2015-06-08 07:36:56 +01:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
let
|
|
|
|
cfg = config.services.prometheus;
|
2019-04-08 22:02:15 +01:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
workingDir = "/var/lib/" + cfg.stateDir;
|
2018-11-04 13:30:47 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
# a wrapper that verifies that the configuration is valid
|
|
|
|
promtoolCheck = what: name: file:
|
2019-11-17 05:35:33 +00:00
|
|
|
if cfg.checkConfig then
|
2020-04-12 19:11:36 +01:00
|
|
|
pkgs.runCommandNoCCLocal
|
2019-11-17 05:35:33 +00:00
|
|
|
"${name}-${replaceStrings [" "] [""] what}-checked"
|
|
|
|
{ buildInputs = [ cfg.package ]; } ''
|
|
|
|
ln -s ${file} $out
|
|
|
|
promtool ${what} $out
|
|
|
|
'' else file;
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2015-06-08 07:36:56 +01:00
|
|
|
# Pretty-print JSON to a file
|
|
|
|
writePrettyJSON = name: x:
|
2020-04-12 19:11:36 +01:00
|
|
|
pkgs.runCommandNoCCLocal name {} ''
|
2015-06-08 07:36:56 +01:00
|
|
|
echo '${builtins.toJSON x}' | ${pkgs.jq}/bin/jq . > $out
|
|
|
|
'';
|
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
generatedPrometheusYml = writePrettyJSON "prometheus.yml" promConfig;
|
|
|
|
|
|
|
|
# This becomes the main config file for Prometheus
|
2015-06-08 07:36:56 +01:00
|
|
|
promConfig = {
|
2019-04-17 13:08:16 +01:00
|
|
|
global = filterValidPrometheus cfg.globalConfig;
|
2019-09-06 20:40:27 +01:00
|
|
|
rule_files = map (promtoolCheck "check rules" "rules") (cfg.ruleFiles ++ [
|
2015-06-08 07:36:56 +01:00
|
|
|
(pkgs.writeText "prometheus.rules" (concatStringsSep "\n" cfg.rules))
|
2018-11-04 13:30:47 +00:00
|
|
|
]);
|
2019-04-17 13:08:16 +01:00
|
|
|
scrape_configs = filterValidPrometheus cfg.scrapeConfigs;
|
2019-09-06 20:40:27 +01:00
|
|
|
alerting = {
|
|
|
|
inherit (cfg) alertmanagers;
|
|
|
|
};
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
|
2018-11-04 13:30:47 +00:00
|
|
|
prometheusYml = let
|
2019-02-21 14:29:54 +00:00
|
|
|
yml = if cfg.configText != null then
|
2016-12-20 23:06:42 +00:00
|
|
|
pkgs.writeText "prometheus.yml" cfg.configText
|
2018-11-04 13:30:47 +00:00
|
|
|
else generatedPrometheusYml;
|
2019-09-06 20:40:27 +01:00
|
|
|
in promtoolCheck "check config" "prometheus.yml" yml;
|
2016-12-20 23:06:42 +00:00
|
|
|
|
2015-06-08 07:36:56 +01:00
|
|
|
cmdlineArgs = cfg.extraFlags ++ [
|
2019-09-06 20:40:27 +01:00
|
|
|
"--storage.tsdb.path=${workingDir}/data/"
|
2020-10-31 19:52:13 +00:00
|
|
|
"--config.file=/run/prometheus/prometheus-substituted.yaml"
|
2020-05-08 23:58:31 +01:00
|
|
|
"--web.listen-address=${cfg.listenAddress}:${builtins.toString cfg.port}"
|
2019-09-06 20:40:27 +01:00
|
|
|
"--alertmanager.notification-queue-capacity=${toString cfg.alertmanagerNotificationQueueCapacity}"
|
|
|
|
"--alertmanager.timeout=${toString cfg.alertmanagerTimeout}s"
|
2019-09-21 13:50:08 +01:00
|
|
|
] ++ optional (cfg.webExternalUrl != null) "--web.external-url=${cfg.webExternalUrl}"
|
|
|
|
++ optional (cfg.retentionTime != null) "--storage.tsdb.retention.time=${cfg.retentionTime}";
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-04-17 13:49:09 +01:00
|
|
|
filterValidPrometheus = filterAttrsListRecursive (n: v: !(n == "_module" || v == null));
|
2019-04-16 15:06:11 +01:00
|
|
|
filterAttrsListRecursive = pred: x:
|
|
|
|
if isAttrs x then
|
|
|
|
listToAttrs (
|
|
|
|
concatMap (name:
|
|
|
|
let v = x.${name}; in
|
|
|
|
if pred name v then [
|
|
|
|
(nameValuePair name (filterAttrsListRecursive pred v))
|
|
|
|
] else []
|
|
|
|
) (attrNames x)
|
|
|
|
)
|
|
|
|
else if isList x then
|
|
|
|
map (filterAttrsListRecursive pred) x
|
|
|
|
else x;
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
mkDefOpt = type : defaultStr : description : mkOpt type (description + ''
|
2015-06-08 07:36:56 +01:00
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
Defaults to <literal>${defaultStr}</literal> in prometheus
|
|
|
|
when set to <literal>null</literal>.
|
|
|
|
'');
|
2015-06-08 07:36:56 +01:00
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
mkOpt = type : description : mkOption {
|
|
|
|
type = types.nullOr type;
|
|
|
|
default = null;
|
|
|
|
inherit description;
|
|
|
|
};
|
2017-11-17 10:16:21 +00:00
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
promTypes.globalConfig = types.submodule {
|
|
|
|
options = {
|
|
|
|
scrape_interval = mkDefOpt types.str "1m" ''
|
|
|
|
How frequently to scrape targets by default.
|
|
|
|
'';
|
|
|
|
|
|
|
|
scrape_timeout = mkDefOpt types.str "10s" ''
|
|
|
|
How long until a scrape request times out.
|
|
|
|
'';
|
|
|
|
|
|
|
|
evaluation_interval = mkDefOpt types.str "1m" ''
|
|
|
|
How frequently to evaluate rules by default.
|
|
|
|
'';
|
|
|
|
|
|
|
|
external_labels = mkOpt (types.attrsOf types.str) ''
|
|
|
|
The labels to add to any time series or alerts when
|
|
|
|
communicating with external systems (federation, remote
|
|
|
|
storage, Alertmanager).
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
promTypes.scrape_config = types.submodule {
|
|
|
|
options = {
|
|
|
|
job_name = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
The job name assigned to scraped metrics by default.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-18 10:39:38 +01:00
|
|
|
scrape_interval = mkOpt types.str ''
|
|
|
|
How frequently to scrape targets from this job. Defaults to the
|
|
|
|
globally configured default.
|
|
|
|
'';
|
|
|
|
|
|
|
|
scrape_timeout = mkOpt types.str ''
|
|
|
|
Per-target timeout when scraping this job. Defaults to the
|
|
|
|
globally configured default.
|
|
|
|
'';
|
|
|
|
|
|
|
|
metrics_path = mkDefOpt types.str "/metrics" ''
|
|
|
|
The HTTP resource path on which to fetch metrics from targets.
|
|
|
|
'';
|
|
|
|
|
|
|
|
honor_labels = mkDefOpt types.bool "false" ''
|
|
|
|
Controls how Prometheus handles conflicts between labels
|
|
|
|
that are already present in scraped data and labels that
|
|
|
|
Prometheus would attach server-side ("job" and "instance"
|
|
|
|
labels, manually configured target labels, and labels
|
|
|
|
generated by service discovery implementations).
|
|
|
|
|
|
|
|
If honor_labels is set to "true", label conflicts are
|
|
|
|
resolved by keeping label values from the scraped data and
|
|
|
|
ignoring the conflicting server-side labels.
|
|
|
|
|
|
|
|
If honor_labels is set to "false", label conflicts are
|
|
|
|
resolved by renaming conflicting labels in the scraped data
|
|
|
|
to "exported_<original-label>" (for example
|
|
|
|
"exported_instance", "exported_job") and then attaching
|
|
|
|
server-side labels. This is useful for use cases such as
|
|
|
|
federation, where all labels specified in the target should
|
|
|
|
be preserved.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 11:53:13 +01:00
|
|
|
honor_timestamps = mkDefOpt types.bool "true" ''
|
|
|
|
honor_timestamps controls whether Prometheus respects the timestamps present
|
|
|
|
in scraped data.
|
|
|
|
|
|
|
|
If honor_timestamps is set to <literal>true</literal>, the timestamps of the metrics exposed
|
|
|
|
by the target will be used.
|
|
|
|
|
|
|
|
If honor_timestamps is set to <literal>false</literal>, the timestamps of the metrics exposed
|
|
|
|
by the target will be ignored.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
scheme = mkDefOpt (types.enum ["http" "https"]) "http" ''
|
|
|
|
The URL scheme with which to fetch metrics from targets.
|
|
|
|
'';
|
|
|
|
|
|
|
|
params = mkOpt (types.attrsOf (types.listOf types.str)) ''
|
|
|
|
Optional HTTP URL parameters.
|
|
|
|
'';
|
|
|
|
|
|
|
|
basic_auth = mkOpt (types.submodule {
|
|
|
|
options = {
|
|
|
|
username = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
HTTP username
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
2019-04-18 10:39:38 +01:00
|
|
|
password = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
HTTP password
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}) ''
|
|
|
|
Optional http login credentials for metrics scraping.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 11:53:13 +01:00
|
|
|
bearer_token = mkOpt types.str ''
|
|
|
|
Sets the `Authorization` header on every scrape request with
|
|
|
|
the configured bearer token. It is mutually exclusive with
|
|
|
|
<option>bearer_token_file</option>.
|
|
|
|
'';
|
|
|
|
|
|
|
|
bearer_token_file = mkOpt types.str ''
|
|
|
|
Sets the `Authorization` header on every scrape request with
|
|
|
|
the bearer token read from the configured file. It is mutually
|
|
|
|
exclusive with <option>bearer_token</option>.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
tls_config = mkOpt promTypes.tls_config ''
|
|
|
|
Configures the scrape request's TLS settings.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 11:53:13 +01:00
|
|
|
proxy_url = mkOpt types.str ''
|
|
|
|
Optional proxy URL.
|
|
|
|
'';
|
|
|
|
|
|
|
|
ec2_sd_configs = mkOpt (types.listOf promTypes.ec2_sd_config) ''
|
|
|
|
List of EC2 service discovery configurations.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
dns_sd_configs = mkOpt (types.listOf promTypes.dns_sd_config) ''
|
|
|
|
List of DNS service discovery configurations.
|
|
|
|
'';
|
|
|
|
|
|
|
|
consul_sd_configs = mkOpt (types.listOf promTypes.consul_sd_config) ''
|
|
|
|
List of Consul service discovery configurations.
|
|
|
|
'';
|
|
|
|
|
|
|
|
file_sd_configs = mkOpt (types.listOf promTypes.file_sd_config) ''
|
|
|
|
List of file service discovery configurations.
|
|
|
|
'';
|
|
|
|
|
|
|
|
static_configs = mkOpt (types.listOf promTypes.static_config) ''
|
|
|
|
List of labeled target groups for this job.
|
|
|
|
'';
|
|
|
|
|
|
|
|
relabel_configs = mkOpt (types.listOf promTypes.relabel_config) ''
|
|
|
|
List of relabel configurations.
|
|
|
|
'';
|
2019-04-18 11:53:13 +01:00
|
|
|
|
|
|
|
sample_limit = mkDefOpt types.int "0" ''
|
|
|
|
Per-scrape limit on number of scraped samples that will be accepted.
|
|
|
|
If more than this number of samples are present after metric relabelling
|
|
|
|
the entire scrape will be treated as failed. 0 means no limit.
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2016-09-04 19:59:32 +01:00
|
|
|
promTypes.static_config = types.submodule {
|
2015-06-08 07:36:56 +01:00
|
|
|
options = {
|
|
|
|
targets = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
The targets specified by the target group.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
labels = mkOption {
|
|
|
|
type = types.attrsOf types.str;
|
2016-12-23 16:42:05 +00:00
|
|
|
default = {};
|
2015-06-08 07:36:56 +01:00
|
|
|
description = ''
|
|
|
|
Labels assigned to all metrics scraped from the targets.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2019-01-27 12:06:37 +00:00
|
|
|
promTypes.ec2_sd_config = types.submodule {
|
|
|
|
options = {
|
|
|
|
region = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
The AWS Region.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-18 10:39:38 +01:00
|
|
|
endpoint = mkOpt types.str ''
|
|
|
|
Custom endpoint to be used.
|
|
|
|
'';
|
|
|
|
|
|
|
|
access_key = mkOpt types.str ''
|
|
|
|
The AWS API key id. If blank, the environment variable
|
|
|
|
<literal>AWS_ACCESS_KEY_ID</literal> is used.
|
|
|
|
'';
|
|
|
|
|
|
|
|
secret_key = mkOpt types.str ''
|
|
|
|
The AWS API key secret. If blank, the environment variable
|
|
|
|
<literal>AWS_SECRET_ACCESS_KEY</literal> is used.
|
|
|
|
'';
|
|
|
|
|
|
|
|
profile = mkOpt types.str ''
|
|
|
|
Named AWS profile used to connect to the API.
|
|
|
|
'';
|
|
|
|
|
|
|
|
role_arn = mkOpt types.str ''
|
|
|
|
AWS Role ARN, an alternative to using AWS API keys.
|
|
|
|
'';
|
|
|
|
|
|
|
|
refresh_interval = mkDefOpt types.str "60s" ''
|
|
|
|
Refresh interval to re-read the instance list.
|
|
|
|
'';
|
|
|
|
|
|
|
|
port = mkDefOpt types.int "80" ''
|
|
|
|
The port to scrape metrics from. If using the public IP
|
|
|
|
address, this must instead be specified in the relabeling
|
|
|
|
rule.
|
|
|
|
'';
|
|
|
|
|
|
|
|
filters = mkOpt (types.listOf promTypes.filter) ''
|
|
|
|
Filters can be used optionally to filter the instance list by other criteria.
|
|
|
|
'';
|
2019-04-16 15:04:33 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
promTypes.filter = types.submodule {
|
|
|
|
options = {
|
|
|
|
name = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
description = ''
|
|
|
|
See <link xlink:href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.html">this list</link>
|
|
|
|
for the available filters.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-18 10:39:38 +01:00
|
|
|
|
2019-04-16 15:04:33 +01:00
|
|
|
value = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Value of the filter.
|
|
|
|
'';
|
|
|
|
};
|
2019-01-27 12:06:37 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2015-06-08 07:36:56 +01:00
|
|
|
promTypes.dns_sd_config = types.submodule {
|
|
|
|
options = {
|
|
|
|
names = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
A list of DNS SRV record names to be queried.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-18 10:39:38 +01:00
|
|
|
|
|
|
|
refresh_interval = mkDefOpt types.str "30s" ''
|
|
|
|
The time after which the provided names are refreshed.
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
promTypes.consul_sd_config = types.submodule {
|
|
|
|
options = {
|
2019-04-18 10:39:38 +01:00
|
|
|
server = mkDefOpt types.str "localhost:8500" ''
|
|
|
|
Consul server to query.
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
token = mkOpt types.str "Consul token";
|
|
|
|
|
|
|
|
datacenter = mkOpt types.str "Consul datacenter";
|
|
|
|
|
|
|
|
scheme = mkDefOpt types.str "http" "Consul scheme";
|
|
|
|
|
|
|
|
username = mkOpt types.str "Consul username";
|
|
|
|
|
|
|
|
password = mkOpt types.str "Consul password";
|
|
|
|
|
2019-04-18 11:53:13 +01:00
|
|
|
tls_config = mkOpt promTypes.tls_config ''
|
|
|
|
Configures the Consul request's TLS settings.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
services = mkOpt (types.listOf types.str) ''
|
|
|
|
A list of services for which targets are retrieved.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 11:53:13 +01:00
|
|
|
tags = mkOpt (types.listOf types.str) ''
|
|
|
|
An optional list of tags used to filter nodes for a given
|
|
|
|
service. Services must contain all tags in the list.
|
|
|
|
'';
|
|
|
|
|
|
|
|
node_meta = mkOpt (types.attrsOf types.str) ''
|
|
|
|
Node metadata used to filter nodes for a given service.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
tag_separator = mkDefOpt types.str "," ''
|
|
|
|
The string by which Consul tags are joined into the tag label.
|
|
|
|
'';
|
2019-04-18 11:53:13 +01:00
|
|
|
|
|
|
|
allow_stale = mkOpt types.bool ''
|
|
|
|
Allow stale Consul results
|
|
|
|
(see <link xlink:href="https://www.consul.io/api/index.html#consistency-modes"/>).
|
|
|
|
|
|
|
|
Will reduce load on Consul.
|
|
|
|
'';
|
|
|
|
|
|
|
|
refresh_interval = mkDefOpt types.str "30s" ''
|
|
|
|
The time after which the provided names are refreshed.
|
|
|
|
|
|
|
|
On large setup it might be a good idea to increase this value
|
|
|
|
because the catalog will change all the time.
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
promTypes.file_sd_config = types.submodule {
|
|
|
|
options = {
|
2016-09-04 19:59:32 +01:00
|
|
|
files = mkOption {
|
2015-06-08 07:36:56 +01:00
|
|
|
type = types.listOf types.str;
|
|
|
|
description = ''
|
|
|
|
Patterns for files from which target groups are extracted. Refer
|
|
|
|
to the Prometheus documentation for permitted filename patterns
|
|
|
|
and formats.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-18 10:39:38 +01:00
|
|
|
|
|
|
|
refresh_interval = mkDefOpt types.str "5m" ''
|
|
|
|
Refresh interval to re-read the files.
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
promTypes.relabel_config = types.submodule {
|
|
|
|
options = {
|
2019-04-18 10:39:38 +01:00
|
|
|
source_labels = mkOpt (types.listOf types.str) ''
|
|
|
|
The source labels select values from existing labels. Their content
|
|
|
|
is concatenated using the configured separator and matched against
|
|
|
|
the configured regular expression.
|
|
|
|
'';
|
|
|
|
|
|
|
|
separator = mkDefOpt types.str ";" ''
|
|
|
|
Separator placed between concatenated source label values.
|
|
|
|
'';
|
|
|
|
|
|
|
|
target_label = mkOpt types.str ''
|
|
|
|
Label to which the resulting value is written in a replace action.
|
|
|
|
It is mandatory for replace actions.
|
|
|
|
'';
|
|
|
|
|
|
|
|
regex = mkDefOpt types.str "(.*)" ''
|
|
|
|
Regular expression against which the extracted value is matched.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 11:53:13 +01:00
|
|
|
modulus = mkOpt types.int ''
|
|
|
|
Modulus to take of the hash of the source label values.
|
|
|
|
'';
|
|
|
|
|
2019-04-18 10:39:38 +01:00
|
|
|
replacement = mkDefOpt types.str "$1" ''
|
|
|
|
Replacement value against which a regex replace is performed if the
|
|
|
|
regular expression matches.
|
|
|
|
'';
|
|
|
|
|
|
|
|
action = mkDefOpt (types.enum ["replace" "keep" "drop"]) "replace" ''
|
|
|
|
Action to perform based on regex matching.
|
|
|
|
'';
|
|
|
|
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2019-02-18 20:52:13 +00:00
|
|
|
promTypes.tls_config = types.submodule {
|
|
|
|
options = {
|
2019-04-18 10:39:38 +01:00
|
|
|
ca_file = mkOpt types.str ''
|
|
|
|
CA certificate to validate API server certificate with.
|
|
|
|
'';
|
|
|
|
|
|
|
|
cert_file = mkOpt types.str ''
|
|
|
|
Certificate file for client cert authentication to the server.
|
|
|
|
'';
|
|
|
|
|
|
|
|
key_file = mkOpt types.str ''
|
|
|
|
Key file for client cert authentication to the server.
|
|
|
|
'';
|
|
|
|
|
|
|
|
server_name = mkOpt types.str ''
|
|
|
|
ServerName extension to indicate the name of the server.
|
|
|
|
http://tools.ietf.org/html/rfc4366#section-3.1
|
|
|
|
'';
|
|
|
|
|
|
|
|
insecure_skip_verify = mkOpt types.bool ''
|
|
|
|
Disable validation of the server certificate.
|
|
|
|
'';
|
2019-02-18 20:52:13 +00:00
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2015-06-08 07:36:56 +01:00
|
|
|
in {
|
2019-12-10 01:51:19 +00:00
|
|
|
|
|
|
|
imports = [
|
|
|
|
(mkRenamedOptionModule [ "services" "prometheus2" ] [ "services" "prometheus" ])
|
|
|
|
];
|
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
options.services.prometheus = {
|
2015-06-08 07:36:56 +01:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
enable = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Enable the Prometheus monitoring daemon.
|
|
|
|
'';
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
package = mkOption {
|
|
|
|
type = types.package;
|
|
|
|
default = pkgs.prometheus;
|
|
|
|
defaultText = "pkgs.prometheus";
|
|
|
|
description = ''
|
|
|
|
The prometheus package that should be used.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2020-05-08 23:58:31 +01:00
|
|
|
port = mkOption {
|
2020-07-23 23:15:57 +01:00
|
|
|
type = types.port;
|
2020-05-08 23:58:31 +01:00
|
|
|
default = 9090;
|
|
|
|
description = ''
|
|
|
|
Port to listen on.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
listenAddress = mkOption {
|
|
|
|
type = types.str;
|
2020-05-08 23:58:31 +01:00
|
|
|
default = "0.0.0.0";
|
2019-09-06 20:40:27 +01:00
|
|
|
description = ''
|
|
|
|
Address to listen on for the web interface, API, and telemetry.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
stateDir = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "prometheus2";
|
|
|
|
description = ''
|
|
|
|
Directory below <literal>/var/lib</literal> to store Prometheus metrics data.
|
|
|
|
This directory will be created automatically using systemd's StateDirectory mechanism.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
extraFlags = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Extra commandline options when launching Prometheus.
|
|
|
|
'';
|
|
|
|
};
|
2019-04-08 22:02:15 +01:00
|
|
|
|
2020-10-31 19:52:13 +00:00
|
|
|
environmentFile = mkOption {
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
default = null;
|
|
|
|
example = "/root/prometheus.env";
|
|
|
|
description = ''
|
|
|
|
Environment file as defined in <citerefentry>
|
|
|
|
<refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum>
|
|
|
|
</citerefentry>.
|
|
|
|
|
|
|
|
Secrets may be passed to the service without adding them to the
|
|
|
|
world-readable Nix store, by specifying placeholder variables as
|
|
|
|
the option value in Nix and setting these variables accordingly in the
|
|
|
|
environment file.
|
|
|
|
|
|
|
|
Environment variables from this file will be interpolated into the
|
|
|
|
config file using envsubst with this syntax:
|
|
|
|
<literal>$ENVIRONMENT ''${VARIABLE}</literal>
|
|
|
|
|
|
|
|
<programlisting>
|
|
|
|
# Example scrape config entry handling an OAuth bearer token
|
|
|
|
{
|
|
|
|
job_name = "home_assistant";
|
|
|
|
metrics_path = "/api/prometheus";
|
|
|
|
scheme = "https";
|
|
|
|
bearer_token = "\''${HOME_ASSISTANT_BEARER_TOKEN}";
|
|
|
|
[...]
|
|
|
|
}
|
|
|
|
</programlisting>
|
|
|
|
|
|
|
|
<programlisting>
|
|
|
|
# Content of the environment file
|
|
|
|
HOME_ASSISTANT_BEARER_TOKEN=someoauthbearertoken
|
|
|
|
</programlisting>
|
|
|
|
|
|
|
|
Note that this file needs to be available on the host on which
|
|
|
|
<literal>Prometheus</literal> is running.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
configText = mkOption {
|
|
|
|
type = types.nullOr types.lines;
|
|
|
|
default = null;
|
|
|
|
description = ''
|
|
|
|
If non-null, this option defines the text that is written to
|
|
|
|
prometheus.yml. If null, the contents of prometheus.yml is generated
|
|
|
|
from the structured config options.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
globalConfig = mkOption {
|
|
|
|
type = promTypes.globalConfig;
|
|
|
|
default = {};
|
|
|
|
description = ''
|
|
|
|
Parameters that are valid in all configuration contexts. They
|
|
|
|
also serve as defaults for other configuration sections
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
rules = mkOption {
|
|
|
|
type = types.listOf types.str;
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Alerting and/or Recording rules to evaluate at runtime.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
ruleFiles = mkOption {
|
|
|
|
type = types.listOf types.path;
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
Any additional rules files to include in this configuration.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
scrapeConfigs = mkOption {
|
|
|
|
type = types.listOf promTypes.scrape_config;
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
A list of scrape configurations.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
alertmanagers = mkOption {
|
|
|
|
type = types.listOf types.attrs;
|
|
|
|
example = literalExample ''
|
|
|
|
[ {
|
|
|
|
scheme = "https";
|
|
|
|
path_prefix = "/alertmanager";
|
|
|
|
static_configs = [ {
|
|
|
|
targets = [
|
|
|
|
"prometheus.domain.tld"
|
|
|
|
];
|
|
|
|
} ];
|
|
|
|
} ]
|
|
|
|
'';
|
|
|
|
default = [];
|
|
|
|
description = ''
|
|
|
|
A list of alertmanagers to send alerts to.
|
|
|
|
See <link xlink:href="https://prometheus.io/docs/prometheus/latest/configuration/configuration/#alertmanager_config">the official documentation</link> for more information.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
alertmanagerNotificationQueueCapacity = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
default = 10000;
|
|
|
|
description = ''
|
|
|
|
The capacity of the queue for pending alert manager notifications.
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
alertmanagerTimeout = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
default = 10;
|
|
|
|
description = ''
|
|
|
|
Alert manager HTTP API timeout (in seconds).
|
|
|
|
'';
|
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
webExternalUrl = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
example = "https://example.com/";
|
|
|
|
description = ''
|
|
|
|
The URL under which Prometheus is externally reachable (for example,
|
|
|
|
if Prometheus is served via a reverse proxy).
|
|
|
|
'';
|
|
|
|
};
|
2019-11-17 05:35:33 +00:00
|
|
|
|
|
|
|
checkConfig = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Check configuration with <literal>promtool
|
|
|
|
check</literal>. The call to <literal>promtool</literal> is
|
|
|
|
subject to sandboxing by Nix. When credentials are stored in
|
|
|
|
external files (<literal>password_file</literal>,
|
|
|
|
<literal>bearer_token_file</literal>, etc), they will not be
|
|
|
|
visible to <literal>promtool</literal> and it will report
|
|
|
|
errors, despite a correct configuration.
|
|
|
|
'';
|
|
|
|
};
|
2019-09-21 13:50:08 +01:00
|
|
|
|
|
|
|
retentionTime = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
default = null;
|
|
|
|
example = "15d";
|
|
|
|
description = ''
|
|
|
|
How long to retain samples in storage.
|
|
|
|
'';
|
|
|
|
};
|
2019-09-06 20:40:27 +01:00
|
|
|
};
|
2019-02-21 14:29:54 +00:00
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
config = mkIf cfg.enable {
|
2020-07-23 23:16:13 +01:00
|
|
|
assertions = [
|
|
|
|
( let
|
2020-09-20 22:38:46 +01:00
|
|
|
# Match something with dots (an IPv4 address) or something ending in
|
|
|
|
# a square bracket (an IPv6 addresses) followed by a port number.
|
|
|
|
legacy = builtins.match "(.*\\..*|.*]):([[:digit:]]+)" cfg.listenAddress;
|
2020-07-23 23:16:13 +01:00
|
|
|
in {
|
|
|
|
assertion = legacy == null;
|
|
|
|
message = ''
|
|
|
|
Do not specify the port for Prometheus to listen on in the
|
|
|
|
listenAddress option; use the port option instead:
|
|
|
|
services.prometheus.listenAddress = ${builtins.elemAt legacy 0};
|
|
|
|
services.prometheus.port = ${builtins.elemAt legacy 1};
|
|
|
|
'';
|
|
|
|
}
|
|
|
|
)
|
|
|
|
];
|
|
|
|
|
2019-09-06 20:40:27 +01:00
|
|
|
users.groups.prometheus.gid = config.ids.gids.prometheus;
|
|
|
|
users.users.prometheus = {
|
|
|
|
description = "Prometheus daemon user";
|
|
|
|
uid = config.ids.uids.prometheus;
|
|
|
|
group = "prometheus";
|
2015-06-08 07:36:56 +01:00
|
|
|
};
|
2019-09-06 20:40:27 +01:00
|
|
|
systemd.services.prometheus = {
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "network.target" ];
|
2020-10-31 19:52:13 +00:00
|
|
|
preStart = ''
|
|
|
|
${lib.getBin pkgs.envsubst}/bin/envsubst -o "/run/prometheus/prometheus-substituted.yaml" \
|
|
|
|
-i "${prometheusYml}"
|
|
|
|
'';
|
2019-09-06 20:40:27 +01:00
|
|
|
serviceConfig = {
|
|
|
|
ExecStart = "${cfg.package}/bin/prometheus" +
|
|
|
|
optionalString (length cmdlineArgs != 0) (" \\\n " +
|
|
|
|
concatStringsSep " \\\n " cmdlineArgs);
|
|
|
|
User = "prometheus";
|
|
|
|
Restart = "always";
|
2020-10-31 19:52:13 +00:00
|
|
|
EnvironmentFile = mkIf (cfg.environmentFile != null) [ cfg.environmentFile ];
|
|
|
|
RuntimeDirectory = "prometheus";
|
|
|
|
RuntimeDirectoryMode = "0700";
|
2019-09-06 20:40:27 +01:00
|
|
|
WorkingDirectory = workingDir;
|
|
|
|
StateDirectory = cfg.stateDir;
|
2019-02-21 14:29:54 +00:00
|
|
|
};
|
2019-09-06 20:40:27 +01:00
|
|
|
};
|
|
|
|
};
|
2015-06-08 07:36:56 +01:00
|
|
|
}
|