From 2715222f0cca9327f896a2ec1ed2de0b7934ad17 Mon Sep 17 00:00:00 2001 From: Kranium Gikos Mendoza Date: Sat, 5 Nov 2016 20:09:29 +0800 Subject: [PATCH] netdata service: init --- nixos/modules/module-list.nix | 1 + nixos/modules/services/monitoring/netdata.nix | 78 +++++++++++++++++++ 2 files changed, 79 insertions(+) create mode 100644 nixos/modules/services/monitoring/netdata.nix diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 356cb5a92ed3..7cf836d62a12 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -300,6 +300,7 @@ ./services/monitoring/monit.nix ./services/monitoring/munin.nix ./services/monitoring/nagios.nix + ./services/monitoring/netdata.nix ./services/monitoring/prometheus/default.nix ./services/monitoring/prometheus/node-exporter.nix ./services/monitoring/prometheus/alertmanager.nix diff --git a/nixos/modules/services/monitoring/netdata.nix b/nixos/modules/services/monitoring/netdata.nix new file mode 100644 index 000000000000..e1fde4fc9500 --- /dev/null +++ b/nixos/modules/services/monitoring/netdata.nix @@ -0,0 +1,78 @@ +{ config, pkgs, lib, ... }: + +with lib; + +let + cfg = config.services.netdata; + + configFile = pkgs.writeText "netdata.conf" cfg.configText; + + defaultUser = "netdata"; + +in { + options = { + services.netdata = { + enable = mkOption { + default = false; + type = types.bool; + description = "Whether to enable netdata monitoring."; + }; + + user = mkOption { + type = types.str; + default = "netdata"; + description = "User account under which netdata runs."; + }; + + group = mkOption { + type = types.str; + default = "netdata"; + description = "Group under which netdata runs."; + }; + + configText = mkOption { + type = types.lines; + default = ""; + description = "netdata.conf configuration."; + example = '' + [global] + debug log = syslog + access log = syslog + error log = syslog + ''; + }; + + }; + }; + + config = mkIf cfg.enable { + systemd.services.netdata = { + description = "Real time performance monitoring"; + after = [ "network.target" ]; + wantedBy = [ "multi-user.target" ]; + preStart = concatStringsSep "\n" (map (dir: '' + mkdir -vp ${dir} + chmod 750 ${dir} + chown -R ${cfg.user}:${cfg.group} ${dir} + '') [ "/var/cache/netdata" + "/var/log/netdata" + "/var/lib/netdata" ]); + serviceConfig = { + User = cfg.user; + Group = cfg.group; + PermissionsStartOnly = true; + ExecStart = "${pkgs.netdata}/bin/netdata -D -c ${configFile}"; + TimeoutStopSec = 60; + }; + }; + + users.extraUsers = optional (cfg.user == defaultUser) { + name = defaultUser; + }; + + users.extraGroups = optional (cfg.group == defaultUser) { + name = defaultUser; + }; + + }; +}