nox/modules/alloy.nix

81 lines
1.9 KiB
Nix

{
modulesPath,
config,
lib,
pkgs,
...
}:
{
sops = {
secrets."services/loki/basic_auth" = {
mode = "0440";
owner = "alloy";
group = "alloy";
restartUnits = [ "alloy.service" ];
sopsFile = ../secrets/passwords.yaml;
};
secrets."services/mimir/basic_auth" = {
mode = "0440";
owner = "alloy";
group = "alloy";
restartUnits = [ "alloy.service" ];
sopsFile = ../secrets/passwords.yaml;
};
};
services.alloy = {
enable = true;
configPath = "/etc/alloy/config.alloy";
};
environment.etc."alloy/config.alloy" = {
text = ''
prometheus.remote_write "default" {
endpoint {
url = "http://mimir.noc.eh22.intern/api/v1/push"
basic_auth {
username = "noc"
password_file = "${config.sops.secrets."services/mimir/basic_auth".path}"
}
}
}
loki.write "default" {
endpoint {
url = "http://loki.noc.eh22.intern/loki/api/v1/push"
basic_auth {
username = "noc"
password_file = "${config.sops.secrets."services/loki/basic_auth".path}"
}
}
}
loki.relabel "journal" {
forward_to = []
rule {
source_labels = ["__journal__systemd_unit"]
target_label = "unit"
}
}
loki.source.journal "read_journal" {
forward_to = [loki.write.default.receiver]
relabel_rules = loki.relabel.journal.rules
labels = {component = "loki.source.journal", host = "${config.networking.hostName}"}
}
logging {
level = "info"
format = "logfmt"
}
prometheus.exporter.unix "local_system" { }
prometheus.scrape "scrape_metrics" {
targets = prometheus.exporter.unix.local_system.targets
forward_to = [prometheus.remote_write.default.receiver]
scrape_interval = "10s"
}
'';
};
}