forked from mirrors/nixpkgs
68 lines
1.7 KiB
Nix
68 lines
1.7 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.prometheus.exporters.openldap;
|
|
in {
|
|
port = 9330;
|
|
extraOpts = {
|
|
ldapCredentialFile = mkOption {
|
|
type = types.path;
|
|
example = "/run/keys/ldap_pass";
|
|
description = ''
|
|
Environment file to contain the credentials to authenticate against
|
|
<package>openldap</package>.
|
|
|
|
The file should look like this:
|
|
<programlisting>
|
|
---
|
|
ldapUser: "cn=monitoring,cn=Monitor"
|
|
ldapPass: "secret"
|
|
</programlisting>
|
|
'';
|
|
};
|
|
protocol = mkOption {
|
|
default = "tcp";
|
|
example = "udp";
|
|
type = types.str;
|
|
description = ''
|
|
Which protocol to use to connect against <package>openldap</package>.
|
|
'';
|
|
};
|
|
ldapAddr = mkOption {
|
|
default = "localhost:389";
|
|
type = types.str;
|
|
description = ''
|
|
Address of the <package>openldap</package>-instance.
|
|
'';
|
|
};
|
|
metricsPath = mkOption {
|
|
default = "/metrics";
|
|
type = types.str;
|
|
description = ''
|
|
URL path where metrics should be exposed.
|
|
'';
|
|
};
|
|
interval = mkOption {
|
|
default = "30s";
|
|
type = types.str;
|
|
example = "1m";
|
|
description = ''
|
|
Scrape interval of the exporter.
|
|
'';
|
|
};
|
|
};
|
|
serviceOpts.serviceConfig = {
|
|
ExecStart = ''
|
|
${pkgs.prometheus-openldap-exporter}/bin/openldap_exporter \
|
|
--promAddr ${cfg.listenAddress}:${toString cfg.port} \
|
|
--metrPath ${cfg.metricsPath} \
|
|
--ldapNet ${cfg.protocol} \
|
|
--interval ${cfg.interval} \
|
|
--config ${cfg.ldapCredentialFile} \
|
|
${concatStringsSep " \\\n " cfg.extraFlags}
|
|
'';
|
|
};
|
|
}
|