1{
2 config,
3 lib,
4 pkgs,
5 utils,
6 ...
7}:
8let
9 cfg = config.services.journald;
10in
11{
12 imports = [
13 (lib.mkRenamedOptionModule
14 [ "services" "journald" "enableHttpGateway" ]
15 [ "services" "journald" "gateway" "enable" ]
16 )
17 ];
18
19 options = {
20 services.journald.console = lib.mkOption {
21 default = "";
22 type = lib.types.str;
23 description = "If non-empty, write log messages to the specified TTY device.";
24 };
25
26 services.journald.rateLimitInterval = lib.mkOption {
27 default = "30s";
28 type = lib.types.str;
29 description = ''
30 Configures the rate limiting interval that is applied to all
31 messages generated on the system. This rate limiting is applied
32 per-service, so that two services which log do not interfere with
33 each other's limit. The value may be specified in the following
34 units: s, min, h, ms, us. To turn off any kind of rate limiting,
35 set either value to 0.
36
37 See {option}`services.journald.rateLimitBurst` for important
38 considerations when setting this value.
39 '';
40 };
41
42 services.journald.storage = lib.mkOption {
43 default = "persistent";
44 type = lib.types.enum [
45 "persistent"
46 "volatile"
47 "auto"
48 "none"
49 ];
50 description = ''
51 Controls where to store journal data. See
52 {manpage}`journald.conf(5)` for further information.
53 '';
54 };
55
56 services.journald.rateLimitBurst = lib.mkOption {
57 default = 10000;
58 type = lib.types.int;
59 description = ''
60 Configures the rate limiting burst limit (number of messages per
61 interval) that is applied to all messages generated on the system.
62 This rate limiting is applied per-service, so that two services
63 which log do not interfere with each other's limit.
64
65 Note that the effective rate limit is multiplied by a factor derived
66 from the available free disk space for the journal as described on
67 {manpage}`journald.conf(5)`.
68
69 Note that the total amount of logs stored is limited by journald settings
70 such as `SystemMaxUse`, which defaults to 10% the file system size
71 (capped at max 4GB), and `SystemKeepFree`, which defaults to 15% of the
72 file system size.
73
74 It is thus recommended to compute what period of time that you will be
75 able to store logs for when an application logs at full burst rate.
76 With default settings for log lines that are 100 Bytes long, this can
77 amount to just a few hours.
78 '';
79 };
80
81 services.journald.audit = lib.mkOption {
82 default = null;
83 type = lib.types.nullOr lib.types.bool;
84 description = ''
85 If enabled systemd-journald will turn on auditing on start-up.
86 If disabled it will turn it off. If unset it will neither enable nor disable it, leaving the previous state unchanged.
87
88 NixOS defaults to leaving this unset as enabling audit without auditd running leads to spamming /dev/kmesg with random messages
89 and if you enable auditd then auditd is responsible for turning auditing on.
90
91 If you want to have audit logs in journald and do not mind audit logs also ending up in /dev/kmesg you can set this option to true.
92
93 If you want to for some ununderstandable reason disable auditing if auditd enabled it then you can set this option to false.
94 It is of NixOS' opinion that setting this to false is definitely the wrong thing to do - but it's an option.
95 '';
96 };
97
98 services.journald.extraConfig = lib.mkOption {
99 default = "";
100 type = lib.types.lines;
101 example = "Storage=volatile";
102 description = ''
103 Extra config options for systemd-journald. See {manpage}`journald.conf(5)`
104 for available options.
105 '';
106 };
107
108 services.journald.forwardToSyslog = lib.mkOption {
109 default = config.services.rsyslogd.enable || config.services.syslog-ng.enable;
110 defaultText = lib.literalExpression "services.rsyslogd.enable || services.syslog-ng.enable";
111 type = lib.types.bool;
112 description = ''
113 Whether to forward log messages to syslog.
114 '';
115 };
116 };
117
118 config = {
119 systemd.additionalUpstreamSystemUnits =
120 [
121 "systemd-journald.socket"
122 "systemd-journald@.socket"
123 "systemd-journald-varlink@.socket"
124 "systemd-journald.service"
125 "systemd-journald@.service"
126 "systemd-journal-flush.service"
127 "systemd-journal-catalog-update.service"
128 "systemd-journald-sync@.service"
129 ]
130 ++ (lib.optional (!config.boot.isContainer) "systemd-journald-audit.socket")
131 ++ [
132 "systemd-journald-dev-log.socket"
133 "syslog.socket"
134 ];
135
136 systemd.sockets.systemd-journald-audit.wantedBy = [
137 "systemd-journald.service"
138 "sockets.target"
139 ];
140
141 environment.etc = {
142 "systemd/journald.conf".text = ''
143 [Journal]
144 Storage=${cfg.storage}
145 RateLimitInterval=${cfg.rateLimitInterval}
146 RateLimitBurst=${toString cfg.rateLimitBurst}
147 ${lib.optionalString (cfg.console != "") ''
148 ForwardToConsole=yes
149 TTYPath=${cfg.console}
150 ''}
151 ${lib.optionalString (cfg.forwardToSyslog) ''
152 ForwardToSyslog=yes
153 ''}
154 Audit=${utils.systemdUtils.lib.toOption cfg.audit}
155 ${cfg.extraConfig}
156 '';
157 };
158
159 users.groups.systemd-journal.gid = config.ids.gids.systemd-journal;
160
161 systemd.services.systemd-journal-flush.restartIfChanged = false;
162 systemd.services.systemd-journald.restartTriggers = [
163 config.environment.etc."systemd/journald.conf".source
164 ];
165 systemd.services.systemd-journald.stopIfChanged = false;
166 systemd.services."systemd-journald@".restartTriggers = [
167 config.environment.etc."systemd/journald.conf".source
168 ];
169 systemd.services."systemd-journald@".stopIfChanged = false;
170 };
171}