monitor containers

This commit is contained in:
Ingolf Wagner 2024-05-18 12:02:21 +02:00
parent 3a4ed070f2
commit b890a69e30
No known key found for this signature in database
GPG key ID: 76BF5F1928B9618B
13 changed files with 134 additions and 97 deletions

View file

@ -1,4 +1,4 @@
{ lib, ... }: { lib, config, ... }:
with lib; with lib;
with types; with types;
{ {
@ -8,15 +8,23 @@ with types;
type = bool; type = bool;
default = true; default = true;
}; };
metrics.enable = mkOption {
type = bool;
default = config.components.monitor.enable;
};
logs.enable = mkOption {
type = bool;
default = config.components.monitor.enable;
};
}; };
imports = [ imports = [
./export-zfs.nix ./logs-promtail.nix
./netdata.nix ./metrics-export-zfs.nix
./metrics-netdata.nix
./metrics-prometheus.nix
./metrics-telegraf.nix
./opentelemetry.nix ./opentelemetry.nix
./prometheus.nix
./promtail.nix
./telegraf.nix
]; ];
config = mkIf config.components.monitor.enable { }; config = mkIf config.components.monitor.enable { };

View file

@ -8,7 +8,7 @@ in
options.components.monitor.promtail = { options.components.monitor.promtail = {
enable = mkOption { enable = mkOption {
type = lib.types.bool; type = lib.types.bool;
default = config.components.monitor.enable; default = config.components.monitor.logs.enable;
}; };
port = mkOption { port = mkOption {
type = int; type = int;
@ -32,10 +32,7 @@ in
services.promtail = { services.promtail = {
enable = true; enable = true;
configuration = { configuration = {
server = { server. disable = true;
http_listen_port = 28183;
grpc_listen_port = 0;
};
positions.filename = "/var/cache/promtail/positions.yaml"; positions.filename = "/var/cache/promtail/positions.yaml";
clients = [ clients = [

View file

@ -4,7 +4,7 @@ with types;
{ {
options.components.monitor.exporters.zfs.enable = mkOption { options.components.monitor.exporters.zfs.enable = mkOption {
type = lib.types.bool; type = lib.types.bool;
default = config.components.monitor.enable; default = config.components.monitor.metrics.enable;
}; };
config = mkMerge [ config = mkMerge [

View file

@ -2,8 +2,14 @@
with lib; with lib;
with types; with types;
{ {
options.components.monitor.netdata = {
enable = mkOption {
type = bool;
default = config.components.monitor.metrics.enable;
};
};
config = lib.mkIf config.components.monitor.enable { config = mkIf config.components.monitor.netdata.enable {
# netdata sink # netdata sink
services.opentelemetry-collector.settings.receivers.prometheus.config.scrape_configs = [ services.opentelemetry-collector.settings.receivers.prometheus.config.scrape_configs = [

View file

@ -8,7 +8,7 @@ in
options.components.monitor.prometheus = { options.components.monitor.prometheus = {
enable = mkOption { enable = mkOption {
type = lib.types.bool; type = lib.types.bool;
default = config.components.monitor.enable; default = config.components.monitor.metrics.enable;
}; };
port = mkOption { port = mkOption {
type = int; type = int;

View file

@ -2,10 +2,14 @@
with lib; with lib;
with types; with types;
let let
cfg = config.components.monitor; cfg = config.components.monitor.telegraf;
in in
{ {
options.components.monitor = { options.components.monitor.telegraf = {
enable = mkOption {
type = lib.types.bool;
default = config.components.monitor.metrics.enable;
};
influxDBPort = mkOption { influxDBPort = mkOption {
type = int; type = int;
default = 8088; default = 8088;
@ -14,7 +18,7 @@ in
}; };
config = lib.mkMerge [ config = lib.mkMerge [
(mkIf config.components.monitor.enable { (mkIf config.components.monitor.telegraf.enable {
# opentelemetry wireing # opentelemetry wireing
services.opentelemetry-collector.settings = { services.opentelemetry-collector.settings = {
receivers.influxdb.endpoint = "127.0.0.1:${toString cfg.influxDBPort}"; receivers.influxdb.endpoint = "127.0.0.1:${toString cfg.influxDBPort}";
@ -23,7 +27,7 @@ in
services.telegraf.extraConfig.outputs.influxdb_v2.urls = [ "http://127.0.0.1:${toString cfg.influxDBPort}" ]; services.telegraf.extraConfig.outputs.influxdb_v2.urls = [ "http://127.0.0.1:${toString cfg.influxDBPort}" ];
}) })
(mkIf config.components.monitor.enable { (mkIf config.components.monitor.telegraf.enable {
systemd.services.telegraf.path = [ pkgs.inetutils ]; systemd.services.telegraf.path = [ pkgs.inetutils ];

View file

@ -29,6 +29,7 @@ in
}; };
config = mkMerge [ config = mkMerge [
(mkIf config.components.monitor.enable { (mkIf config.components.monitor.enable {
services.opentelemetry-collector = { services.opentelemetry-collector = {
enable = true; enable = true;
@ -41,9 +42,6 @@ in
(mkIf config.components.monitor.enable { (mkIf config.components.monitor.enable {
services.opentelemetry-collector.settings = { services.opentelemetry-collector.settings = {
service.pipelines.metrics.processors = [ "metricstransform" "resourcedetection/system" ];
service.pipelines.logs.processors = [ "resourcedetection/system" ];
processors = { processors = {
# https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/processor/resourcedetectionprocessor/README.md # https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/processor/resourcedetectionprocessor/README.md
@ -68,6 +66,20 @@ in
}; };
}; };
}) })
(mkIf config.components.monitor.metrics.enable {
services.opentelemetry-collector.settings = {
service.pipelines.metrics.processors = [
"metricstransform"
"resourcedetection/system"
];
};
})
(mkIf config.components.monitor.logs.enable {
services.opentelemetry-collector.settings = {
service.pipelines.logs.processors = [ "resourcedetection/system" ];
};
})
(mkIf (config.components.monitor.opentelemetry.exporter.debug != null) { (mkIf (config.components.monitor.opentelemetry.exporter.debug != null) {
services.opentelemetry-collector.settings = { services.opentelemetry-collector.settings = {
@ -90,35 +102,62 @@ in
endpoint = cfg.exporter.endpoint; endpoint = cfg.exporter.endpoint;
tls.insecure = true; tls.insecure = true;
}; };
service = {
pipelines.metrics = {
exporters = [ "otlp" ];
};
pipelines.logs = {
exporters = [ "otlp" ];
};
};
}; };
}) })
(mkIf
(
config.components.monitor.opentelemetry.exporter.endpoint != null &&
config.components.monitor.logs.enable
)
{
services.opentelemetry-collector.settings = {
service.pipelines.logs.exporters = [ "otlp" ];
};
})
(mkIf
(
config.components.monitor.opentelemetry.exporter.endpoint != null &&
config.components.monitor.metrics.enable
)
{
services.opentelemetry-collector.settings = {
service.pipelines.metrics.exporters = [ "otlp" ];
};
})
# ship from other instance # ship from other instance
(mkIf (config.components.monitor.opentelemetry.receiver.endpoint != null) { (mkIf (config.components.monitor.opentelemetry.receiver.endpoint != null) {
services.opentelemetry-collector.settings = { services.opentelemetry-collector.settings = {
receivers.otlp.protocols.grpc.endpoint = cfg.receiver.endpoint; receivers.otlp.protocols.grpc.endpoint = cfg.receiver.endpoint;
service = {
pipelines.metrics = {
receivers = [ "otlp" ];
};
pipelines.logs = {
receivers = [ "otlp" ];
};
};
}; };
}) })
(mkIf
(
config.components.monitor.opentelemetry.receiver.endpoint != null &&
config.components.monitor.logs.enable
)
{
services.opentelemetry-collector.settings = {
service.pipelines.logs.receivers = [ "otlp" ];
};
})
(mkIf
(
config.components.monitor.opentelemetry.receiver.endpoint != null &&
config.components.monitor.metrics.enable
)
{
services.opentelemetry-collector.settings = {
service.pipelines.metrics.receivers = [ "otlp" ];
};
})
# scrape opentelemetry-colectors metrics # scrape opentelemetry-colectors metrics
# todo: this should be collected another way (opentelemetry internal?) # todo: this should be collected another way (opentelemetry internal?)
(mkIf config.components.monitor.enable { # todo : enable me only when metrics.endpoint is set.
(mkIf config.components.monitor.metrics.enable {
services.opentelemetry-collector.settings = { services.opentelemetry-collector.settings = {
receivers = { receivers = {
prometheus.config.scrape_configs = [ prometheus.config.scrape_configs = [
@ -151,6 +190,11 @@ in
}; };
}) })
(mkIf (! config.components.monitor.metrics.enable) {
services.opentelemetry-collector.settings = {
service.telemetry.metrics.level = "none";
};
})
]; ];
} }

View file

@ -29,7 +29,7 @@
metrics_path = "/api/prometheus"; metrics_path = "/api/prometheus";
bearer_token_file = toString config.sops.secrets.hass_long_term_token.path; bearer_token_file = toString config.sops.secrets.hass_long_term_token.path;
static_configs = [{ static_configs = [{
targets = [ "localhost:8123" ]; targets = [ "127.0.0.1:8123" ];
}]; }];
} }
]; ];

View file

@ -0,0 +1,22 @@
{ lib, config, ... }:
with lib;
with types;
{
imports = [
../../components/monitor
];
# todo create a the components.monitor.container module.
options.promtail.port = mkOption {
type = int;
};
config = {
components.monitor.enable = true;
components.monitor.metrics.enable = false;
components.monitor.promtail.port = config.promtail.port;
components.monitor.opentelemetry.exporter.endpoint = "127.0.0.1:4317";
};
}

View file

@ -86,14 +86,18 @@ in
privateNetwork = false; privateNetwork = false;
autoStart = true; autoStart = true;
config = { config, pkgs, lib, ... }: {
config = { config, lib, ... }: {
nixpkgs.pkgs = pkgs;
imports = [ ./container-monitoring.nix ];
promtail.port = 3502;
system.stateVersion = "23.11";
# Configuring nameservers for containers is currently broken. # Configuring nameservers for containers is currently broken.
# Therefore in some cases internet connectivity can be broken inside the containers. # Therefore in some cases internet connectivity can be broken inside the containers.
# A temporary workaround is to manually write the /etc/nixos/resolv.conf file like this: # A temporary workaround is to manually write the /etc/nixos/resolv.conf file like this:
#environment.etc."resolv.conf".text = "nameserver 8.8.8.8"; #environment.etc."resolv.conf".text = "nameserver 8.8.8.8";
system.stateVersion = "23.11";
users.users.nextcloud.uid = nextcloudUid; users.users.nextcloud.uid = nextcloudUid;

View file

@ -1,54 +0,0 @@
{ config, lib, pkgs, ... }:
{
# https://docs.tdarr.io/docs/installation/docker/run-compose
virtualisation.oci-containers = {
containers.tdarr = {
volumes = [
"/media/arr/tdarr/server:/app/server"
"/media/arr/tdarr/configs:/app/configs"
"/media/arr/tdarr/logs:/app/logs"
"/media/arr/tdarr/transcode_cache:/temp"
"/media:/media"
];
environment = {
serverIP = "0.0.0.0";
serverPort = "8266";
webUIPort = "8265";
internalNode = "true";
inContainer = "true";
nodeName = "robi";
TZ = "Europe/Berlin";
PUID = toString config.users.users.media.uid;
PGID = toString config.users.groups.media.gid;
};
ports = [
"127.0.0.1:8265:8265" # WebUI
# "8266:8266" # server port
];
image = "ghcr.io/haveagitgat/tdarr:latest"; # Warning: if the tag does not change, the image will not be updated
extraOptions = [
#"--network=bridge"
#"--privileged"
];
};
};
#networking.firewall.interfaces.wg0.allowedTCPPorts = [ 8266 ];
#networking.firewall.interfaces.wg0.allowedUDPPorts = [ 8266 ];
#networking.firewall.interfaces.enp0s31f6.allowedTCPPorts = [ 8266 ];
#networking.firewall.interfaces.enp0s31f6.allowedUDPPorts = [ 8266 ];
services.nginx.virtualHosts."tdarr.${config.networking.hostName}.private" = {
extraConfig = ''
allow ${config.tinc.private.subnet};
deny all;
'';
locations."/" = {
proxyPass = "http://localhost:8265";
proxyWebsockets = true;
};
};
}

View file

@ -13,7 +13,10 @@ in
privateNetwork = false; privateNetwork = false;
autoStart = true; autoStart = true;
config = { config, pkgs, lib, ... }: { config = { config, lib, ... }: {
nixpkgs.pkgs = pkgs;
imports = [ ./container-monitoring.nix ];
promtail.port = 3503;
system.stateVersion = "23.11"; system.stateVersion = "23.11";
# Photoprism # Photoprism

View file

@ -68,7 +68,10 @@ in
}; };
}; };
config = { config, pkgs, lib, ... }: { config = { config, lib, ... }: {
nixpkgs.pkgs = pkgs;
imports = [ ./container-monitoring.nix ];
promtail.port = 3504;
system.stateVersion = "23.11"; system.stateVersion = "23.11";
services.postgresql = { services.postgresql = {