Compare commits

..

3 commits

Author SHA1 Message Date
3ac9bba739
arashi: increase kernel.shmax for pgres
All checks were successful
/ check (push) Successful in 46s
2023-10-19 02:47:06 -04:00
adc99947bc
postgres: increase max_connections 2023-10-19 02:46:43 -04:00
570e32ea1d
sakura: remove traefik 2023-10-18 03:29:32 -04:00
4 changed files with 6 additions and 86 deletions

View file

@ -3,8 +3,6 @@
./hardware-configuration.nix
./services
../../modules
../../modules/prometheus/exporters/redis.nix
../../modules/prometheus/exporters/postgres.nix
];
boot.loader = {
@ -16,6 +14,10 @@
};
};
boot.kernel.sysctl = {
"kernel.shmmax" = 100663296;
};
networking = {
hostName = "arashi";
};

View file

@ -11,6 +11,8 @@
port = 5432;
settings = {
listen_addresses = lib.mkForce "*";
max_connections = "300";
shared_buffers = "80MB";
};
authentication = ''
local all all trust

View file

@ -1,6 +1,5 @@
{...}: {
imports = [
./traefik.nix
./authelia.nix
./forgejo.nix
./rustypaste.nix

View file

@ -1,83 +0,0 @@
{config, ...}: {
sops.secrets.cloudflare-api-key = {};
systemd.services.traefik = {
environment = {
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
};
serviceConfig = {
EnvironmentFile = [config.sops.secrets.cloudflare-api-key.path];
};
};
services.traefik = {
enable = true;
dynamicConfigOptions = {
http = {
middlewares.authelia = {
forwardauth = {
address = "http://localhost:9091/api/verify?rd=https://passport.notohh.dev/";
trustForwardHeader = true;
};
};
routers = {
api = {
rule = "PathPrefix(`/api/`)";
entrypoints = ["websecure"];
service = "api@internal";
};
dashdot = {
rule = "Host(`dashdot.sakura.internal.flake.sh`)";
entrypoints = ["web"];
service = "dashdot";
};
};
services = {
dashdot.loadBalancer.servers = [{url = "http://localhost:4000";}];
};
};
};
staticConfigOptions = {
log.level = "DEBUG";
api.dashboard = false;
api.insecure = false;
global = {
checkNewVersion = false;
sendAnonymousUsage = false;
};
entryPoints = {
websecure = {
address = ":443";
};
web = {
address = ":80";
};
};
metrics = {
prometheus = {
addServicesLabels = true;
};
};
certificatesResolvers = {
staging.acme = {
email = "x3xr6n66@notohh.dev";
storage = "/var/lib/traefik/acme.json";
caServer = "https://acme-staging-v02.api.letsencrypt.org/directory";
dnsChallenge = {
provider = "cloudflare";
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
delayBeforeCheck = "0";
};
};
production.acme = {
email = "x3xr6n66@notohh.dev";
storage = "/var/lib/traefik/acme.json";
caServer = "https://acme-v02.api.letsencrypt.org/directory";
dnsChallenge = {
provider = "cloudflare";
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
delayBeforeCheck = "0";
};
};
};
};
};
}