diff --git a/hosts/h001/mods/monitoring_agent.nix b/hosts/h001/mods/monitoring_agent.nix new file mode 100644 index 00000000..1d5c3cba --- /dev/null +++ b/hosts/h001/mods/monitoring_agent.nix @@ -0,0 +1,30 @@ +{ + inputs, + config, + ... +}: +let + declaration = "services/monitoring/beszel-hub.nix"; + nixpkgs = inputs.beszel-nixpkgs; + pkgs = import nixpkgs { + system = "x86_64-linux"; + config.allowUnfree = true; + }; +in +{ + disabledModules = [ declaration ]; + imports = [ "${nixpkgs}/nixos/modules/${declaration}" ]; + config = { + services.beszel.agent = { + package = pkgs.beszel; + enable = true; + host = "100.64.0.13"; + environment = { + LISTEN = "100.64.0.13:45876"; + SYSTEM_NAME = config.networking.hostName; + TOKEN = "20208198-87c2-4bd1-ab09-b97c3b9c6a6e"; + HUB_URL = "http://100.64.0.13:8090"; + }; + }; + }; +} diff --git a/hosts/h001/mods/monitoring_hub.nix b/hosts/h001/mods/monitoring_hub.nix new file mode 100644 index 00000000..a780b5e7 --- /dev/null +++ b/hosts/h001/mods/monitoring_hub.nix @@ -0,0 +1,27 @@ +{ + inputs, + ... +}: +let + declaration = "services/monitoring/beszel-hub.nix"; + nixpkgs = inputs.beszel-nixpkgs; + pkgs = import nixpkgs { + system = "x86_64-linux"; + config.allowUnfree = true; + }; +in +{ + disabledModules = [ declaration ]; + imports = [ "${nixpkgs}/nixos/modules/${declaration}" ]; + config = { + services.beszel.hub = { + package = pkgs.beszel; + enable = true; + port = 8090; + host = "100.64.0.13"; + environment = { + # DISABLE_PASSWORD_AUTH = "true"; # Once sso is setup + }; + }; + }; +}