mirror of
https://github.com/ryan4yin/nix-config.git
synced 2026-04-22 16:58:31 +02:00
Add postgresql (#163)
* feat: add postgresql * feat: add grafana dashbaord, fix exporter
This commit is contained in:
@@ -6,7 +6,7 @@
|
|||||||
}: let
|
}: let
|
||||||
hostCommonConfig = ''
|
hostCommonConfig = ''
|
||||||
encode zstd gzip
|
encode zstd gzip
|
||||||
tls ${../../certs/ecc-server.crt} ${config.age.secrets."certs/ecc-server.key".path} {
|
tls ${../../certs/ecc-server.crt} ${config.age.secrets."caddy-ecc-server.key".path} {
|
||||||
protocols tls1.3 tls1.3
|
protocols tls1.3 tls1.3
|
||||||
curves x25519 secp384r1 secp521r1
|
curves x25519 secp384r1 secp521r1
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,3 +16,8 @@
|
|||||||
## Kubevirt
|
## Kubevirt
|
||||||
|
|
||||||
1. https://github.com/kubevirt/monitoring/tree/main/dashboards/grafana
|
1. https://github.com/kubevirt/monitoring/tree/main/dashboards/grafana
|
||||||
|
|
||||||
|
|
||||||
|
## Databases
|
||||||
|
|
||||||
|
1. https://grafana.com/grafana/dashboards/9628-postgresql-database/
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
130
hosts/idols-aquamarine/postgresql.nix
Normal file
130
hosts/idols-aquamarine/postgresql.nix
Normal file
@@ -0,0 +1,130 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
myvars,
|
||||||
|
...
|
||||||
|
}: let
|
||||||
|
inherit (myvars) username;
|
||||||
|
|
||||||
|
user = "postgres"; # postgresql's default system user
|
||||||
|
package = pkgs.postgresql_16;
|
||||||
|
dataDir = "/data/apps/postgresql/${package.psqlSchema}";
|
||||||
|
in {
|
||||||
|
# Create Directories
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d ${dataDir} 0755 ${user} ${user}"
|
||||||
|
];
|
||||||
|
|
||||||
|
# https://wiki.nixos.org/wiki/PostgreSQL
|
||||||
|
# https://search.nixos.org/options?channel=unstable&query=services.postgresql.
|
||||||
|
# https://www.postgresql.org/docs/
|
||||||
|
services.postgresql = {
|
||||||
|
enable = true;
|
||||||
|
inherit package dataDir;
|
||||||
|
# https://www.postgresql.org/docs/16/jit.html
|
||||||
|
# JIT compilation is beneficial primarily for long-running CPU-bound queries.
|
||||||
|
# Frequently these will be analytical queries. For short queries the added overhead
|
||||||
|
# of performing JIT compilation will often be higher than the time it can save.
|
||||||
|
enableJIT = true;
|
||||||
|
enableTCPIP = true;
|
||||||
|
|
||||||
|
# Ensures that the specified databases exist.
|
||||||
|
ensureDatabases = [
|
||||||
|
"mytestdb" # for testing
|
||||||
|
"openobserve"
|
||||||
|
"juicefs"
|
||||||
|
];
|
||||||
|
ensureUsers = [
|
||||||
|
{
|
||||||
|
name = "openobserve";
|
||||||
|
ensureDBOwnership = true;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name = "juicefs";
|
||||||
|
ensureDBOwnership = true;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
initdbArgs = [
|
||||||
|
"--data-checksums"
|
||||||
|
"--allow-group-access"
|
||||||
|
];
|
||||||
|
|
||||||
|
extraPlugins = ps:
|
||||||
|
with ps; [
|
||||||
|
# postgis
|
||||||
|
# pg_repack
|
||||||
|
];
|
||||||
|
|
||||||
|
# https://www.postgresql.org/docs/16/runtime-config.html
|
||||||
|
settings = {
|
||||||
|
port = 5432;
|
||||||
|
# connections
|
||||||
|
max_connections = 100;
|
||||||
|
|
||||||
|
# logging
|
||||||
|
log_connections = true;
|
||||||
|
log_statement = "all";
|
||||||
|
logging_collector = true;
|
||||||
|
log_disconnections = true;
|
||||||
|
log_destination = lib.mkForce "syslog";
|
||||||
|
|
||||||
|
# ssl
|
||||||
|
ssl = true;
|
||||||
|
ssl_cert_file = "${../../certs/ecc-server.crt}";
|
||||||
|
ssl_key_file = config.age.secrets."postgres-ecc-server.key".path;
|
||||||
|
ssl_min_protocol_version = "TLSv1.3";
|
||||||
|
ssl_ecdh_curve = "secp384r1";
|
||||||
|
# Using custom DH parameters reduces the exposure
|
||||||
|
# dhparam -out dhparams.pem 2048
|
||||||
|
# ssl_dh_params_file = "";
|
||||||
|
|
||||||
|
# memory
|
||||||
|
shared_buffers = "128MB";
|
||||||
|
huge_pages = "try";
|
||||||
|
};
|
||||||
|
|
||||||
|
# allow root & myself can login via `psql -U postgres` without other aauthentication
|
||||||
|
identMap = ''
|
||||||
|
# ArbitraryMapName systemUser DBUser
|
||||||
|
superuser_map root postgres
|
||||||
|
superuser_map postgres postgres
|
||||||
|
superuser_map postgres-exporter postgres
|
||||||
|
superuser_map ${username} postgres
|
||||||
|
# Let other names login as themselves
|
||||||
|
superuser_map /^(.*)$ \1
|
||||||
|
'';
|
||||||
|
|
||||||
|
# https://www.postgresql.org/docs/current/auth-pg-hba-conf.html
|
||||||
|
authentication = lib.mkForce ''
|
||||||
|
# TYPE DATABASE USER ADDRESS METHOD OPTIONS
|
||||||
|
|
||||||
|
# "local" is for Unix domain socket connections only
|
||||||
|
local all all peer map=superuser_map
|
||||||
|
# IPv4 local connections:
|
||||||
|
host all all 127.0.0.1/32 trust
|
||||||
|
# IPv6 local connections:
|
||||||
|
host all all ::1/128 trust
|
||||||
|
# Allow replication connections from localhost, by a user with the
|
||||||
|
# replication privilege.
|
||||||
|
local replication all trust
|
||||||
|
host replication all 127.0.0.1/32 trust
|
||||||
|
host replication all ::1/128 trust
|
||||||
|
|
||||||
|
# Other Remote Access - allow access only the database with the same name as the user
|
||||||
|
host sameuser all 0.0.0.0/0 scram-sha-256
|
||||||
|
'';
|
||||||
|
# initialScript =
|
||||||
|
# pkgs.writeText "backend-initScript" ''
|
||||||
|
# '';
|
||||||
|
};
|
||||||
|
|
||||||
|
services.prometheus.exporters.postgres = {
|
||||||
|
enable = true;
|
||||||
|
listenAddress = "0.0.0.0";
|
||||||
|
port = 9187;
|
||||||
|
user = "postgres-exporter";
|
||||||
|
group = "postgres-exporter";
|
||||||
|
dataSourceName = "user=postgres database=postgres host=/run/postgresql sslmode=verify-full";
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -87,7 +87,19 @@
|
|||||||
}
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
{
|
||||||
|
job_name = "postgres-exporter";
|
||||||
|
scrape_interval = "30s";
|
||||||
|
metrics_path = "/metrics";
|
||||||
|
static_configs = [
|
||||||
|
{
|
||||||
|
targets = ["${myvars.networking.hostsAddr.aquamarine.ipv4}:9187"];
|
||||||
|
labels.type = "app";
|
||||||
|
labels.app = "postgresql";
|
||||||
|
labels.host = "aquamarine";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
{
|
{
|
||||||
job_name = "sftpgo-embedded-exporter";
|
job_name = "sftpgo-embedded-exporter";
|
||||||
scrape_interval = "30s";
|
scrape_interval = "30s";
|
||||||
|
|||||||
@@ -248,10 +248,15 @@ in {
|
|||||||
|
|
||||||
(mkIf cfg.server.webserver.enable {
|
(mkIf cfg.server.webserver.enable {
|
||||||
age.secrets = {
|
age.secrets = {
|
||||||
"certs/ecc-server.key" = {
|
"caddy-ecc-server.key" = {
|
||||||
file = "${mysecrets}/certs/ecc-server.key.age";
|
file = "${mysecrets}/certs/ecc-server.key.age";
|
||||||
mode = "0400";
|
mode = "0400";
|
||||||
owner = "caddy"; # used by caddy only
|
owner = "caddy";
|
||||||
|
};
|
||||||
|
"postgres-ecc-server.key" = {
|
||||||
|
file = "${mysecrets}/certs/ecc-server.key.age";
|
||||||
|
mode = "0400";
|
||||||
|
owner = "postgres";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
})
|
})
|
||||||
|
|||||||
Reference in New Issue
Block a user