Merge pull request #40028 from WilliButz/add-dnsmasq-exporter

prometheus-dnsmasq-exporter: init at 2018-05-05, add module

Changed files
+157
nixos
modules
services
monitoring
prometheus
pkgs
servers
top-level
+1
nixos/modules/services/monitoring/prometheus/exporters.nix
···
exporterOpts = {
blackbox = import ./exporters/blackbox.nix { inherit config lib pkgs; };
collectd = import ./exporters/collectd.nix { inherit config lib pkgs; };
+
dnsmasq = import ./exporters/dnsmasq.nix { inherit config lib pkgs; };
dovecot = import ./exporters/dovecot.nix { inherit config lib pkgs; };
fritzbox = import ./exporters/fritzbox.nix { inherit config lib pkgs; };
json = import ./exporters/json.nix { inherit config lib pkgs; };
+39
nixos/modules/services/monitoring/prometheus/exporters/dnsmasq.nix
···
+
{ config, lib, pkgs }:
+
+
with lib;
+
+
let
+
cfg = config.services.prometheus.exporters.dnsmasq;
+
in
+
{
+
port = 9153;
+
extraOpts = {
+
dnsmasqListenAddress = mkOption {
+
type = types.str;
+
default = "localhost:53";
+
description = ''
+
Address on which dnsmasq listens.
+
'';
+
};
+
leasesPath = mkOption {
+
type = types.path;
+
default = "/var/lib/misc/dnsmasq.leases";
+
example = "/var/lib/dnsmasq/dnsmasq.leases";
+
description = ''
+
Path to the <literal>dnsmasq.leases</literal> file.
+
'';
+
};
+
};
+
serviceOpts = {
+
serviceConfig = {
+
DynamicUser = true;
+
ExecStart = ''
+
${pkgs.prometheus-dnsmasq-exporter}/bin/dnsmasq_exporter \
+
--listen ${cfg.listenAddress}:${toString cfg.port} \
+
--dnsmasq ${cfg.dnsmasqListenAddress} \
+
--leases_path ${cfg.leasesPath} \
+
${concatStringsSep " \\\n " cfg.extraFlags}
+
'';
+
};
+
};
+
}
+93
pkgs/servers/monitoring/prometheus/dnsmasq-exporter-deps.nix
···
+
# This file was generated by https://github.com/kamilchm/go2nix v1.2.1
+
[
+
{
+
goPackagePath = "github.com/beorn7/perks";
+
fetch = {
+
type = "git";
+
url = "https://github.com/beorn7/perks";
+
rev = "3a771d992973f24aa725d07868b467d1ddfceafb";
+
sha256 = "1l2lns4f5jabp61201sh88zf3b0q793w4zdgp9nll7mmfcxxjif3";
+
};
+
}
+
{
+
goPackagePath = "github.com/golang/protobuf";
+
fetch = {
+
type = "git";
+
url = "https://github.com/golang/protobuf";
+
rev = "b4deda0973fb4c70b50d226b1af49f3da59f5265";
+
sha256 = "0ya4ha7m20bw048m1159ppqzlvda4x0vdprlbk5sdgmy74h3xcdq";
+
};
+
}
+
{
+
goPackagePath = "github.com/matttproud/golang_protobuf_extensions";
+
fetch = {
+
type = "git";
+
url = "https://github.com/matttproud/golang_protobuf_extensions";
+
rev = "c12348ce28de40eed0136aa2b644d0ee0650e56c";
+
sha256 = "1d0c1isd2lk9pnfq2nk0aih356j30k3h1gi2w0ixsivi5csl7jya";
+
};
+
}
+
{
+
goPackagePath = "github.com/miekg/dns";
+
fetch = {
+
type = "git";
+
url = "https://github.com/miekg/dns";
+
rev = "9c76f9827e170bfcd354c2cb02a6fd428faf81a6";
+
sha256 = "0yym4jr15cqwlppnqfsp92i7p1ir12ys695wffb3in7gnnm0d38n";
+
};
+
}
+
{
+
goPackagePath = "github.com/prometheus/client_golang";
+
fetch = {
+
type = "git";
+
url = "https://github.com/prometheus/client_golang";
+
rev = "82f5ff156b29e276022b1a958f7d385870fb9814";
+
sha256 = "111j329yrlgvh73dm80gawwxsh9dgjkw74254kyj5c2rfmra7znz";
+
};
+
}
+
{
+
goPackagePath = "github.com/prometheus/client_model";
+
fetch = {
+
type = "git";
+
url = "https://github.com/prometheus/client_model";
+
rev = "99fa1f4be8e564e8a6b613da7fa6f46c9edafc6c";
+
sha256 = "19y4ywsivhpxj7ikf2j0gm9k3cmyw37qcbfi78n526jxcc7kw998";
+
};
+
}
+
{
+
goPackagePath = "github.com/prometheus/common";
+
fetch = {
+
type = "git";
+
url = "https://github.com/prometheus/common";
+
rev = "d811d2e9bf898806ecfb6ef6296774b13ffc314c";
+
sha256 = "0r4067r4ysmljksqw3awcxx5qplqhykahc5igdzgkky7i4bvaik1";
+
};
+
}
+
{
+
goPackagePath = "github.com/prometheus/procfs";
+
fetch = {
+
type = "git";
+
url = "https://github.com/prometheus/procfs";
+
rev = "8b1c2da0d56deffdbb9e48d4414b4e674bd8083e";
+
sha256 = "0x128p15h35mgwqxkigfkk1lfrcz9g697ahl8v6xp9kwvcqvjrrf";
+
};
+
}
+
{
+
goPackagePath = "golang.org/x/net";
+
fetch = {
+
type = "git";
+
url = "https://go.googlesource.com/net";
+
rev = "640f4622ab692b87c2f3a94265e6f579fe38263d";
+
sha256 = "097m4qhcljhp180171j5fjhq4740iirfkkajfd7yrxqhp4s9hljx";
+
};
+
}
+
{
+
goPackagePath = "golang.org/x/sync";
+
fetch = {
+
type = "git";
+
url = "https://go.googlesource.com/sync";
+
rev = "1d60e4601c6fd243af51cc01ddf169918a5407ca";
+
sha256 = "046jlanz2lkxq1r57x9bl6s4cvfqaic6p2xybsj8mq1120jv4rs6";
+
};
+
}
+
]
+23
pkgs/servers/monitoring/prometheus/dnsmasq-exporter.nix
···
+
{ stdenv, buildGoPackage, fetchFromGitHub }:
+
+
buildGoPackage rec {
+
name = "dnsmasq_exporter-unstable-2018-05-05";
+
+
goPackagePath = "github.com/google/dnsmasq_exporter";
+
+
src = fetchFromGitHub {
+
owner = "google";
+
repo = "dnsmasq_exporter";
+
sha256 = "1kzq4h7z28xadx425nbgxadk62yiz6279d300fyiyi83hwq0ay8c";
+
rev = "e1f281b435bbefbb2d17fc57c051ede0ab973c59";
+
};
+
+
goDeps = ./dnsmasq-exporter-deps.nix;
+
+
meta = with stdenv.lib; {
+
inherit (src.meta) homepage;
+
description = "A dnsmasq exporter for Prometheus";
+
license = licenses.asl20;
+
maintainers = with maintainers; [ willibutz ];
+
};
+
}
+1
pkgs/top-level/all-packages.nix
···
prometheus-blackbox-exporter = callPackage ../servers/monitoring/prometheus/blackbox-exporter.nix { };
prometheus-collectd-exporter = callPackage ../servers/monitoring/prometheus/collectd-exporter.nix { };
prometheus-consul-exporter = callPackage ../servers/monitoring/prometheus/consul-exporter.nix { };
+
prometheus-dnsmasq-exporter = callPackage ../servers/monitoring/prometheus/dnsmasq-exporter.nix { };
prometheus-dovecot-exporter = callPackage ../servers/monitoring/prometheus/dovecot-exporter.nix { };
prometheus-fritzbox-exporter = callPackage ../servers/monitoring/prometheus/fritzbox-exporter.nix { };
prometheus-haproxy-exporter = callPackage ../servers/monitoring/prometheus/haproxy-exporter.nix { };