159 lines
4.2 KiB
Nix
159 lines
4.2 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.kthxbye;
|
|
in
|
|
|
|
{
|
|
options.services.kthxbye = {
|
|
enable = mkEnableOption "kthxbye alert acknowledgement management daemon";
|
|
|
|
package = mkPackageOption pkgs "kthxbye" { };
|
|
|
|
openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to open ports in the firewall needed for the daemon to function.
|
|
'';
|
|
};
|
|
|
|
extraOptions = mkOption {
|
|
type = with types; listOf str;
|
|
default = [];
|
|
description = ''
|
|
Extra command line options.
|
|
|
|
Documentation can be found [here](https://github.com/prymitive/kthxbye/blob/main/README.md).
|
|
'';
|
|
example = literalExpression ''
|
|
[
|
|
"-extend-with-prefix 'ACK!'"
|
|
];
|
|
'';
|
|
};
|
|
|
|
alertmanager = {
|
|
timeout = mkOption {
|
|
type = types.str;
|
|
default = "1m0s";
|
|
description = ''
|
|
Alertmanager request timeout duration in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
|
|
'';
|
|
example = "30s";
|
|
};
|
|
uri = mkOption {
|
|
type = types.str;
|
|
default = "http://localhost:9093";
|
|
description = ''
|
|
Alertmanager URI to use.
|
|
'';
|
|
example = "https://alertmanager.example.com";
|
|
};
|
|
};
|
|
|
|
extendBy = mkOption {
|
|
type = types.str;
|
|
default = "15m0s";
|
|
description = ''
|
|
Extend silences by adding DURATION seconds.
|
|
|
|
DURATION should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
|
|
'';
|
|
example = "6h0m0s";
|
|
};
|
|
|
|
extendIfExpiringIn = mkOption {
|
|
type = types.str;
|
|
default = "5m0s";
|
|
description = ''
|
|
Extend silences that are about to expire in the next DURATION seconds.
|
|
|
|
DURATION should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
|
|
'';
|
|
example = "1m0s";
|
|
};
|
|
|
|
extendWithPrefix = mkOption {
|
|
type = types.str;
|
|
default = "ACK!";
|
|
description = ''
|
|
Extend silences with comment starting with PREFIX string.
|
|
'';
|
|
example = "!perma-silence";
|
|
};
|
|
|
|
interval = mkOption {
|
|
type = types.str;
|
|
default = "45s";
|
|
description = ''
|
|
Silence check interval duration in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
|
|
'';
|
|
example = "30s";
|
|
};
|
|
|
|
listenAddress = mkOption {
|
|
type = types.str;
|
|
default = "0.0.0.0";
|
|
description = ''
|
|
The address to listen on for HTTP requests.
|
|
'';
|
|
example = "127.0.0.1";
|
|
};
|
|
|
|
port = mkOption {
|
|
type = types.port;
|
|
default = 8080;
|
|
description = ''
|
|
The port to listen on for HTTP requests.
|
|
'';
|
|
};
|
|
|
|
logJSON = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Format logged messages as JSON.
|
|
'';
|
|
};
|
|
|
|
maxDuration = mkOption {
|
|
type = with types; nullOr str;
|
|
default = null;
|
|
description = ''
|
|
Maximum duration of a silence, it won't be extended anymore after reaching it.
|
|
|
|
Duration should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.
|
|
'';
|
|
example = "30d";
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
systemd.services.kthxbye = {
|
|
description = "kthxbye Alertmanager ack management daemon";
|
|
wantedBy = [ "multi-user.target" ];
|
|
script = ''
|
|
${cfg.package}/bin/kthxbye \
|
|
-alertmanager.timeout ${cfg.alertmanager.timeout} \
|
|
-alertmanager.uri ${cfg.alertmanager.uri} \
|
|
-extend-by ${cfg.extendBy} \
|
|
-extend-if-expiring-in ${cfg.extendIfExpiringIn} \
|
|
-extend-with-prefix ${cfg.extendWithPrefix} \
|
|
-interval ${cfg.interval} \
|
|
-listen ${cfg.listenAddress}:${toString cfg.port} \
|
|
${optionalString cfg.logJSON "-log-json"} \
|
|
${optionalString (cfg.maxDuration != null) "-max-duration ${cfg.maxDuration}"} \
|
|
${concatStringsSep " " cfg.extraOptions}
|
|
'';
|
|
serviceConfig = {
|
|
Type = "simple";
|
|
DynamicUser = true;
|
|
Restart = "on-failure";
|
|
};
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.port ];
|
|
};
|
|
}
|