nixos/journaldriver: add module for journaldriver log forwarder

Adds a module for running the journaldriver log forwarding agent via
systemd.

The agent can be deployed on both GCP instances and machines hosted
elsewhere to forward all logs from journald to Stackdriver Logging.

Consult the module options and upstream documentation for more
information.

Implementation notes:

* The service unit is configured to use systemd's dynamic user feature
which will let systemd set up the state directory and appropriate
user configuration at unit launch time instead of hardcoding it.

* The module depends on `network-online.target` to prevent a situation
where journaldriver is failing and restarting multiple times before
the network is online.

Changed files
+112
nixos
modules
services
+112
nixos/modules/services/logging/journaldriver.nix
···
+
# This module implements a systemd service for running journaldriver,
+
# a log forwarding agent that sends logs from journald to Stackdriver
+
# Logging.
+
#
+
# It can be enabled without extra configuration when running on GCP.
+
# On machines hosted elsewhere, the other configuration options need
+
# to be set.
+
#
+
# For further information please consult the documentation in the
+
# upstream repository at: https://github.com/aprilabank/journaldriver/
+
+
{ config, lib, pkgs, ...}:
+
+
with lib; let cfg = config.services.journaldriver;
+
in {
+
options.services.journaldriver = {
+
enable = mkOption {
+
type = types.bool;
+
default = false;
+
description = ''
+
Whether to enable journaldriver to forward journald logs to
+
Stackdriver Logging.
+
'';
+
};
+
+
logLevel = mkOption {
+
type = types.str;
+
default = "info";
+
description = ''
+
Log level at which journaldriver logs its own output.
+
'';
+
};
+
+
logName = mkOption {
+
type = with types; nullOr str;
+
default = null;
+
description = ''
+
Configures the name of the target log in Stackdriver Logging.
+
This option can be set to, for example, the hostname of a
+
machine to improve the user experience in the logging
+
overview.
+
'';
+
};
+
+
googleCloudProject = mkOption {
+
type = with types; nullOr str;
+
default = null;
+
description = ''
+
Configures the name of the Google Cloud project to which to
+
forward journald logs.
+
+
This option is required on non-GCP machines, but should not be
+
set on GCP instances.
+
'';
+
};
+
+
logStream = mkOption {
+
type = with types; nullOr str;
+
default = null;
+
description = ''
+
Configures the name of the Stackdriver Logging log stream into
+
which to write journald entries.
+
+
This option is required on non-GCP machines, but should not be
+
set on GCP instances.
+
'';
+
};
+
+
applicationCredentials = mkOption {
+
type = with types; nullOr path;
+
default = null;
+
description = ''
+
Path to the service account private key (in JSON-format) used
+
to forward log entries to Stackdriver Logging on non-GCP
+
instances.
+
+
This option is required on non-GCP machines, but should not be
+
set on GCP instances.
+
'';
+
};
+
};
+
+
config = mkIf cfg.enable {
+
systemd.services.journaldriver = {
+
description = "Stackdriver Logging journal forwarder";
+
script = "${pkgs.journaldriver}/bin/journaldriver";
+
after = [ "network-online.target" ];
+
wantedBy = [ "multi-user.target" ];
+
+
serviceConfig = {
+
Restart = "always";
+
DynamicUser = true;
+
+
# This directive lets systemd automatically configure
+
# permissions on /var/lib/journaldriver, the directory in
+
# which journaldriver persists its cursor state.
+
StateDirectory = "journaldriver";
+
+
# This group is required for accessing journald.
+
SupplementaryGroups = "systemd-journal";
+
};
+
+
environment = {
+
RUST_LOG = cfg.logLevel;
+
LOG_NAME = cfg.logName;
+
LOG_STREAM = cfg.logStream;
+
GOOGLE_CLOUD_PROJECT = cfg.googleCloudProject;
+
GOOGLE_APPLICATION_CREDENTIALS = cfg.applicationCredentials;
+
};
+
};
+
};
+
}