{ config, lib, flake, ... }: { pub-solar.monitoring-server = { enable = true; listenAddress = "10.0.1.6"; grafana.enable = true; node_exporter = { enable = true; hosts = [ "10.0.1.11:9002" "10.0.1.12:9002" "10.0.1.13:9002" "10.0.1.254:9100" ]; }; snmp = { enable = true; hosts = [ "192.168.42.1" #"10.0.1.254:9116" = [ # { # targets = [ "192.168.42.1" ]; # auth = [ "public_v2" ]; # modules = [ "if_mib" ]; # } #]; ]; }; smokeping = { enable = true; hosts = [ "mail.gssws.de" "cust.gssws.de" "data.gssws.de" "mail.hosting.de" "blog.fefe.de" # hosting.de "ovh2.goekal.de" "83.151.16.16" "83.151.16.17" "83.151.16.51" "r2backup17.masterlogin.de" "demo.routing.net" "vsrv07344.customer.vlinux.de" "213.160.76.43" "185.11.139.27" "185.11.137.4" "83.151.30.176" "83.151.28.246" "83.151.21.204" "79.140.42.4" "31.15.67.23" "31.15.64.79" "80.244.244.244" "95.129.51.51" "185.11.137.122" "79.140.41.12" ]; }; }; # wireguard exporter networking.firewall.allowedTCPPorts = [9585]; services.prometheus = { exporters.wireguard = { enable = true; withRemoteIp = true; }; scrapeConfigs = [ { job_name = "chonk-wireguard"; static_configs = [ { targets = ["10.0.1.6:9586"]; } ]; } ]; }; }