From 6f8d95781c7e963e0b3c319277f15164264c095b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tristan=20Dani=C3=ABl=20Maat?= Date: Sat, 7 Oct 2023 04:15:52 +0200 Subject: [PATCH] gitea: Add monitoring --- configuration/services/gitea.nix | 21 ++++++++++++++++ configuration/services/metrics/default.nix | 29 +++++++++++++++++----- 2 files changed, 44 insertions(+), 6 deletions(-) diff --git a/configuration/services/gitea.nix b/configuration/services/gitea.nix index 6d6dafd..f167230 100644 --- a/configuration/services/gitea.nix +++ b/configuration/services/gitea.nix @@ -1,6 +1,7 @@ { pkgs, config, + lib, ... }: let domain = "gitea.${config.services.nginx.domain}"; @@ -19,11 +20,23 @@ in { SSH_PORT = 2222; }; + metrics = { + ENABLED = true; + TOKEN = "#metricstoken#"; + }; service.DISABLE_REGISTRATION = true; session.COOKIE_SECURE = true; }; }; + systemd.services.gitea.serviceConfig.ExecStartPre = let + replaceSecretBin = "${pkgs.replace-secret}/bin/replace-secret"; + secretPath = config.sops.secrets."gitea/metrics-token".path; + runConfig = "${config.services.gitea.customDir}/conf/app.ini"; + in [ + "${replaceSecretBin} '#metricstoken#' '${secretPath}' '${runConfig}'" + ]; + # Set up SSL services.nginx.virtualHosts."${domain}" = let httpAddress = config.services.gitea.settings.server.HTTP_ADDR; @@ -37,6 +50,14 @@ in { ''; locations."/".proxyPass = "http://${httpAddress}:${toString httpPort}"; + locations."/metrics" = { + extraConfig = '' + access_log off; + allow 127.0.0.1; + ${lib.optionalString config.networking.enableIPv6 "allow ::1;"} + deny all; + ''; + }; }; # Block repeated failed login attempts diff --git a/configuration/services/metrics/default.nix b/configuration/services/metrics/default.nix index 3347467..4b163d3 100644 --- a/configuration/services/metrics/default.nix +++ b/configuration/services/metrics/default.nix @@ -138,12 +138,29 @@ in { job_name = "tlater.net"; static_configs = [ { - targets = - lib.mapAttrsToList (name: exporter: "${exporter.listenAddress}:${toString exporter.port}") - (lib.filterAttrs (name: exporter: (builtins.isAttrs exporter) && exporter.enable) - (config.services.prometheus.exporters // config.services.prometheus.local-exporters)) - ++ [ - "127.0.0.1:9641" # coturn + targets = let + exporters = config.services.prometheus.exporters; + localExporters = config.services.prometheus.local-exporters; + in + map (exporter: "${exporter.listenAddress}:${toString exporter.port}") [ + exporters.domain + exporters.node + exporters.nginx + exporters.nginxlog + exporters.systemd + + localExporters.prometheus-fail2ban-exporter + + { + # coturn + listenAddress = "127.0.0.1"; + port = "9641"; + } + { + # gitea + listenAddress = "127.0.0.1"; + port = "3000"; + } ]; } ];