Compare commits

...

2 Commits

Author SHA1 Message Date
coolneng 1723a4a872
Block ads via dnscrypt-proxy 2023-12-12 14:56:24 +01:00
coolneng add2bee896
Disable unused monitoring collectors 2023-12-12 14:55:48 +01:00
4 changed files with 6 additions and 38 deletions

View File

@ -53,38 +53,20 @@ with pkgs;
enabledCollectors = [ "systemd" ]; enabledCollectors = [ "systemd" ];
port = 9002; port = 9002;
}; };
zfs.enable = true;
wireguard.enable = true;
postgres.enable = true; postgres.enable = true;
smartctl.enable = true; smartctl.enable = true;
dnsmasq.enable = true;
nginx = {
enable = true;
scrapeUri = "http://localhost:8282/nginx_status";
};
}; };
scrapeConfigs = [{ scrapeConfigs = [{
job_name = "zion"; job_name = "zion";
static_configs = [{ static_configs = [{
targets = [ targets = [
"localhost:${toString config.services.prometheus.exporters.node.port}" "localhost:${toString config.services.prometheus.exporters.node.port}"
"localhost:${toString config.services.prometheus.exporters.zfs.port}"
"localhost:${
toString config.services.prometheus.exporters.wireguard.port
}"
"localhost:${ "localhost:${
toString config.services.prometheus.exporters.postgres.port toString config.services.prometheus.exporters.postgres.port
}" }"
"localhost:${ "localhost:${
toString config.services.prometheus.exporters.smartctl.port toString config.services.prometheus.exporters.smartctl.port
}" }"
"localhost:${
toString config.services.prometheus.exporters.dnsmasq.port
}"
"localhost:${
toString config.services.prometheus.exporters.nginx.port
}"
"localhost:9641"
]; ];
}]; }];
}]; }];

View File

@ -108,7 +108,7 @@ in {
local-ttl = 300; local-ttl = 300;
conf-file = "${pkgs.dnsmasq}/share/dnsmasq/trust-anchors.conf"; conf-file = "${pkgs.dnsmasq}/share/dnsmasq/trust-anchors.conf";
dnssec = true; dnssec = false;
address = "/coolneng.duckdns.org/192.168.13.2"; address = "/coolneng.duckdns.org/192.168.13.2";
}; };
@ -129,6 +129,8 @@ in {
minisign_key = minisign_key =
"RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3"; "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3";
}; };
blocked_names.blocked_names_file =
"/var/lib/dnscrypt-proxy/blocklist.txt";
}; };
}; };

View File

@ -1,8 +1,8 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
let let
stateDir = "/var/lib/dnsmasq"; stateDir = "/var/lib/dnscrypt-proxy";
blocklist = "${stateDir}/dnsmasq.blacklist.txt"; blocklist = "${stateDir}/blocklist.txt";
in { in {
# PostgreSQL daily backups # PostgreSQL daily backups
@ -20,13 +20,9 @@ in {
wantedBy = [ "default.target" ]; wantedBy = [ "default.target" ];
path = with pkgs; [ curl coreutils ]; path = with pkgs; [ curl coreutils ];
script = '' script = ''
curl -L https://github.com/notracking/hosts-blocklists/raw/master/dnsmasq/dnsmasq.blacklist.txt -o ${blocklist} curl -L https://download.dnscrypt.info/blacklists/domains/mybase.txt -o ${blocklist}
sed "/cainiao/d" -i ${blocklist}
''; '';
serviceConfig.Type = "oneshot"; serviceConfig.Type = "oneshot";
postStop = ''
chown -R dnsmasq ${stateDir}
'';
startAt = "02:00:00"; startAt = "02:00:00";
}; };

View File

@ -159,18 +159,6 @@
proxyWebsockets = true; proxyWebsockets = true;
}; };
}; };
"/nginx_status/" = {
listen = [{
addr = "127.0.0.1";
port = 8282;
}];
extraConfig = ''
stub_status on;
access_log off;
allow 127.0.0.1;
deny all;
'';
};
"nightscout.coolneng.duckdns.org" = { "nightscout.coolneng.duckdns.org" = {
enableACME = true; enableACME = true;
forceSSL = true; forceSSL = true;