Add a NixOS module to run bosun

Changed files
+124
nixos
modules
misc
services
monitoring
+2
nixos/modules/misc/ids.nix
···
hbase = 158;
opentsdb = 159;
scollector = 160;
+
bosun = 161;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
···
systemd-timesync = 154;
liquidsoap = 155;
scollector = 156;
+
bosun = 157;
# When adding a gid, make sure it doesn't match an existing uid. And don't use gids above 399!
+1
nixos/modules/module-list.nix
···
./services/misc/uhub.nix
./services/misc/zookeeper.nix
./services/monitoring/apcupsd.nix
+
./services/monitoring/bosun.nix
./services/monitoring/collectd.nix
./services/monitoring/dd-agent.nix
./services/monitoring/graphite.nix
+121
nixos/modules/services/monitoring/bosun.nix
···
+
{ config, lib, pkgs, ... }:
+
+
with lib;
+
+
let
+
cfg = config.services.bosun;
+
+
configFile = pkgs.writeText "bosun.conf" ''
+
tsdbHost = ${cfg.opentsdbHost}
+
httpListen = ${cfg.listenAddress}
+
stateFile = ${cfg.stateFile}
+
checkFrequency = 5m
+
'';
+
+
in {
+
+
options = {
+
+
services.bosun = {
+
+
enable = mkOption {
+
type = types.bool;
+
default = false;
+
description = ''
+
Whether to run bosun.
+
'';
+
};
+
+
package = mkOption {
+
type = types.package;
+
default = pkgs.bosun;
+
example = literalExample "pkgs.bosun";
+
description = ''
+
bosun binary to use.
+
'';
+
};
+
+
user = mkOption {
+
type = types.string;
+
default = "bosun";
+
description = ''
+
User account under which bosun runs.
+
'';
+
};
+
+
group = mkOption {
+
type = types.string;
+
default = "bosun";
+
description = ''
+
Group account under which bosun runs.
+
'';
+
};
+
+
opentsdbHost = mkOption {
+
type = types.string;
+
default = "localhost:4242";
+
description = ''
+
Host and port of the OpenTSDB database that stores bosun data.
+
'';
+
};
+
+
listenAddress = mkOption {
+
type = types.string;
+
default = ":8070";
+
description = ''
+
The host address and port that bosun's web interface will listen on.
+
'';
+
};
+
+
stateFile = mkOption {
+
type = types.string;
+
default = "/var/lib/bosun/bosun.state";
+
description = ''
+
Path to bosun's state file.
+
'';
+
};
+
+
};
+
+
};
+
+
config = mkIf config.services.bosun.enable {
+
+
+
systemd.services.bosun = {
+
description = "bosun metrics collector (part of Bosun)";
+
wantedBy = [ "multi-user.target" ];
+
+
preStart =
+
''
+
mkdir -p `dirname ${cfg.stateFile}`;
+
touch ${cfg.stateFile}
+
touch ${cfg.stateFile}.tmp
+
+
if [ "$(id -u)" = 0 ]; then
+
chown ${cfg.user}:${cfg.group} ${cfg.stateFile}
+
chown ${cfg.user}:${cfg.group} ${cfg.stateFile}.tmp
+
fi
+
'';
+
+
serviceConfig = {
+
PermissionsStartOnly = true;
+
User = cfg.user;
+
Group = cfg.group;
+
ExecStart = ''
+
${cfg.package}/bin/bosun -c ${configFile}
+
'';
+
};
+
};
+
+
users.extraUsers.bosun = {
+
description = "bosun user";
+
group = "bosun";
+
uid = config.ids.uids.bosun;
+
};
+
+
users.extraGroups.bosun.gid = config.ids.gids.bosun;
+
+
};
+
+
}