-43dc-aa75-c76efa49bbb8";
in
···
AUTH_CLIENT_ID = oidcClientId;
AUTH_AUDIENCE = oidcClientId;
};
management = {
metricsPort = 9409;
oidcConfigEndpoint = "${oidcUrl}/.well-known/openid-configuration";
-
turnDomain = config.services.netbird.server.domain;
settings = {
TURNConfig.Secret._secret = config.age.secrets.netbirdTurnSecret.path;
DataStoreEncryptionKey._secret = config.age.secrets.netbirdDataStoreEncKey.path;
···
};
};
-
services.nginx.virtualHosts.${config.services.netbird.server.domain} = {
useACMEHost = "gaze.systems";
forceSSL = true;
quic = true;
kTLS = true;
};
}
···
{ config, ... }:
let
+
cfg = config.services.netbird.server;
oidcUrl = config.services.pocket-id.settings.APP_URL;
oidcClientId = "41f4ea08-a20f-43dc-aa75-c76efa49bbb8";
in
···
AUTH_CLIENT_ID = oidcClientId;
AUTH_AUDIENCE = oidcClientId;
};
+
signal.metricsPort = 9091;
management = {
metricsPort = 9409;
oidcConfigEndpoint = "${oidcUrl}/.well-known/openid-configuration";
+
turnDomain = cfg.domain;
settings = {
TURNConfig.Secret._secret = config.age.secrets.netbirdTurnSecret.path;
DataStoreEncryptionKey._secret = config.age.secrets.netbirdDataStoreEncKey.path;
···
};
};
+
services.nginx.virtualHosts.${cfg.domain} = {
useACMEHost = "gaze.systems";
forceSSL = true;
quic = true;
kTLS = true;
};
+
+
services.victoriametrics.prometheusConfig.scrape_configs = [
+
{
+
job_name = "netbird_management";
+
metrics_path = "/metrics";
+
static_configs = [ { targets = [ "localhost:${toString cfg.management.metricsPort}" ]; } ];
+
}
+
{
+
job_name = "netbird_signal";
+
metrics_path = "/metrics";
+
static_configs = [ { targets = [ "localhost${toString cfg.signal.metricsPort}" ]; } ];
+
}
+
];
}