From 2ed07c6cc1ce6c2e1c91f87630633dd92057e72b Mon Sep 17 00:00:00 2001 From: Oliver Charles Date: Thu, 20 Nov 2014 14:38:04 +0000 Subject: [PATCH] scollector: New NixOS module --- nixos/modules/misc/ids.nix | 2 + nixos/modules/module-list.nix | 1 + .../services/monitoring/scollector.nix | 88 +++++++++++++++++++ 3 files changed, 91 insertions(+) create mode 100644 nixos/modules/services/monitoring/scollector.nix diff --git a/nixos/modules/misc/ids.nix b/nixos/modules/misc/ids.nix index e3c3f465f1b..2c63a19deb7 100644 --- a/nixos/modules/misc/ids.nix +++ b/nixos/modules/misc/ids.nix @@ -167,6 +167,7 @@ docker-registry = 157; hbase = 158; opentsdb = 159; + scollector = 160; # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! @@ -298,6 +299,7 @@ systemd-resolve = 153; systemd-timesync = 154; liquidsoap = 155; + scollector = 156; # When adding a gid, make sure it doesn't match an existing uid. And don't use gids above 399! diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 6e328339056..c6b44f590f8 100755 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -198,6 +198,7 @@ ./services/monitoring/nagios.nix ./services/monitoring/riemann.nix ./services/monitoring/riemann-dash.nix + ./services/monitoring/scollector.nix ./services/monitoring/smartd.nix ./services/monitoring/statsd.nix ./services/monitoring/systemhealth.nix diff --git a/nixos/modules/services/monitoring/scollector.nix b/nixos/modules/services/monitoring/scollector.nix new file mode 100644 index 00000000000..3d52631538b --- /dev/null +++ b/nixos/modules/services/monitoring/scollector.nix @@ -0,0 +1,88 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.scollector; + +in { + + options = { + + services.scollector = { + + enable = mkOption { + type = types.bool; + default = false; + description = '' + Whether to run scollector. + ''; + }; + + package = mkOption { + type = types.package; + default = pkgs.scollector; + example = literalExample "pkgs.scollector"; + description = '' + scollector binary to use. + ''; + }; + + user = mkOption { + type = types.string; + default = "scollector"; + description = '' + User account under which scollector runs. + ''; + }; + + group = mkOption { + type = types.string; + default = "scollector"; + description = '' + Group account under which scollector runs. + ''; + }; + + opentsdbHost = mkOption { + type = types.string; + default = "localhost:4242"; + description = '' + Host and port of the OpenTSDB database that will store the collected + data. + ''; + }; + + }; + + }; + + config = mkIf config.services.scollector.enable { + + systemd.services.scollector = { + description = "scollector metrics collector (part of Bosun)"; + wantedBy = [ "multi-user.target" ]; + + path = [ pkgs.coreutils pkgs.iproute ]; + + serviceConfig = { + PermissionsStartOnly = true; + User = cfg.user; + Group = cfg.group; + ExecStart = '' + ${cfg.package}/bin/scollector -h=${cfg.opentsdbHost} + ''; + }; + }; + + users.extraUsers.scollector = { + description = "scollector user"; + group = "scollector"; + uid = config.ids.uids.scollector; + }; + + users.extraGroups.scollector.gid = config.ids.gids.scollector; + + }; + +}