summaryrefslogtreecommitdiff
path: root/modules/grafana.nix
blob: b57577d03f2c275aa26ac2ece86208e5c36bac57 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
{
  config,
  inputs,
  lib,
  libNginx,
  this,
  ...
}:
with lib;
let
  cfg = config.nixfiles.modules.grafana;
in
{
  options.nixfiles.modules.grafana = {
    enable = mkEnableOption "Grafana";

    port = mkOption {
      description = "Port.";
      type = with types; port;
      default = 30101;
    };

    domain = mkOption {
      description = "Domain name sans protocol scheme.";
      type = with types; nullOr str;
      default = "grafana.${config.networking.domain}";
    };
  };

  config =
    let
      db = "grafana";
    in
    mkIf cfg.enable {
      ark.directories = [ config.services.grafana.dataDir ];

      secrets = {
        grafana-key = {
          file = "${inputs.self}/secrets/grafana-key";
          owner = "grafana";
          group = "grafana";
        };
        grafana-admin-password = {
          file = "${inputs.self}/secrets/grafana-admin-password";
          owner = "grafana";
          group = "grafana";
        };
        grafana-smtp-password = {
          file = "${inputs.self}/secrets/smtp-password";
          owner = "grafana";
          group = "grafana";
        };
      };

      nixfiles.modules = {
        nginx = {
          enable = true;
          upstreams.grafana.servers."127.0.0.1:${toString cfg.port}" = { };
          virtualHosts.${cfg.domain} = {
            locations."/" = {
              proxyPass = "http://grafana";
              proxyWebsockets = true;
            };
            extraConfig = libNginx.config.internalOnly;
          };
        };
        postgresql = {
          enable = true;
          extraPostStart = [
            ''
              $PSQL "${db}" -tAc 'GRANT ALL ON SCHEMA "public" TO "${db}"'
            ''
          ];
        };
      };

      services = {
        grafana = {
          enable = true;

          settings = {
            server = with cfg; {
              protocol = "http";
              http_addr = "127.0.0.1";
              http_port = port;
              inherit domain;
              enable_gzip = true;
            };
            database = {
              type = "postgres";
              host = "/run/postgresql";
              name = db;
              user = db;
            };
            smtp = {
              enable = true;
              user = "azahi@shire.net";
              host = my.domain.shire;
              password = "$__file{${config.secrets.grafana-smtp-password.path}}";
            };
            user = {
              allow_org_create = false;
              allow_sign_up = false;
              auto_assign_org = false;
              auto_assign_org_role = "Viewer";
            };
            security = with config.secrets; {
              secret_key = "$__file{${grafana-key.path}}";
              admin_password = "$__file{${grafana-admin-password.path}}";
            };
            analytics.reporting_enable = false;
          };
        };

        postgresql = {
          ensureDatabases = [ db ];
          ensureUsers = [
            {
              name = db;
              ensureDBOwnership = true;
            }
          ];
        };
      };

      topology.nodes.${this.hostname}.services.grafana.info = mkForce cfg.domain;
    };
}