nixos-config/modules/zabbix-server.nix
2023-01-20 10:36:33 +01:00

76 lines
1.8 KiB
Nix

{ pkgs, lib, ... }:
let
db = "zabbix";
db_host = "10.88.0.1";
version = "latest";
port = "8999";
domain = "zbx.mc-fucker.cool";
podman_dns = "--dns=100.100.100.100";
server_ip = "10.88.1.0";
web_ip = "10.88.1.1";
in
{
services.postgresql = {
ensureDatabases = [ db ];
ensureUsers = [
{
name = db;
ensurePermissions = {
"DATABASE ${db}" = "ALL PRIVILEGES";
};
}
];
extraPlugins = [
(pkgs.callPackage ../packages/timescaledb/timescaledb.nix {})
];
settings = {
shared_preload_libraries = "timescaledb";
};
authentication = "host ${db} ${db} 10.88.0.0/16 md5";
};
virtualisation.oci-containers.containers.zabbix-server = {
image = "zabbix/zabbix-server-pgsql:alpine-6.2-latest";
environment = {
DB_SERVER_HOST = db_host;
POSTGRES_USER = db;
};
environmentFiles = [ /etc/nixos/keys/zabbix-env ];
extraOptions = [
podman_dns
"--ip=${server_ip}"
];
};
virtualisation.oci-containers.containers.zabbix-web = {
image = "zabbix/zabbix-web-nginx-pgsql:alpine-6.2-latest";
environment = {
DB_SERVER_HOST = db_host;
POSTGRES_USER = db;
ZBX_SERVER_HOST = server_ip;
PHP_TZ = "Europe/Berlin";
};
environmentFiles = [ /etc/nixos/keys/zabbix-env ];
extraOptions = [
podman_dns
"--ip=${web_ip}"
];
ports = [ "${port}:8080" ];
};
services.nginx.virtualHosts.${domain} = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:${port}";
};
extraConfig = ''
access_log /var/log/nginx/${domain}_access.log;
error_log /var/log/nginx/${domain}_error.log;
'';
};
networking.firewall.interfaces.podman0.allowedTCPPorts = [ 5432 ];
}
# vim: set et ts=2 sw=2 ai: