Skip to content

Prometheus

services.prometheus.alertmanager.checkConfig

Check configuration with amtool check-config. The call to amtool is subject to sandboxing by Nix.

If you use credentials stored in external files (environmentFile, etc), they will not be visible to amtool and it will report errors, despite a correct configuration.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.clusterPeers

Initial peers for HA cluster.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.configText

Alertmanager configuration as YAML text. If non-null, this option defines the text that is written to alertmanager.yml. If null, the contents of alertmanager.yml is generated from the structured config options.

Type: null or strings concatenated with "\n"

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.configuration

Alertmanager configuration as nix attribute set.

Type: null or (attribute set)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.enable

Whether to enable Prometheus Alertmanager. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.environmentFile

File to load as environment file. Environment variables from this file will be interpolated into the config file using envsubst with this syntax: $ENVIRONMENT ${VARIABLE}

Type: null or path

Default

null

Example

"/root/alertmanager.env"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.extraFlags

Extra commandline options when launching the Alertmanager.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.listenAddress

Address to listen on for the web interface and API. Empty string will listen on all interfaces. "localhost" will listen on 127.0.0.1 (but not ::1).

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.logFormat

If set use a syslog logger or JSON logging.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.logLevel

Only log messages with the given severity or above.

Type: one of "debug", "info", "warn", "error", "fatal"

Default

"warn"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.package

The prometheus-alertmanager package to use. Type: package

Default

pkgs.prometheus-alertmanager

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.port

Port to listen on for the web interface and API.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9093

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanager.webExternalUrl

The URL under which Alertmanager is externally reachable (for example, if Alertmanager is served via a reverse proxy). Used for generating relative and absolute links back to Alertmanager itself. If the URL has a path portion, it will be used to prefix all HTTP endoints served by Alertmanager. If omitted, relevant URL components will be derived automatically.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix

services.prometheus.alertmanagerIrcRelay.enable

Whether to enable Alertmanager IRC Relay. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix

services.prometheus.alertmanagerIrcRelay.extraFlags

Extra command line options to pass to alertmanager-irc-relay. Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix

services.prometheus.alertmanagerIrcRelay.package

The alertmanager-irc-relay package to use. Type: package

Default

pkgs.alertmanager-irc-relay

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix

services.prometheus.alertmanagerIrcRelay.settings

Configuration for Alertmanager IRC Relay as a Nix attribute set. For a reference, check out the example configuration and the source code.

Note: The webhook's URL MUST point to the IRC channel where the message should be posted. For #mychannel from the example, this would be http://localhost:8080/mychannel.

Type: YAML value

Example

`#!nix { http_host = "localhost"; http_port = 8000;

irc_host = "irc.example.com"; irc_port = 7000; irc_nickname = "myalertbot";

irc_channels = [ { name = "#mychannel"; } ]; } `

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix

services.prometheus.alertmanagerNotificationQueueCapacity

The capacity of the queue for pending alert manager notifications.

Type: signed integer

Default

10000

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.alertmanagerWebhookLogger.enable

Whether to enable Alertmanager Webhook Logger. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-webhook-logger.nix

services.prometheus.alertmanagerWebhookLogger.extraFlags

Extra command line options to pass to alertmanager-webhook-logger. Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-webhook-logger.nix

services.prometheus.alertmanagerWebhookLogger.package

The alertmanager-webhook-logger package to use. Type: package

Default

pkgs.alertmanager-webhook-logger

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-webhook-logger.nix

services.prometheus.alertmanagers

A list of alertmanagers to send alerts to. See the official documentation for more information.

Type: list of (attribute set)

Default

[ ]

Example

[ {scheme = "https";path_prefix = "/alertmanager";static_configs = [ {targets = ["prometheus.domain.tld"];} ];} ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.checkConfig

Check configuration with promtool check. The call to promtool is subject to sandboxing by Nix.

If you use credentials stored in external files (password_file, bearer_token_file, etc), they will not be visible to promtool and it will report errors, despite a correct configuration. To resolve this, you may set this option to "syntax-only" in order to only syntax check the Prometheus configuration.

Type: boolean or value "syntax-only" (singular enum)

Default

true

Example

"syntax-only"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.configText

If non-null, this option defines the text that is written to prometheus.yml. If null, the contents of prometheus.yml is generated from the structured config options.

Type: null or strings concatenated with "\n"

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.enable

Whether to enable Prometheus monitoring daemon. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.enableAgentMode

Whether to enable agent mode. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.enableReload

Reload prometheus when configuration file changes (instead of restart).

The following property holds: switching to a configuration (switch-to-configuration) that changes the prometheus configuration only finishes successfully when prometheus has finished loading the new configuration.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.exporters

Prometheus exporter configuration Type: submodule

Default

{ }

Example

{node = {enable = true;enabledCollectors = [ "systemd" ];};varnish.enable = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.apcupsdAddress

Address of the apcupsd Network Information Server (NIS).

Type: string

Default

":3551"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.apcupsdNetwork

Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".

Type: one of "tcp", "tcp4", "tcp6"

Default

"tcp"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.enable

Whether to enable the prometheus apcupsd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.extraFlags

Extra commandline options to pass to the apcupsd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.apcupsd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9162"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.apcupsd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9162 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.group

Group under which the apcupsd exporter shall be run.

Type: string

Default

"apcupsd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9162

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.apcupsd.user

User name under which the apcupsd exporter shall be run.

Type: string

Default

"apcupsd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.artiAccessToken

Access token for authentication against JFrog Artifactory API. One of the password or access token needs to be set.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.artiPassword

Password for authentication against JFrog Artifactory API. One of the password or access token needs to be set.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.artiUsername

Username for authentication against JFrog Artifactory API.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.enable

Whether to enable the prometheus artifactory exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.extraFlags

Extra commandline options to pass to the artifactory exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.artifactory.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9531"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.artifactory.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9531 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.group

Group under which the artifactory exporter shall be run.

Type: string

Default

"artifactory-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9531

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.scrapeUri

URI on which to scrape JFrog Artifactory.

Type: string

Default

"http://localhost:8081/artifactory"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.artifactory.user

User name under which the artifactory exporter shall be run.

Type: string

Default

"artifactory-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.bindGroups

List of statistics to collect. Available: [server, view, tasks]

Type: list of (one of "server", "view", "tasks")

Default

["server""view"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.bindTimeout

Timeout for trying to get stats from Bind.

Type: string

Default

"10s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.bindURI

HTTP XML API address of an Bind server.

Type: string

Default

"http://localhost:8053/"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.bindVersion

BIND statistics version. Can be detected automatically.

Type: one of "xml.v2", "xml.v3", "auto"

Default

"auto"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.enable

Whether to enable the prometheus bind exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.extraFlags

Extra commandline options to pass to the bind exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.bind.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9119"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.bind.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9119 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.group

Group under which the bind exporter shall be run.

Type: string

Default

"bind-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9119

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bind.user

User name under which the bind exporter shall be run.

Type: string

Default

"bind-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.birdSocket

Path to BIRD2 (or BIRD1 v4) socket.

Type: path

Default

"/run/bird/bird.ctl"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.birdVersion

Specifies whether BIRD1 or BIRD2 is in use.

Type: one of 1, 2

Default

2

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.enable

Whether to enable the prometheus bird exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.extraFlags

Extra commandline options to pass to the bird exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.bird.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9324"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.bird.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9324 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.group

Group under which the bird exporter shall be run.

Type: string

Default

"bird-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.newMetricFormat

Enable the new more-generic metric format.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9324

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bird.user

User name under which the bird exporter shall be run.

Type: string

Default

"bird-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.enable

Whether to enable the prometheus bitcoin exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.extraEnv

Extra environment variables for the exporter.

Type: attribute set of string

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.extraFlags

Extra commandline options to pass to the bitcoin exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.bitcoin.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9332"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.bitcoin.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9332 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.group

Group under which the bitcoin exporter shall be run.

Type: string

Default

"bitcoin-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.package

The prometheus-bitcoin-exporter package to use. Type: package

Default

pkgs.prometheus-bitcoin-exporter

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9332

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.refreshSeconds

How often to ask bitcoind for metrics.

Type: unsigned integer, meaning >=0

Default

300

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.rpcHost

RPC host.

Type: string

Default

"localhost"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.rpcPasswordFile

File containing RPC password.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.rpcPort

RPC port number.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

8332

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.rpcScheme

Whether to connect to bitcoind over http or https.

Type: one of "http", "https"

Default

"http"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.rpcUser

RPC user name.

Type: string

Default

"bitcoinrpc"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.bitcoin.user

User name under which the bitcoin exporter shall be run.

Type: string

Default

"bitcoin-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.configFile

Path to configuration file.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.enable

Whether to enable the prometheus blackbox exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.enableConfigCheck

Whether to run a correctness check for the configuration file. This depends on the configuration file residing in the nix-store. Paths passed as string will be copied to the store.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.extraFlags

Extra commandline options to pass to the blackbox exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.blackbox.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9115"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.blackbox.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9115 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.group

Group under which the blackbox exporter shall be run.

Type: string

Default

"blackbox-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9115

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.blackbox.user

User name under which the blackbox exporter shall be run.

Type: string

Default

"blackbox-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.configFile

The path to the borgmatic config file

Type: path

Default

"/etc/borgmatic/config.yaml"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.enable

Whether to enable the prometheus borgmatic exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.extraFlags

Extra commandline options to pass to the borgmatic exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.borgmatic.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9996"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.borgmatic.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9996 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.group

Group under which the borgmatic exporter shall be run.

Type: string

Default

"borgmatic-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9996

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.borgmatic.user

User name under which the borgmatic exporter shall be run.

Type: string

Default

"borgmatic-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.enable

Whether to enable the prometheus buildkite-agent exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.endpoint

The Buildkite Agent API endpoint.

Type: string

Default

"https://agent.buildkite.com/v3"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.extraFlags

Extra commandline options to pass to the buildkite-agent exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.buildkite-agent.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9876"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.buildkite-agent.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9876 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.group

Group under which the buildkite-agent exporter shall be run.

Type: string

Default

"buildkite-agent-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.interval

How often to update metrics.

Type: string

Default

"30s"

Example

"1min"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9876

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.queues

Which specific queues to process.

Type: null or (list of string)

Default

null

Example

[ "my-queue1" "my-queue2" ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.tokenPath

The token from your Buildkite "Agents" page.

A run-time path to the token file, which is supposed to be provisioned outside of Nix store.

Type: null or path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.buildkite-agent.user

User name under which the buildkite-agent exporter shall be run.

Type: string

Default

"buildkite-agent-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.collectdBinary.authFile

File mapping user names to pre-shared keys (passwords). Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.collectdBinary.enable

Whether to enable collectd binary protocol receiver. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.collectdBinary.listenAddress

Address to listen on for binary network packets.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.collectdBinary.port

Network address on which to accept collectd binary network packets. Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

25826

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.collectdBinary.securityLevel

Minimum required security level for accepted packets.

Type: one of "None", "Sign", "Encrypt"

Default

"None"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.enable

Whether to enable the prometheus collectd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.extraFlags

Extra commandline options to pass to the collectd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.collectd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9103"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.collectd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9103 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.group

Group under which the collectd exporter shall be run.

Type: string

Default

"collectd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.logFormat

Set the log format.

Type: one of "logfmt", "json"

Default

"logfmt"

Example

"json"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.logLevel

Only log messages with the given severity or above.

Type: one of "debug", "info", "warn", "error", "fatal"

Default

"info"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9103

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.collectd.user

User name under which the collectd exporter shall be run.

Type: string

Default

"collectd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.delugeHost

Hostname where deluge server is running.

Type: string

Default

"localhost"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.delugePassword

Password to connect to deluge server.

This stores the password unencrypted in the nix store and is thus considered unsafe. Prefer using the delugePasswordFile option.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.delugePasswordFile

File containing the password to connect to deluge server.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.delugePort

Port where deluge server is listening.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

58846

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.delugeUser

User to connect to deluge server.

Type: string

Default

"localclient"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.enable

Whether to enable the prometheus deluge exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.exportPerTorrentMetrics

Enable per-torrent metrics.

This may significantly increase the number of time series depending on the number of torrents in your Deluge instance.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.extraFlags

Extra commandline options to pass to the deluge exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.deluge.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9354"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.deluge.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9354 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.group

Group under which the deluge exporter shall be run.

Type: string

Default

"deluge-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9354

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.deluge.user

User name under which the deluge exporter shall be run.

Type: string

Default

"deluge-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.debug

Whether to declare enable --debug.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.deduplicationMaxSeconds

How long individual report IDs will be remembered to avoid counting double delivered reports twice.

Type: unsigned integer, meaning >=0

Default

"7 days (in seconds)"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.enable

Whether to enable the prometheus dmarc exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.extraFlags

Extra commandline options to pass to the dmarc exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.dmarc.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9797"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.dmarc.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9797 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.folders.done

IMAP mailbox that successfully processed reports are moved to.

Type: string

Default

"Archive"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.folders.error

IMAP mailbox that emails are moved to that could not be processed.

Type: string

Default

"Invalid"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.folders.inbox

IMAP mailbox that is checked for incoming DMARC aggregate reports

Type: string

Default

"INBOX"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.group

Group under which the dmarc exporter shall be run.

Type: string

Default

"dmarc-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.imap.host

Hostname of IMAP server to connect to.

Type: string

Default

"localhost"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.imap.passwordFile

File containing the login password for the IMAP connection.

Type: string

Example

"/run/secrets/dovecot_pw"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.imap.port

Port of the IMAP server to connect to.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

993

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.imap.username

Login username for the IMAP connection.

Type: string

Example

"postmaster@example.org"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.pollIntervalSeconds

How often to poll the IMAP server in seconds.

Type: unsigned integer, meaning >=0

Default

60

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9797

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dmarc.user

User name under which the dmarc exporter shall be run.

Type: string

Default

"dmarc-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.dnsmasqListenAddress

Address on which dnsmasq listens.

Type: string

Default

"localhost:53"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.enable

Whether to enable the prometheus dnsmasq exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.extraFlags

Extra commandline options to pass to the dnsmasq exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.dnsmasq.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9153"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.dnsmasq.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9153 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.group

Group under which the dnsmasq exporter shall be run.

Type: string

Default

"dnsmasq-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.leasesPath

Path to the dnsmasq.leases file.

Type: path

Default

"/var/lib/misc/dnsmasq.leases"

Example

"/var/lib/dnsmasq/dnsmasq.leases"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9153

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnsmasq.user

User name under which the dnsmasq exporter shall be run.

Type: string

Default

"dnsmasq-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.configuration

dnssec exporter configuration as nix attribute set.

See https://github.com/chrj/prometheus-dnssec-exporter/blob/master/README.md for the description of the configuration file format.

Type: null or (attribute set)

Default

null

Example

{records = [{zone = "ietf.org";record = "@";type = "SOA";}{zone = "verisigninc.com";record = "@";type = "SOA";}];}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.enable

Whether to enable the prometheus dnssec exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.extraFlags

Extra commandline options when launching Prometheus.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.dnssec.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9204"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.dnssec.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9204 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.group

Group under which the dnssec exporter shall be run.

Type: string

Default

"dnssec-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.listenAddress

Listen address as host IP and port definition.

Type: null or string

Default

null

Example

":9204"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9204

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.resolvers

DNSSEC capable resolver to be used for the check.

Type: list of string

Default

[ ]

Example

["0.0.0.0:53"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.timeout

DNS request timeout duration.

Type: null or string

Default

null

Example

"10s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dnssec.user

User name under which the dnssec exporter shall be run.

Type: string

Default

"dnssec-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.enable

Whether to enable the prometheus domain exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.extraFlags

Extra commandline options to pass to the domain exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.domain.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9222"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.domain.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9222 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.group

Group under which the domain exporter shall be run.

Type: string

Default

"domain-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9222

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.domain.user

User name under which the domain exporter shall be run.

Type: string

Default

"domain-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.enable

Whether to enable the prometheus dovecot exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.extraFlags

Extra commandline options to pass to the dovecot exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.dovecot.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9166"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.dovecot.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9166 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.group

Group under which the dovecot exporter shall be run.

Type: string

Default

"dovecot-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9166

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.scopes

Stats scopes to query.

Type: list of string

Default

["user"]

Example

["user""global"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.socketPath

Path under which the stats socket is placed. The user/group under which the exporter runs, should be able to access the socket in order to scrape the metrics successfully.

Please keep in mind that the stats module has changed in Dovecot 2.3+ which is not compatible with this exporter.

The following extra config has to be passed to Dovecot to ensure that recent versions work with this exporter:

{
  services.prometheus.exporters.dovecot.enable = true;
  services.prometheus.exporters.dovecot.socketPath = "/var/run/dovecot2/old-stats";
  services.dovecot2.mailPlugins.globally.enable = [ "old_stats" ];
  services.dovecot2.extraConfig = ''
    service old-stats {
      unix_listener old-stats {
        user = dovecot-exporter
        group = dovecot-exporter
        mode = 0660
      }
      fifo_listener old-stats-mail {
        mode = 0660
        user = dovecot
        group = dovecot
      }
      fifo_listener old-stats-user {
        mode = 0660
        user = dovecot
        group = dovecot
      }
    }
    plugin {
      old_stats_refresh = 30 secs
      old_stats_track_cmds = yes
    }
  '';
}

Type: path

Default

"/var/run/dovecot/stats"

Example

"/var/run/dovecot2/old-stats"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.dovecot.user

User name under which the dovecot exporter shall be run.

Type: string

Default

"dovecot-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.apiKeyFile

File containing the api-key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.enable

Whether to enable the prometheus exportarr-bazarr exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.environment

See the configuration guide for available options.

Type: attribute set of string

Default

{ }

Example

{PROWLARR__BACKFILL = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.extraFlags

Extra commandline options to pass to the exportarr-bazarr exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.exportarr-bazarr.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9708"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.exportarr-bazarr.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9708 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.group

Group under which the exportarr-bazarr exporter shall be run.

Type: string

Default

"exportarr-bazarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.package

The exportarr package to use. Type: package

Default

pkgs.exportarr

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9708

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.url

The full URL to Sonarr, Radarr, or Lidarr.

Type: string

Default

"http://127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-bazarr.user

User name under which the exportarr-bazarr exporter shall be run.

Type: string

Default

"exportarr-bazarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.apiKeyFile

File containing the api-key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.enable

Whether to enable the prometheus exportarr-lidarr exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.environment

See the configuration guide for available options.

Type: attribute set of string

Default

{ }

Example

{PROWLARR__BACKFILL = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.extraFlags

Extra commandline options to pass to the exportarr-lidarr exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.exportarr-lidarr.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9708"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.exportarr-lidarr.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9708 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.group

Group under which the exportarr-lidarr exporter shall be run.

Type: string

Default

"exportarr-lidarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.package

The exportarr package to use. Type: package

Default

pkgs.exportarr

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9708

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.url

The full URL to Sonarr, Radarr, or Lidarr.

Type: string

Default

"http://127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-lidarr.user

User name under which the exportarr-lidarr exporter shall be run.

Type: string

Default

"exportarr-lidarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.apiKeyFile

File containing the api-key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.enable

Whether to enable the prometheus exportarr-prowlarr exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.environment

See the configuration guide for available options.

Type: attribute set of string

Default

{ }

Example

{PROWLARR__BACKFILL = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.extraFlags

Extra commandline options to pass to the exportarr-prowlarr exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.exportarr-prowlarr.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9708"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.exportarr-prowlarr.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9708 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.group

Group under which the exportarr-prowlarr exporter shall be run.

Type: string

Default

"exportarr-prowlarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.package

The exportarr package to use. Type: package

Default

pkgs.exportarr

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9708

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.url

The full URL to Sonarr, Radarr, or Lidarr.

Type: string

Default

"http://127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-prowlarr.user

User name under which the exportarr-prowlarr exporter shall be run.

Type: string

Default

"exportarr-prowlarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.apiKeyFile

File containing the api-key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.enable

Whether to enable the prometheus exportarr-radarr exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.environment

See the configuration guide for available options.

Type: attribute set of string

Default

{ }

Example

{PROWLARR__BACKFILL = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.extraFlags

Extra commandline options to pass to the exportarr-radarr exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.exportarr-radarr.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9708"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.exportarr-radarr.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9708 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.group

Group under which the exportarr-radarr exporter shall be run.

Type: string

Default

"exportarr-radarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.package

The exportarr package to use. Type: package

Default

pkgs.exportarr

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9708

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.url

The full URL to Sonarr, Radarr, or Lidarr.

Type: string

Default

"http://127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-radarr.user

User name under which the exportarr-radarr exporter shall be run.

Type: string

Default

"exportarr-radarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.apiKeyFile

File containing the api-key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.enable

Whether to enable the prometheus exportarr-readarr exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.environment

See the configuration guide for available options.

Type: attribute set of string

Default

{ }

Example

{PROWLARR__BACKFILL = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.extraFlags

Extra commandline options to pass to the exportarr-readarr exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.exportarr-readarr.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9708"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.exportarr-readarr.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9708 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.group

Group under which the exportarr-readarr exporter shall be run.

Type: string

Default

"exportarr-readarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.package

The exportarr package to use. Type: package

Default

pkgs.exportarr

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9708

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.url

The full URL to Sonarr, Radarr, or Lidarr.

Type: string

Default

"http://127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-readarr.user

User name under which the exportarr-readarr exporter shall be run.

Type: string

Default

"exportarr-readarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.apiKeyFile

File containing the api-key.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.enable

Whether to enable the prometheus exportarr-sonarr exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.environment

See the configuration guide for available options.

Type: attribute set of string

Default

{ }

Example

{PROWLARR__BACKFILL = true;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.extraFlags

Extra commandline options to pass to the exportarr-sonarr exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.exportarr-sonarr.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9708"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.exportarr-sonarr.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9708 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.group

Group under which the exportarr-sonarr exporter shall be run.

Type: string

Default

"exportarr-sonarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.package

The exportarr package to use. Type: package

Default

pkgs.exportarr

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9708

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.url

The full URL to Sonarr, Radarr, or Lidarr.

Type: string

Default

"http://127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.exportarr-sonarr.user

User name under which the exportarr-sonarr exporter shall be run.

Type: string

Default

"exportarr-sonarr-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.configFile

Path to a fastly-exporter configuration file. Example one can be generated with fastly-exporter --config-file-example.

Type: null or path

Default

null

Example

"./fastly-exporter-config.txt"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.enable

Whether to enable the prometheus fastly exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.extraFlags

Extra commandline options to pass to the fastly exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.fastly.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9118"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.fastly.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9118 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.group

Group under which the fastly exporter shall be run.

Type: string

Default

"fastly-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9118

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.tokenPath

A run-time path to the token file, which is supposed to be provisioned outside of Nix store.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fastly.user

User name under which the fastly exporter shall be run.

Type: string

Default

"fastly-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.asn

The ASN being monitored. Type: positive integer, meaning >0

Example

65542

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.brokers

List of Kafka brokers to connect to. Type: list of string

Example

[ "kafka.example.org:19092" ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.enable

Whether to enable the prometheus flow exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.extraFlags

Extra commandline options to pass to the flow exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.flow.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9590"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.flow.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9590 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.group

Group under which the flow exporter shall be run.

Type: string

Default

"flow-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.partitions

The number of the partitions to consume, none means all.

Type: list of signed integer

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9590

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.topic

The Kafka topic to consume from. Type: string

Example

"pmacct.acct"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.flow.user

User name under which the flow exporter shall be run.

Type: string

Default

"flow-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.enable

Whether to enable the prometheus fritz exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.extraFlags

Extra commandline options to pass to the fritz exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.fritz.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9787"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.fritz.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9787 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.group

Group under which the fritz exporter shall be run.

Type: string

Default

"fritz-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9787

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings

Configuration settings for fritz-exporter. Type: YAML value

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.devices

Fritz!-devices to monitor using the exporter. Type: list of (YAML value)

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.devices.*.host_info

Enable extended host info for this device. Warning: This will heavily increase scrape time.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.devices.*.hostname

Hostname under which the target device is reachable.

Type: string

Default

"fritz.box"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.devices.*.name

Name to use for the device.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.devices.*.password_file

Path to a file which contains the password to authenticate with the target device. Needs to be readable by the user the exporter runs under.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.devices.*.username

Username to authenticate with the target device.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.settings.log_level

Log level to use for the exporter.

Type: one of "DEBUG", "INFO", "WARNING", "ERROR", "CRITICAL"

Default

"INFO"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritz.user

User name under which the fritz exporter shall be run.

Type: string

Default

"fritz-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.enable

Whether to enable the prometheus fritzbox exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.extraFlags

Extra commandline options to pass to the fritzbox exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.fritzbox.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9133"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.fritzbox.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9133 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.gatewayAddress

The hostname or IP of the FRITZ!Box.

Type: string

Default

"fritz.box"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.gatewayPort

The port of the FRITZ!Box UPnP service.

Type: signed integer

Default

49000

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.group

Group under which the fritzbox exporter shall be run.

Type: string

Default

"fritzbox-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9133

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.fritzbox.user

User name under which the fritzbox exporter shall be run.

Type: string

Default

"fritzbox-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.enable

Whether to enable the prometheus graphite exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.extraFlags

Extra commandline options to pass to the graphite exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.graphite.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9108"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.graphite.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9108 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.graphitePort

Port to use for the graphite server.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9109

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.group

Group under which the graphite exporter shall be run.

Type: string

Default

"graphite-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.mappingSettings

Mapping configuration for the exporter, see https://github.com/prometheus/graphite_exporter#yaml-config for available options.

Type: YAML value

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9108

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.graphite.user

User name under which the graphite exporter shall be run.

Type: string

Default

"graphite-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.configuration

Configuration for iDRAC exporter, as a nix attribute set.

Configuration reference: https://github.com/mrlhansen/idrac_exporter/#configuration

Mutually exclusive with configurationPath option.

Type: null or (attribute set)

Default

null

Example

{hosts = {default = {password = "password";username = "username";};};metrics = {memory = true;power = true;sel = true;sensors = true;storage = true;system = true;};retries = 1;timeout = 10;}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.configurationPath

Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.

The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.

Mutually exclusive with configuration option.

Configuration reference: https://github.com/mrlhansen/idrac_exporter/#configuration

Type: null or path

Default

null

Example

"/etc/prometheus-idrac-exporter/idrac.yml"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.enable

Whether to enable the prometheus idrac exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.extraFlags

Extra commandline options to pass to the idrac exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.idrac.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9348"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.idrac.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9348 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.group

Group under which the idrac exporter shall be run.

Type: string

Default

"idrac-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9348

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.idrac.user

User name under which the idrac exporter shall be run.

Type: string

Default

"idrac-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts

Accounts to monitor

Type: attribute set of (submodule)

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress

Your email address (at the moment used as login name) Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts.<name>.password

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress

mailserver name or address Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport

imap port number (at the moment only tls connection is supported) Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls

set to true for using STARTTLS to start a TLS connection Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.accounts.<name>.username

If empty string mailaddress value is used Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.configurationFile

File containing the configuration

Type: path

Example

"/path/to/config-file"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.enable

Whether to enable the prometheus imap-mailstat exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.extraFlags

Extra commandline options to pass to the imap-mailstat exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.imap-mailstat.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 8081"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.imap-mailstat.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 8081 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.group

Group under which the imap-mailstat exporter shall be run.

Type: string

Default

"imap-mailstat-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.oldestUnseenDate

Enable metric with timestamp of oldest unseen mail

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

8081

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.imap-mailstat.user

User name under which the imap-mailstat exporter shall be run.

Type: string

Default

"imap-mailstat-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.enable

Whether to enable the prometheus influxdb exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.extraFlags

Extra commandline options to pass to the influxdb exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.influxdb.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9122"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.influxdb.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9122 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.group

Group under which the influxdb exporter shall be run.

Type: string

Default

"influxdb-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9122

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.sampleExpiry

How long a sample is valid for Type: string

Default

"5m"

Example

"10m"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.udpBindAddress

Address on which to listen for udp packets Type: string

Default

":9122"

Example

"192.0.2.1:9122"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.influxdb.user

User name under which the influxdb exporter shall be run.

Type: string

Default

"influxdb-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.configFile

Path to configuration file.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.enable

Whether to enable the prometheus ipmi exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.extraFlags

Extra commandline options to pass to the ipmi exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.ipmi.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9290"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.ipmi.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9290 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.group

Group under which the ipmi exporter shall be run.

Type: string

Default

"ipmi-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9290

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.user

User name under which the ipmi exporter shall be run.

Type: string

Default

"ipmi-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ipmi.webConfigFile

Path to configuration file that can enable TLS or authentication.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.enable

Whether to enable the prometheus jitsi exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.extraFlags

Extra commandline options to pass to the jitsi exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.jitsi.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9700"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.jitsi.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9700 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.group

Group under which the jitsi exporter shall be run.

Type: string

Default

"jitsi-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.interval

How often to scrape new data

Type: string

Default

"30s"

Example

"1min"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9700

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.url

Jitsi Videobridge metrics URL to monitor. This is usually /colibri/stats on port 8080 of the jitsi videobridge host.

Type: string

Default

"http://localhost:8080/colibri/stats"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.jitsi.user

User name under which the jitsi exporter shall be run.

Type: string

Default

"jitsi-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.configFile

Path to configuration file.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.enable

Whether to enable the prometheus json exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.extraFlags

Extra commandline options to pass to the json exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.json.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 7979"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.json.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 7979 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.group

Group under which the json exporter shall be run.

Type: string

Default

"json-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

7979

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.json.user

User name under which the json exporter shall be run.

Type: string

Default

"json-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.configuration

JunOS exporter configuration as nix attribute set. Mutually exclusive with the configurationFile option.

Type: null or (attribute set)

Default

null

Example

{devices = [{host = "router1";key_file = "/path/to/key";}];}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.configurationFile

Specify the JunOS exporter configuration file to use.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.enable

Whether to enable the prometheus junos-czerwonk exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.environmentFile

File containing env-vars to be substituted into the exporter's config.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.extraFlags

Extra commandline options to pass to the junos-czerwonk exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.junos-czerwonk.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9326"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.junos-czerwonk.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9326 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.group

Group under which the junos-czerwonk exporter shall be run.

Type: string

Default

"junos-czerwonk-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9326

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.junos-czerwonk.user

User name under which the junos-czerwonk exporter shall be run.

Type: string

Default

"junos-czerwonk-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.enable

Whether to enable the prometheus kea exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.extraFlags

Extra commandline options to pass to the kea exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.kea.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9547"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.kea.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9547 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.group

Group under which the kea exporter shall be run.

Type: string

Default

"kea-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9547

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.targets

Paths or URLs to the Kea control socket.

Type: list of string

Example

["/run/kea/kea-dhcp4.socket""/run/kea/kea-dhcp6.socket""http://127.0.0.1:8547"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.kea.user

User name under which the kea exporter shall be run.

Type: string

Default

"kea-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.enable

Whether to enable the prometheus keylight exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.extraFlags

Extra commandline options to pass to the keylight exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.keylight.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9288"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.keylight.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9288 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.group

Group under which the keylight exporter shall be run.

Type: string

Default

"keylight-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9288

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.keylight.user

User name under which the keylight exporter shall be run.

Type: string

Default

"keylight-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.enable

Whether to enable the prometheus knot exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.extraFlags

Extra commandline options to pass to the knot exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.knot.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9433"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.knot.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9433 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.group

Group under which the knot exporter shall be run.

Type: string

Default

"knot-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.knotLibraryPath

Path to the library of knot-dns.

Type: null or string

Default

null

Example

"${pkgs.knot-dns.out}/lib/libknot.so"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.knotSocketPath

Socket path of {manpage}knotd(8).

Type: string

Default

"/run/knot/knot.sock"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.knotSocketTimeout

Timeout in seconds.

Type: positive integer, meaning >0

Default

2000

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9433

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.knot.user

User name under which the knot exporter shall be run.

Type: string

Default

"knot-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.enable

Whether to enable the prometheus lnd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.extraFlags

Extra commandline options to pass to the lnd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.lnd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9092"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.lnd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9092 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.group

Group under which the lnd exporter shall be run.

Type: string

Default

"lnd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.lndHost

lnd instance gRPC address:port.

Type: string

Default

"localhost:10009"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.lndMacaroonDir

Path to lnd macaroons.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.lndTlsPath

Path to lnd TLS certificate.

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9092

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.lnd.user

User name under which the lnd exporter shall be run.

Type: string

Default

"lnd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configFile

Specify the mailexporter configuration file to use.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration

Specify the mailexporter configuration file to use.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.disableFileDeletion

Disables the exporter's function to delete probing mails.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.mailCheckTimeout

Timeout until mails are considered "didn't make it".

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.monitoringInterval

Time interval between two probe attempts.

Type: string

Example

"10s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers

List of servers that should be probed.

Note: if your mailserver has {manpage}rspamd(8) configured, it can happen that emails from this exporter are marked as spam.

It's possible to work around the issue with a config like this:

{
  services.rspamd.locals."multimap.conf".text = ''
    ALLOWLIST_PROMETHEUS {
      filter = "email:domain:tld";
      type = "from";
      map = "${pkgs.writeText "allowmap" "domain.tld"}";
      score = -100.0;
    }
  '';
}

Type: list of (submodule)

Default

[ ]

Example

[ {name = "testserver";server = "smtp.domain.tld";port = 587;from = "exporteruser@domain.tld";to = "exporteruser@domain.tld";detectionDir = "/path/to/Maildir/new";} ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.detectionDir

Directory in which new mails for the exporter user are placed. Note that this needs to exist when the exporter starts.

Type: path

Example

"/var/spool/mail/exporteruser/new"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.from

Content of 'From' Header for probing mails.

Type: string

Example

"exporteruser@domain.tld"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.login

Username to use for SMTP authentication.

Type: null or string

Default

null

Example

"exporteruser@domain.tld"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.name

Value for label 'configname' which will be added to all metrics.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.passphrase

Password to use for SMTP authentication.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.port

Port to use for SMTP.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Example

587

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.server

Hostname of the server that should be probed.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.configuration.servers.*.to

Content of 'To' Header for probing mails.

Type: string

Example

"exporteruser@domain.tld"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.enable

Whether to enable the prometheus mail exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.environmentFile

File containing env-vars to be substituted into the exporter's config.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.extraFlags

Extra commandline options to pass to the mail exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.mail.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9225"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.mail.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9225 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.group

Group under which the mail exporter shall be run.

Type: string

Default

"mail-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9225

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mail.user

User name under which the mail exporter shall be run.

Type: string

Default

"mail-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.configFile

Path to a mikrotik exporter configuration file. Mutually exclusive with {option}configuration option.

Type: null or path

Default

null

Example

./mikrotik.yml

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.configuration

Mikrotik exporter configuration as nix attribute set. Mutually exclusive with {option}configFile option.

See https://github.com/nshttpd/mikrotik-exporter/blob/master/README.md for the description of the configuration file format.

Type: null or (attribute set)

Default

null

Example

{devices = [{name = "my_router";address = "10.10.0.1";user = "prometheus";password = "changeme";}];features = {bgp = true;dhcp = true;routes = true;optics = true;};}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.enable

Whether to enable the prometheus mikrotik exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.extraFlags

Extra commandline options to pass to the mikrotik exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.mikrotik.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9436"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.mikrotik.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9436 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.group

Group under which the mikrotik exporter shall be run.

Type: string

Default

"mikrotik-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9436

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mikrotik.user

User name under which the mikrotik exporter shall be run.

Type: string

Default

"mikrotik-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.enable

Whether to enable the prometheus modemmanager exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.extraFlags

Extra commandline options to pass to the modemmanager exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.modemmanager.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9539"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.modemmanager.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9539 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.group

Group under which the modemmanager exporter shall be run.

Type: string

Default

"modemmanager-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9539

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.refreshRate

How frequently ModemManager will refresh the extended signal quality information for each modem. The duration should be specified in seconds ("5s"), minutes ("1m"), or hours ("1h").

Type: string

Default

"5s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.modemmanager.user

User name under which the modemmanager exporter shall be run.

Type: string

Default

"modemmanager-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.collStats

List of comma separared databases.collections to get $collStats

Type: list of string

Default

[ ]

Example

["db1.coll1""db2"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.collectAll

Enable all collectors. Same as specifying all --collector.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.collector

Enabled collectors Type: list of string

Default

[ ]

Example

["diagnosticdata""replicasetstatus""dbstats""topmetrics""currentopmetrics""indexstats""dbstats""profile"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.enable

Whether to enable the prometheus mongodb exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.extraFlags

Extra commandline options to pass to the mongodb exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.mongodb.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9216"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.mongodb.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9216 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.group

Group under which the mongodb exporter shall be run.

Type: string

Default

"mongodb-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.indexStats

List of comma separared databases.collections to get $indexStats

Type: list of string

Default

[ ]

Example

["db1.coll1""db2"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9216

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.telemetryPath

Metrics expose path Type: string

Default

"/metrics"

Example

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.uri

MongoDB URI to connect to. Type: string

Default

"mongodb://localhost:27017/test"

Example

"mongodb://localhost:27017/test"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mongodb.user

User name under which the mongodb exporter shall be run.

Type: string

Default

"mongodb-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.configFile

Path to the services config file.

See https://github.com/prometheus/mysqld_exporter#running for more information about the available options.

::: {.warn} Please do not store this file in the nix store if you choose to include any credentials here, as it would be world-readable. :::

Type: path

Example

"/var/lib/prometheus-mysqld-exporter.cnf"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.enable

Whether to enable the prometheus mysqld exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.extraFlags

Extra commandline options to pass to the mysqld exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.mysqld.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9104"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.mysqld.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9104 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.group

Group under which the mysqld exporter shall be run.

Type: string

Default

"mysqld-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9104

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.runAsLocalSuperUser

Whether to run the exporter as {option}services.mysql.user.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.mysqld.user

User name under which the mysqld exporter shall be run.

Type: string

Default

"mysqld-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.enable

Whether to enable the prometheus nats exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.extraFlags

Extra commandline options to pass to the nats exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.nats.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 7777"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.nats.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 7777 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.group

Group under which the nats exporter shall be run.

Type: string

Default

"nats-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

7777

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.url

NATS monitor endpoint to query.

Type: string

Default

"http://127.0.0.1:8222"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nats.user

User name under which the nats exporter shall be run.

Type: string

Default

"nats-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.enable

Whether to enable the prometheus nextcloud exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.extraFlags

Extra commandline options to pass to the nextcloud exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.nextcloud.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9205"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.nextcloud.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9205 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.group

Group under which the nextcloud exporter shall be run.

Type: string

Default

"nextcloud-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.passwordFile

File containing the password for connecting to Nextcloud. Make sure that this file is readable by the exporter user.

Type: null or path

Default

null

Example

"/path/to/password-file"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9205

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.timeout

Timeout for getting server info document.

Type: string

Default

"5s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.tokenFile

File containing the token for connecting to Nextcloud. Make sure that this file is readable by the exporter user.

Type: null or path

Default

null

Example

"/path/to/token-file"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.url

URL to the Nextcloud serverinfo page. Adding the path to the serverinfo API is optional, it defaults to /ocs/v2.php/apps/serverinfo/api/v1/info.

Type: string

Example

"https://domain.tld"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.user

User name under which the nextcloud exporter shall be run.

Type: string

Default

"nextcloud-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nextcloud.username

Username for connecting to Nextcloud. Note that this account needs to have admin privileges in Nextcloud. Unused when using token authentication.

Type: string

Default

"nextcloud-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.constLabels

A list of constant labels that will be used in every metric.

Type: list of string

Default

[ ]

Example

["label1=value1""label2=value2"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.enable

Whether to enable the prometheus nginx exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.extraFlags

Extra commandline options to pass to the nginx exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.nginx.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9113"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.nginx.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9113 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.group

Group under which the nginx exporter shall be run.

Type: string

Default

"nginx-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9113

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.scrapeUri

Address to access the nginx status page. Can be enabled with services.nginx.statusPage = true.

Type: string

Default

"http://localhost/nginx_status"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.sslVerify

Whether to perform certificate verification for https.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginx.user

User name under which the nginx exporter shall be run.

Type: string

Default

"nginx-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.enable

Whether to enable the prometheus nginxlog exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.extraFlags

Extra commandline options to pass to the nginxlog exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.nginxlog.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9117"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.nginxlog.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9117 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.group

Group under which the nginxlog exporter shall be run.

Type: string

Default

"nginxlog-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.metricsEndpoint

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9117

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.settings

All settings of nginxlog expressed as an Nix attrset.

Check the official documentation for the corresponding YAML settings that can all be used here: https://github.com/martin-helmich/prometheus-nginxlog-exporter

The listen object is already generated by port, listenAddress and metricsEndpoint and will be merged with the value of settings before writing it as JSON.

Type: submodule

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.settings.consul

Consul integration options. For more information see the example config.

This is disabled by default.

Type: null or (attribute set of anything)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.settings.namespaces

Namespaces to collect the metrics for. For more information see the example config.

Type: list of attribute set of anything

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nginxlog.user

User name under which the nginxlog exporter shall be run.

Type: string

Default

"nginxlog-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.disabledCollectors

Collectors to disable which are enabled by default.

Type: list of string

Default

[ ]

Example

["timex"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.enable

Whether to enable the prometheus node exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.enabledCollectors

Collectors to enable. The collectors listed here are enabled in addition to the default ones.

Type: list of string

Default

[ ]

Example

["systemd"]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.extraFlags

Extra commandline options to pass to the node exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.node.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9100"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.node.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9100 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.group

Group under which the node exporter shall be run.

Type: string

Default

"node-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9100

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.node.user

User name under which the node exporter shall be run.

Type: string

Default

"node-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.enable

Whether to enable the prometheus nut exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.extraFlags

Extra commandline options to pass to the nut exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.nut.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9199"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.nut.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9199 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.group

Group under which the nut exporter shall be run.

Type: string

Default

"nut-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.nutServer

Hostname or address of the NUT server

Type: string

Default

"127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.nutUser

The user to log in into NUT server. If set, passwordPath should also be set.

Default NUT configs usually permit reading variables without authentication.

Type: string

Default

""

Example

"nut"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.nutVariables

List of NUT variable names to monitor.

If no variables are set, all numeric variables will be exported automatically. See the upstream docs for more information.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.passwordPath

A run-time path to the nutUser password file, which should be provisioned outside of Nix store.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9199

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.nut.user

User name under which the nut exporter shall be run.

Type: string

Default

"nut-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.enable

Whether to enable the prometheus openldap exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.extraFlags

Extra commandline options to pass to the openldap exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.openldap.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9330"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.openldap.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9330 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.group

Group under which the openldap exporter shall be run.

Type: string

Default

"openldap-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.interval

Scrape interval of the exporter.

Type: string

Default

"30s"

Example

"1m"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.ldapAddr

Address of the openldap-instance.

Type: string

Default

"localhost:389"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.ldapCredentialFile

Environment file to contain the credentials to authenticate against openldap.

The file should look like this:

---
ldapUser: "cn=monitoring,cn=Monitor"
ldapPass: "secret"

Type: path

Example

"/run/keys/ldap_pass"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.metricsPath

URL path where metrics should be exposed.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9330

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.protocol

Which protocol to use to connect against openldap.

Type: string

Default

"tcp"

Example

"udp"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.openldap.user

User name under which the openldap exporter shall be run.

Type: string

Default

"openldap-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.connectionString

Connection string for accessing pgBouncer.

NOTE: You MUST keep pgbouncer as database name (special internal db)!!!

NOTE: Admin user (with password or passwordless) MUST exist in the services.pgbouncer.authFile if authType other than any is used.

WARNING: this secret is stored in the world-readable Nix store! Use {option}connectionStringFile instead.

Type: string

Default

""

Example

"postgres://admin:@localhost:6432/pgbouncer?sslmode=require"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.connectionStringFile

File that contains pgBouncer connection string in format: postgres://admin:@localhost:6432/pgbouncer?sslmode=require

NOTE: You MUST keep pgbouncer as database name (special internal db)!!!

NOTE: Admin user (with password or passwordless) MUST exist in the services.pgbouncer.authFile if authType other than any is used.

{option}connectionStringFile takes precedence over {option}connectionString

Type: null or path

Default

null

Example

"/run/keys/pgBouncer-connection-string"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.enable

Whether to enable the prometheus pgbouncer exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.extraFlags

Extra commandline options when launching Prometheus.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.pgbouncer.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9127"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.pgbouncer.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9127 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.group

Group under which the pgbouncer exporter shall be run.

Type: string

Default

"pgbouncer-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.logFormat

Output format of log messages. One of: [logfmt, json]

Type: one of "logfmt", "json"

Default

"logfmt"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.logLevel

Only log messages with the given severity or above.

Type: one of "debug", "info", "warn", "error"

Default

"info"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.pidFile

Path to PgBouncer pid file.

If provided, the standard process metrics get exported for the PgBouncer process, prefixed with 'pgbouncer_process_...'. The pgbouncer_process exporter needs to have read access to files owned by the PgBouncer process. Depends on the availability of /proc.

https://prometheus.io/docs/instrumenting/writing_clientlibs/#process-metrics.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9127

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.user

User name under which the pgbouncer exporter shall be run.

Type: string

Default

"pgbouncer-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.webConfigFile

Path to configuration file that can enable TLS or authentication.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pgbouncer.webSystemdSocket

Use systemd socket activation listeners instead of port listeners (Linux only).

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.enable

Whether to enable the prometheus php-fpm exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.environmentFile

Environment file as defined in {manpage}systemd.exec(5).

Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.

Environment variables from this file will be interpolated into the config file using envsubst with this syntax: $ENVIRONMENT ${VARIABLE}

For variables to use see options and defaults.

The main use is to set the PHP_FPM_SCRAPE_URI that indicate how to connect to PHP-FPM process.

  # Content of the environment file
  PHP_FPM_SCRAPE_URI="unix:///tmp/php.sock;/status"

Note that this file needs to be available on the host on which this exporter is running.

Type: null or path

Default

null

Example

"/root/prometheus-php-fpm-exporter.env"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.extraFlags

Extra commandline options to pass to the php-fpm exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.php-fpm.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9253"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.php-fpm.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9253 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.group

Group under which the php-fpm exporter shall be run.

Type: string

Default

"php-fpm-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.package

The prometheus-php-fpm-exporter package to use. Type: package

Default

pkgs.prometheus-php-fpm-exporter

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9253

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.php-fpm.user

User name under which the php-fpm exporter shall be run.

Type: string

Default

"php-fpm-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.apiToken

Pi-Hole API token which can be used instead of a password

Type: string

Default

""

Example

"580a770cb40511eb85290242ac130003580a770cb40511eb85290242ac130003"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.enable

Whether to enable the prometheus pihole exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.extraFlags

Extra commandline options to pass to the pihole exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.pihole.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9617"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.pihole.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9617 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.group

Group under which the pihole exporter shall be run.

Type: string

Default

"pihole-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.password

The password to login into Pi-Hole. An api token can be used instead.

Type: string

Default

""

Example

"password"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.piholeHostname

Hostname or address where to find the Pi-Hole webinterface

Type: string

Default

"pihole"

Example

"127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.piholePort

The port Pi-Hole webinterface is reachable on

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

80

Example

443

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9617

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.protocol

The protocol which is used to connect to Pi-Hole

Type: one of "http", "https"

Default

"http"

Example

"https"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.timeout

Controls the timeout to connect to a Pi-Hole instance

Type: string

Default

"5s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pihole.user

User name under which the pihole exporter shall be run.

Type: string

Default

"pihole-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.enable

Whether to enable the prometheus ping exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.extraFlags

Extra commandline options to pass to the ping exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.ping.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9427"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.ping.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9427 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.group

Group under which the ping exporter shall be run.

Type: string

Default

"ping-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9427

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.settings

Configuration for ping_exporter, see https://github.com/czerwonk/ping_exporter for supported values.

Type: YAML value

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.ping.user

User name under which the ping exporter shall be run.

Type: string

Default

"ping-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.enable

Whether to enable the prometheus postfix exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.extraFlags

Extra commandline options to pass to the postfix exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.postfix.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9154"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.postfix.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9154 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.group

Group under which the postfix exporter shall be run. It should match the group that is allowed to access the showq socket in the queue/public/ directory. Defaults to services.postfix.setgidGroup when postfix is enabled.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.logfilePath

Path where Postfix writes log entries. This file will be truncated by this exporter!

Type: path

Default

"/var/log/postfix_exporter_input.log"

Example

"/var/log/mail.log"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9154

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.showqPath

Path where Postfix places its showq socket.

Type: path

Default

"/var/lib/postfix/queue/public/showq"

Example

"/var/spool/postfix/public/showq"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.systemd.enable

Whether to enable reading metrics from the systemd journal instead of from a logfile

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.systemd.journalPath

Path to the systemd journal.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.systemd.slice

Name of the postfix systemd slice. This overrides the {option}systemd.unit.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.systemd.unit

Name of the postfix systemd unit.

Type: string

Default

"postfix.service"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postfix.user

User name under which the postfix exporter shall be run.

Type: string

Default

"postfix-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.dataSourceName

Accepts PostgreSQL URI form and key=value form arguments.

Type: string

Default

"user=postgres database=postgres host=/run/postgresql sslmode=disable"

Example

"postgresql://username:password@localhost:5432/postgres?sslmode=disable"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.enable

Whether to enable the prometheus postgres exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.environmentFile

Environment file as defined in {manpage}systemd.exec(5).

Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.

Environment variables from this file will be interpolated into the config file using envsubst with this syntax: $ENVIRONMENT ${VARIABLE}

The main use is to set the DATA_SOURCE_NAME that contains the postgres password

note that contents from this file will override dataSourceName if you have set it from nix.

  # Content of the environment file
  DATA_SOURCE_NAME=postgresql://username:password@localhost:5432/postgres?sslmode=disable

Note that this file needs to be available on the host on which this exporter is running.

Type: null or path

Default

null

Example

"/root/prometheus-postgres-exporter.env"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.extraFlags

Extra commandline options to pass to the postgres exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.postgres.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9187"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.postgres.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9187 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.group

Group under which the postgres exporter shall be run.

Type: string

Default

"postgres-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9187

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.runAsLocalSuperUser

Whether to run the exporter as the local 'postgres' super user.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.postgres.user

User name under which the postgres exporter shall be run.

Type: string

Default

"postgres-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.enable

Whether to enable the prometheus process exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.extraFlags

Extra commandline options to pass to the process exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.process.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9256"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.process.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9256 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.group

Group under which the process exporter shall be run.

Type: string

Default

"process-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9256

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.settings.process_names

All settings expressed as an Nix attrset.

Check the official documentation for the corresponding YAML settings that can all be used here: https://github.com/ncabatoff/process-exporter

Type: list of anything

Default

[ ]

Example

[# Remove nix store path from process name{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.process.user

User name under which the process exporter shall be run.

Type: string

Default

"process-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.collectors.cluster

Collect PVE cluster info

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.collectors.config

Collect PVE onboot status

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.collectors.node

Collect PVE node info

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.collectors.resources

Collect PVE resources info

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.collectors.status

Collect Node/VM/CT status

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.collectors.version

Collect PVE version info

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.configFile

Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.

The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.

If both configFile and environmentFile are provided, the configFile option will be ignored.

Configuration reference: https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication

Type: null or path

Default

null

Example

"/etc/prometheus-pve-exporter/pve.yml"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.enable

Whether to enable the prometheus pve exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.environmentFile

Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.

The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.

Environment reference: https://github.com/prometheus-pve/prometheus-pve-exporter#authentication

Type: null or path

Default

null

Example

"/etc/prometheus-pve-exporter/pve.env"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.extraFlags

Extra commandline options to pass to the pve exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.pve.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9221"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.pve.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9221 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.group

Group under which the pve exporter shall be run.

Type: string

Default

"pve-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.package

The prometheus-pve-exporter package to use. Type: package

Default

pkgs.prometheus-pve-exporter

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9221

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.server.certFile

Path to a SSL certificate file for the server

Type: null or path

Default

null

Example

"/var/lib/prometheus-pve-exporter/full-chain.pem"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.server.keyFile

Path to a SSL private key file for the server

Type: null or path

Default

null

Example

"/var/lib/prometheus-pve-exporter/privkey.key"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.pve.user

User name under which the pve exporter shall be run.

Type: string

Default

"pve-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.deviceHostname

The hostname of the air purification device from which to scrape the metrics.

Type: string

Example

"192.168.1.123"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.enable

Whether to enable the prometheus py-air-control exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.extraFlags

Extra commandline options to pass to the py-air-control exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.py-air-control.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9896"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.py-air-control.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9896 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.group

Group under which the py-air-control exporter shall be run.

Type: string

Default

"py-air-control-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9896

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.protocol

The protocol to use when communicating with the air purification device. Available: [http, coap, plain_coap]

Type: string

Default

"http"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.stateDir

Directory below /var/lib to store runtime data. This directory will be created automatically using systemd's StateDirectory mechanism.

Type: string

Default

"prometheus-py-air-control-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.py-air-control.user

User name under which the py-air-control exporter shall be run.

Type: string

Default

"py-air-control-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.enable

Whether to enable the prometheus redis exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.extraFlags

Extra commandline options to pass to the redis exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.redis.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9121"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.redis.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9121 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.group

Group under which the redis exporter shall be run.

Type: string

Default

"redis-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9121

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.redis.user

User name under which the redis exporter shall be run.

Type: string

Default

"redis-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.enable

Whether to enable the prometheus restic exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.environmentFile

File containing the credentials to access the repository, in the format of an EnvironmentFile as described by systemd.exec(5)

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.extraFlags

Extra commandline options to pass to the restic exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.restic.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9753"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.restic.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9753 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.group

Group under which the restic exporter shall be run.

Type: string

Default

"restic-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.passwordFile

File containing the password to the repository.

Type: path

Example

"/etc/nixos/restic-password"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9753

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.rcloneConfig

Configuration for the rclone remote being used for backup. See the remote's specific options under rclone's docs at https://rclone.org/docs/. When specifying option names, use the "config" name specified in the docs. For example, to set --b2-hard-delete for a B2 remote, use hard_delete = true in the attribute set.

::: {.warning} Secrets set in here will be world-readable in the Nix store! Consider using the {option}rcloneConfigFile option instead to specify secret values separately. Note that options set here will override those set in the config file. :::

Type: attribute set of (string or boolean)

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.rcloneConfigFile

Path to the file containing rclone configuration. This file must contain configuration for the remote specified in this backup set and also must be readable by root.

::: {.caution} Options set in rcloneConfig will override those set in this file. :::

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.rcloneOptions

Options to pass to rclone to control its behavior. See https://rclone.org/docs/#options for available options. When specifying option names, strip the leading --. To set a flag such as --drive-use-trash, which does not take a value, set the value to the Boolean true.

Type: attribute set of (string or boolean)

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.refreshInterval

Refresh interval for the metrics in seconds. Computing the metrics is an expensive task, keep this value as high as possible.

Type: unsigned integer, meaning >=0

Default

60

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.repository

URI pointing to the repository to monitor.

Type: string

Example

"sftp:backup@192.168.1.100:/backups/example"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.restic.user

User name under which the restic exporter shall be run.

Type: string

Default

"restic-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.enable

Whether to enable the prometheus rspamd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.extraFlags

Extra commandline options to pass to the rspamd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.extraLabels

Set of labels added to each metric. Type: attribute set of string

Default

{ host = config.networking.hostName; }

Example

{host = config.networking.hostName;custom_label = "some_value";}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.rspamd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 7980"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.rspamd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 7980 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.group

Group under which the rspamd exporter shall be run.

Type: string

Default

"rspamd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

7980

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rspamd.user

User name under which the rspamd exporter shall be run.

Type: string

Default

"rspamd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.channels

List of channel matchers to export.

Type: list of (submodule)

Default

[ ]

Example

[{channel = 6543;location = "Kitchen";name = "Acurite";}]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.channels.*.channel

Channel to match. Type: signed integer

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.channels.*.location

Location to match. Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.channels.*.name

Name to match. Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.enable

Whether to enable the prometheus rtl_433 exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.extraFlags

Extra commandline options to pass to the rtl_433 exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.rtl_433.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9550"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.rtl_433.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9550 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.group

Group under which the rtl_433 exporter shall be run.

Type: string

Default

"rtl_433-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.ids

List of ID matchers to export.

Type: list of (submodule)

Default

[ ]

Example

[{id = 1;location = "Bedroom";name = "Nexus";}]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.ids.*.id

ID to match. Type: signed integer

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.ids.*.location

Location to match. Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.ids.*.name

Name to match. Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9550

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.rtl433Flags

Flags passed verbatim to rtl_433 binary. Having -C si (the default) is recommended since only Celsius temperatures are parsed.

Type: string

Default

"-C si"

Example

"-C si -R 19"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.rtl_433.user

User name under which the rtl_433 exporter shall be run.

Type: string

Default

"rtl_433-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.enable

Whether to enable the prometheus sabnzbd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.extraFlags

Extra commandline options to pass to the sabnzbd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.sabnzbd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9387"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.sabnzbd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9387 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.group

Group under which the sabnzbd exporter shall be run.

Type: string

Default

"sabnzbd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9387

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.servers

List of sabnzbd servers to connect to. Type: list of (submodule)

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile

The path to a file containing the API key. The file is securely passed to the service by leveraging systemd credentials. No special permissions need to be set on this file.

Type: string

Example

"/run/secrets/sabnzbd_apikey"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.servers.*.baseUrl

Base URL of the sabnzbd server. Type: string

Example

"http://localhost:8080/sabnzbd"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sabnzbd.user

User name under which the sabnzbd exporter shall be run.

Type: string

Default

"sabnzbd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.enable

Whether to enable the prometheus scaphandre exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.extraFlags

Extra commandline options to pass to the scaphandre exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.scaphandre.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 8080"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.scaphandre.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 8080 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.group

Group under which the scaphandre exporter shall be run.

Type: string

Default

"scaphandre-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

8080

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.scaphandre.user

User name under which the scaphandre exporter shall be run.

Type: string

Default

"scaphandre-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.enable

Whether to enable the prometheus script exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.extraFlags

Extra commandline options to pass to the script exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.script.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9172"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.script.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9172 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.group

Group under which the script exporter shall be run.

Type: string

Default

"script-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9172

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.settings.scripts

All settings expressed as an Nix attrset.

Check the official documentation for the corresponding YAML settings that can all be used here: https://github.com/adhocteam/script_exporter#sample-configuration

Type: list of (submodule)

Example

{scripts = [{ name = "sleep"; script = "sleep 5"; }];}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.settings.scripts.*.name

Name of the script. Type: string

Example

"sleep"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.settings.scripts.*.script

Shell script to execute when metrics are requested. Type: string

Example

"sleep 5"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.settings.scripts.*.timeout

Optional timeout for the script in seconds. Type: null or signed integer

Default

null

Example

60

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.script.user

User name under which the script exporter shall be run.

Type: string

Default

"script-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.enable

Whether to enable the prometheus shelly exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.extraFlags

Extra commandline options to pass to the shelly exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.shelly.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9784"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.shelly.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9784 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.group

Group under which the shelly exporter shall be run.

Type: string

Default

"shelly-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.metrics-file

Path to the JSON file with the metric definitions

Type: path

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9784

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.shelly.user

User name under which the shelly exporter shall be run.

Type: string

Default

"shelly-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.devices

Paths to the disks that will be monitored. Will autodiscover all disks if none given.

Type: list of string

Default

[ ]

Example

[ "/dev/sda", "/dev/nvme0n1" ];

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.enable

Whether to enable the prometheus smartctl exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.extraFlags

Extra commandline options to pass to the smartctl exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.smartctl.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9633"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.smartctl.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9633 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.group

Group under which the smartctl exporter shall be run.

Type: string

Default

"smartctl-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.maxInterval

Interval that limits how often a disk can be queried.

Type: string

Default

"60s"

Example

"2m"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9633

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smartctl.user

User name under which the smartctl exporter shall be run.

Type: string

Default

"smartctl-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.buckets

List of buckets to use for the response duration histogram.

Type: strings concatenated with ","

Default

"5e-05,0.0001,0.0002,0.0004,0.0008,0.0016,0.0032,0.0064,0.0128,0.0256,0.0512,0.1024,0.2048,0.4096,0.8192,1.6384,3.2768,6.5536,13.1072,26.2144"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.enable

Whether to enable the prometheus smokeping exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.extraFlags

Extra commandline options to pass to the smokeping exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.smokeping.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9374"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.smokeping.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9374 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.group

Group under which the smokeping exporter shall be run.

Type: string

Default

"smokeping-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.hosts

List of endpoints to probe.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.pingInterval

Interval between pings.

Type: Go duration (https://golang.org/pkg/time/#ParseDuration)

Default

"1s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9374

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.smokeping.user

User name under which the smokeping exporter shall be run.

Type: string

Default

"smokeping-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.configuration

Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.

Type: null or (attribute set)

Default

null

Example

{auths = {public_v2 = {community = "public";version = 2;};};}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.configurationPath

Path to a snmp exporter configuration file. Mutually exclusive with 'configuration' option.

Type: null or path

Default

null

Example

./snmp.yml

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.enable

Whether to enable the prometheus snmp exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.enableConfigCheck

Whether to run a correctness check for the configuration file. This depends on the configuration file residing in the nix-store. Paths passed as string will be copied to the store.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.environmentFile

EnvironmentFile as defined in {manpage}systemd.exec(5).

Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.

Environment variables from this file will be interpolated into the config file using envsubst with this syntax: $ENVIRONMENT ${VARIABLE}

For variables to use see Prometheus Configuration.

If the file path is set to this option, the parameter --config.expand-environment-variables is implicitly added to ExecStart.

Note that this file needs to be available on the host on which this exporter is running.

Type: null or path

Default

null

Example

"/root/prometheus-snmp-exporter.env"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.extraFlags

Extra commandline options to pass to the snmp exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.snmp.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9116"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.snmp.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9116 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.group

Group under which the snmp exporter shall be run.

Type: string

Default

"snmp-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.logFormat

Output format of log messages.

Type: one of "logfmt", "json"

Default

"logfmt"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.logLevel

Only log messages with the given severity or above.

Type: one of "debug", "info", "warn", "error"

Default

"info"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9116

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.snmp.user

User name under which the snmp exporter shall be run.

Type: string

Default

"snmp-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configFile

Path to configuration file.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration

Exporter configuration as nix attribute set. Mutually exclusive with 'configFile' option.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs

An attrset of metrics scraping jobs to run. Type: attribute set of (submodule)

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.connections

A list of connection strings of the SQL servers to scrape metrics from Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.interval

How often to run this job, specified in Go duration format.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.queries

SQL queries to run. Type: attribute set of (submodule)

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help

A human-readable description of this metric. Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels

A set of columns that will be used as Prometheus labels. Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query

The SQL query to run. Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values

A set of columns that will be used as values of this metric. Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql

A list of SQL statements to execute once after making a connection. Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.enable

Whether to enable the prometheus sql exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.extraFlags

Extra commandline options to pass to the sql exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.sql.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9237"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.sql.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9237 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.group

Group under which the sql exporter shall be run.

Type: string

Default

"sql-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9237

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.sql.user

User name under which the sql exporter shall be run.

Type: string

Default

"sql-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.enable

Whether to enable the prometheus statsd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.extraFlags

Extra commandline options to pass to the statsd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.statsd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9102"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.statsd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9102 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.group

Group under which the statsd exporter shall be run.

Type: string

Default

"statsd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9102

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.statsd.user

User name under which the statsd exporter shall be run.

Type: string

Default

"statsd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.enable

Whether to enable the prometheus surfboard exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.extraFlags

Extra commandline options to pass to the surfboard exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.surfboard.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9239"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.surfboard.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9239 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.group

Group under which the surfboard exporter shall be run.

Type: string

Default

"surfboard-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.modemAddress

The hostname or IP of the cable modem.

Type: string

Default

"192.168.100.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9239

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.surfboard.user

User name under which the surfboard exporter shall be run.

Type: string

Default

"surfboard-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.enable

Whether to enable the prometheus systemd exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.extraFlags

Extra commandline options to pass to the systemd exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.systemd.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9558"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.systemd.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9558 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.group

Group under which the systemd exporter shall be run.

Type: string

Default

"systemd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9558

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.systemd.user

User name under which the systemd exporter shall be run.

Type: string

Default

"systemd-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.enable

Whether to enable the prometheus tor exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.extraFlags

Extra commandline options to pass to the tor exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.tor.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9130"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.tor.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9130 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.group

Group under which the tor exporter shall be run.

Type: string

Default

"tor-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9130

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.torControlAddress

Tor control IP address or hostname.

Type: string

Default

"127.0.0.1"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.torControlPort

Tor control port.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9051

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.tor.user

User name under which the tor exporter shall be run.

Type: string

Default

"tor-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.enable

Whether to enable the prometheus unbound exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.extraFlags

Extra commandline options to pass to the unbound exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.unbound.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9167"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.unbound.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9167 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.group

Group under which the unbound exporter shall be run.

Type: string

Default

"unbound-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9167

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.unbound.ca

Path to the Unbound server certificate authority

Type: null or path

Default

"/var/lib/unbound/unbound_server.pem"

Example

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.unbound.certificate

Path to the Unbound control socket certificate

Type: null or path

Default

"/var/lib/unbound/unbound_control.pem"

Example

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.unbound.host

Path to the unbound control socket. Supports unix domain sockets, as well as the TCP interface.

Type: string

Default

"tcp://127.0.0.1:8953"

Example

"unix:///run/unbound/unbound.socket"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.unbound.key

Path to the Unbound control socket key.

Type: null or path

Default

"/var/lib/unbound/unbound_control.key"

Example

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unbound.user

User name under which the unbound exporter shall be run.

Type: string

Default

"unbound-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.enable

Whether to enable the prometheus unifi exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.extraFlags

Extra commandline options to pass to the unifi exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.unifi.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9130"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.unifi.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9130 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.group

Group under which the unifi exporter shall be run.

Type: string

Default

"unifi-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9130

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.unifiAddress

URL of the UniFi Controller API.

Type: string

Example

"https://10.0.0.1:8443"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.unifiInsecure

If enabled skip the verification of the TLS certificate of the UniFi Controller API. Use with caution.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.unifiPassword

Password for authentication against UniFi Controller API.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.unifiTimeout

Timeout including unit for UniFi Controller API requests.

Type: string

Default

"5s"

Example

"2m"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.unifiUsername

username for authentication against UniFi Controller API.

Type: string

Example

"ReadOnlyUser"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unifi.user

User name under which the unifi exporter shall be run.

Type: string

Default

"unifi-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.controllers

List of Unifi controllers to poll. Use defaults if empty.

Type: list of (submodule)

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.controllers.*.hash_pii

Hash, with md5, client names and MAC addresses. This attempts to protect personally identifiable information.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.pass

Path of a file containing the password for the unifi service user. This file needs to be readable by the unifi-poller user.

Type: path

Default

unpoller-unifi-default.password

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.save_alarms

Collect and save data from UniFi alarms to influxdb and Loki.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.save_anomalies

Collect and save data from UniFi anomalies to influxdb and Loki.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.save_dpi

Collect and save data from deep packet inspection. Adds around 150 data points and impacts performance.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.save_events

Collect and save data from UniFi events to influxdb and Loki.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.save_ids

Collect and save data from the intrusion detection system to influxdb and Loki.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.save_sites

Collect and save site data.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.sites

List of site names for which statistics should be exported. Or the string "default" for the default site or the string "all" for all sites.

Type: one of "default", "all" or list of string

Default

"all"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.url

URL of the Unifi controller.

Type: string

Default

"https://unifi:8443"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.user

Unifi service user name.

Type: string

Default

"unifi"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.controllers.*.verify_ssl

Verify the Unifi controller's certificate.

Type: boolean

Default

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix

services.prometheus.exporters.unpoller.enable

Whether to enable the prometheus unpoller exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.extraFlags

Extra commandline options to pass to the unpoller exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.unpoller.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9130"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.unpoller.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9130 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.group

Group under which the unpoller exporter shall be run.

Type: string

Default

"unpoller-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.log.debug

Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.log.prometheusErrors

Whether to enable emitting errors to prometheus. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.log.quiet

Whether to enable startup and error logs only. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.interval

How often the events are polled and pushed to Loki.

Type: string

Default

"2m"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.pass

Path of a file containing the password for Loki. This file needs to be readable by the unifi-poller user.

Type: path

Default

"unpoller-influxdb-default.password"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.tenant_id

Tenant ID to use in Loki.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.timeout

Should be increased in case of timeout errors.

Type: string

Default

"10s"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.url

URL of the Loki host.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.user

Username for Loki.

Type: string

Default

""

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.loki.verify_ssl

Verify Loki's certificate.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9130

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.unpoller.user

User name under which the unpoller exporter shall be run.

Type: string

Default

"unpoller-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.enable

Whether to enable the prometheus v2ray exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.extraFlags

Extra commandline options to pass to the v2ray exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.v2ray.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9299"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.v2ray.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9299 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.group

Group under which the v2ray exporter shall be run.

Type: string

Default

"v2ray-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9299

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.user

User name under which the v2ray exporter shall be run.

Type: string

Default

"v2ray-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.v2ray.v2rayEndpoint

v2ray grpc api endpoint

Type: string

Default

"127.0.0.1:54321"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.enable

Whether to enable the prometheus varnish exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.extraFlags

Extra commandline options to pass to the varnish exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.varnish.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9131"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.varnish.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9131 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.group

Group under which the varnish exporter shall be run.

Type: string

Default

"varnish-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.healthPath

Path under which to expose healthcheck. Disabled unless configured.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.instance

varnishstat -n value.

Type: null or string

Default

config.services.varnish.stateDir

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.noExit

Do not exit server on Varnish scrape errors.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9131

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.raw

Enable raw stdout logging without timestamps.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.user

User name under which the varnish exporter shall be run.

Type: string

Default

"varnish-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.varnishStatPath

Path to varnishstat.

Type: string

Default

"varnishstat"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.verbose

Enable verbose logging.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.varnish.withGoMetrics

Export go runtime and http handler metrics.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.enable

Whether to enable the prometheus wireguard exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.extraFlags

Extra commandline options to pass to the wireguard exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.wireguard.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9586"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.wireguard.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9586 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.group

Group under which the wireguard exporter shall be run.

Type: string

Default

"wireguard-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9586

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.singleSubnetPerField

By default, all allowed IPs and subnets are comma-separated in the allowed_ips field. With this option enabled, a single IP and subnet will be listed in fields like allowed_ip_0, allowed_ip_1 and so on.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.user

User name under which the wireguard exporter shall be run.

Type: string

Default

"wireguard-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.verbose

Whether to enable verbose logging mode for prometheus-wireguard-exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.wireguardConfig

Path to the Wireguard Config to add the peer's name to the stats of a peer.

Please note that networking.wg-quick is required for this feature as networking.wireguard uses {manpage}wg(8) to set the peers up.

Type: null or path or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.wireguard.withRemoteIp

Whether or not the remote IP of a WireGuard peer should be exposed via prometheus.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.enable

Whether to enable the prometheus zfs exporter. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.extraFlags

Extra commandline options to pass to the zfs exporter.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.firewallFilter

Specify a filter for iptables to use when {option}services.prometheus.exporters.zfs.openFirewall is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept.

Type: null or string

Default

null

Example

"-i eth0 -p tcp -m tcp --dport 9134"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.firewallRules

Specify rules for nftables to add to the input chain when {option}services.prometheus.exporters.zfs.openFirewall is true.

Type: null or strings concatenated with "\n"

Default

null

Example

iifname "eth0" tcp dport 9134 counter accept

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.group

Group under which the zfs exporter shall be run.

Type: string

Default

"zfs-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.listenAddress

Address to listen on.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.openFirewall

Open port in firewall for incoming connections.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.pools

Name of the pool(s) to collect, repeat for multiple pools (default: all pools).

Type: null or (list of string)

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9134

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.telemetryPath

Path under which to expose metrics.

Type: string

Default

"/metrics"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.exporters.zfs.user

User name under which the zfs exporter shall be run.

Type: string

Default

"zfs-exporter"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix

services.prometheus.extraFlags

Extra commandline options when launching Prometheus.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.globalConfig

Parameters that are valid in all configuration contexts. They also serve as defaults for other configuration sections

Type: submodule

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.globalConfig.evaluation_interval

How frequently to evaluate rules by default.

Defaults to 1m in prometheus when set to null.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.globalConfig.external_labels

The labels to add to any time series or alerts when communicating with external systems (federation, remote storage, Alertmanager).

Type: null or (attribute set of string)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.globalConfig.query_log_file

Path to the file prometheus should write its query log to.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.globalConfig.scrape_interval

How frequently to scrape targets by default.

Defaults to 1m in prometheus when set to null.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.globalConfig.scrape_timeout

How long until a scrape request times out.

Defaults to 10s in prometheus when set to null.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.listenAddress

Address to listen on for the web interface, API, and telemetry.

Type: string

Default

"0.0.0.0"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.package

The prometheus package to use. Type: package

Default

pkgs.prometheus

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.port

Port to listen on.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9090

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.pushgateway.enable

Whether to enable Prometheus Pushgateway. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.extraFlags

Extra commandline options when launching the Pushgateway.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.log.format

Set the log target and format.

null will default to logger:stderr.

Type: null or string

Default

null

Example

"logger:syslog?appname=bob&local=7"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.log.level

Only log messages with the given severity or above.

null will default to info.

Type: null or one of "debug", "info", "warn", "error", "fatal"

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.package

The prometheus-pushgateway package to use. Type: package

Default

pkgs.prometheus-pushgateway

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.persistMetrics

Whether to persist metrics to a file.

When enabled metrics will be saved to a file called metrics in the directory /var/lib/pushgateway. The directory below /var/lib can be set using {option}services.prometheus.pushgateway.stateDir.

Type: boolean

Default

false

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.persistence.interval

The minimum interval at which to write out the persistence file.

null will default to 5m.

Type: null or string

Default

null

Example

"10m"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.stateDir

Directory below /var/lib to store metrics.

This directory will be created automatically using systemd's StateDirectory mechanism when {option}services.prometheus.pushgateway.persistMetrics is enabled.

Type: string

Default

"pushgateway"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.web.external-url

The URL under which Pushgateway is externally reachable.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.web.listen-address

Address to listen on for the web interface, API and telemetry.

null will default to :9091.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.web.route-prefix

Prefix for the internal routes of web endpoints.

Defaults to the path of {option}services.prometheus.pushgateway.web.external-url.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.pushgateway.web.telemetry-path

Path under which to expose metrics.

null will default to /metrics.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix

services.prometheus.remoteRead

Parameters of the endpoints to query from. See the official documentation for more information.

Type: list of (submodule)

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.basic_auth

Sets the Authorization header on every remote read request with the configured username and password. password and password_file are mutually exclusive.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.basic_auth.password

HTTP password Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.basic_auth.password_file

HTTP password file Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.basic_auth.username

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.bearer_token

Sets the Authorization header on every remote read request with the configured bearer token. It is mutually exclusive with bearer_token_file.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.bearer_token_file

Sets the Authorization header on every remote read request with the bearer token read from the configured file. It is mutually exclusive with bearer_token.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.headers

Custom HTTP headers to be sent along with each remote read request. Be aware that headers that are set by Prometheus itself can't be overwritten.

Type: null or (attribute set of string)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.name

Name of the remote read config, which if specified must be unique among remote read configs. The name will be used in metrics and logging in place of a generated value to help users distinguish between remote read configs.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.proxy_url

Optional Proxy URL. Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.read_recent

Whether reads should be made for queries for time ranges that the local storage should have complete data for.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.remote_timeout

Timeout for requests to the remote read endpoint.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.required_matchers

An optional list of equality matchers which have to be present in a selector to query the remote read endpoint.

Type: null or (attribute set of string)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.tls_config

Configures the remote read request's TLS settings.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.tls_config.ca_file

CA certificate to validate API server certificate with.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.tls_config.cert_file

Certificate file for client cert authentication to the server.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.tls_config.insecure_skip_verify

Disable validation of the server certificate.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.tls_config.key_file

Key file for client cert authentication to the server.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.tls_config.server_name

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteRead.*.url

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite

Parameters of the endpoints to send samples to. See the official documentation for more information.

Type: list of (submodule)

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.basic_auth

Sets the Authorization header on every remote write request with the configured username and password. password and password_file are mutually exclusive.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.basic_auth.password

HTTP password Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.basic_auth.password_file

HTTP password file Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.basic_auth.username

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.bearer_token

Sets the Authorization header on every remote write request with the configured bearer token. It is mutually exclusive with bearer_token_file.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.bearer_token_file

Sets the Authorization header on every remote write request with the bearer token read from the configured file. It is mutually exclusive with bearer_token.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.headers

Custom HTTP headers to be sent along with each remote write request. Be aware that headers that are set by Prometheus itself can't be overwritten.

Type: null or (attribute set of string)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.metadata_config

Configures the sending of series metadata to remote storage. Metadata configuration is subject to change at any point or be removed in future releases.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.metadata_config.send

Whether metric metadata is sent to remote storage or not.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.metadata_config.send_interval

How frequently metric metadata is sent to remote storage.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.name

Name of the remote write config, which if specified must be unique among remote write configs. The name will be used in metrics and logging in place of a generated value to help users distinguish between remote write configs.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.proxy_url

Optional Proxy URL. Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config

Configures the queue used to write to remote storage.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.batch_send_deadline

Maximum time a sample will wait in buffer.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.capacity

Number of samples to buffer per shard before we block reading of more samples from the WAL. It is recommended to have enough capacity in each shard to buffer several requests to keep throughput up while processing occasional slow remote requests.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.max_backoff

Maximum retry delay.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.max_samples_per_send

Maximum number of samples per send.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.max_shards

Maximum number of shards, i.e. amount of concurrency.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.min_backoff

Initial retry delay. Gets doubled for every retry.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.queue_config.min_shards

Minimum number of shards, i.e. amount of concurrency.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.remote_timeout

Timeout for requests to the remote write endpoint.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.tls_config

Configures the remote write request's TLS settings.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.tls_config.ca_file

CA certificate to validate API server certificate with.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.tls_config.cert_file

Certificate file for client cert authentication to the server.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.tls_config.insecure_skip_verify

Disable validation of the server certificate.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.tls_config.key_file

Key file for client cert authentication to the server.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.tls_config.server_name

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.url

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs

List of remote write relabel configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.action {services-prometheus-remoteWrite--write_relabel_configs--action}

Action to perform based on regex matching.

Defaults to replace in prometheus when set to null.

Type: null or one of "replace", "lowercase", "uppercase", "keep", "drop", "hashmod", "labelmap", "labeldrop", "labelkeep"

Default {services-prometheus-remoteWrite--write_relabel_configs--action-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.modulus {services-prometheus-remoteWrite--write_relabel_configs--modulus}

Modulus to take of the hash of the source label values.

Type: null or signed integer

Default {services-prometheus-remoteWrite--write_relabel_configs--modulus-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.regex {services-prometheus-remoteWrite--write_relabel_configs--regex}

Regular expression against which the extracted value is matched.

Defaults to (.*) in prometheus when set to null.

Type: null or string

Default {services-prometheus-remoteWrite--write_relabel_configs--regex-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.replacement {services-prometheus-remoteWrite--write_relabel_configs--replacement}

Replacement value against which a regex replace is performed if the regular expression matches.

Defaults to $1 in prometheus when set to null.

Type: null or string

Default {services-prometheus-remoteWrite--write_relabel_configs--replacement-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.separator {services-prometheus-remoteWrite--write_relabel_configs--separator}

Separator placed between concatenated source label values.

Defaults to ; in prometheus when set to null.

Type: null or string

Default {services-prometheus-remoteWrite--write_relabel_configs--separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.source_labels {services-prometheus-remoteWrite--write_relabel_configs--source_labels}

The source labels select values from existing labels. Their content is concatenated using the configured separator and matched against the configured regular expression.

Type: null or (list of string)

Default {services-prometheus-remoteWrite--write_relabel_configs--source_labels-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.remoteWrite.*.write_relabel_configs.*.target_label {services-prometheus-remoteWrite--write_relabel_configs--target_label}

Label to which the resulting value is written in a replace action. It is mandatory for replace actions.

Type: null or string

Default {services-prometheus-remoteWrite--write_relabel_configs--target_label-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.retentionTime

How long to retain samples in storage.

Type: null or string

Default

null

Example

"15d"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.ruleFiles

Any additional rules files to include in this configuration.

Type: list of path

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.rules

Alerting and/or Recording rules to evaluate at runtime.

Type: list of string

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.sachet.address

The address Sachet will listen to.

Type: string

Default

"localhost"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix

services.prometheus.sachet.configuration

Sachet's configuration as a nix attribute set.

Type: null or (attribute set)

Default

null

Example

{providers = {twilio = {# environment variables gets expanded at runtimeaccount_sid = "$TWILIO_ACCOUNT";auth_token = "$TWILIO_TOKEN";};};templates = [ ./some-template.tmpl ];receivers = [{name = "pager";provider = "twilio";to = [ "+33123456789" ];text = "{{ template \"message\" . }}";}];}

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix

services.prometheus.sachet.enable

Whether to enable Sachet, an SMS alerting tool for the Prometheus Alertmanager. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix

services.prometheus.sachet.port

The port Sachet will listen to.

Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default

9876

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix

services.prometheus.scrapeConfigs

A list of scrape configurations.

Type: list of (submodule)

Default

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.authorization

Sets the Authorization header on every scrape request with the configured credentials.

Type: null or (attribute set)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs

List of Azure service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method {services-prometheus-scrapeConfigs--azure_sd_configs--authentication_method}

The authentication method, either OAuth or ManagedIdentity. See https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview

Defaults to OAuth in prometheus when set to null.

Type: null or one of "OAuth", "ManagedIdentity"

Default {services-prometheus-scrapeConfigs--azure_sd_configs--authentication_method-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_id {services-prometheus-scrapeConfigs--azure_sd_configs--client_id}

Optional client ID. Only required with authentication_method OAuth.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_secret {services-prometheus-scrapeConfigs--azure_sd_configs--client_secret}

Optional client secret. Only required with authentication_method OAuth.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment {services-prometheus-scrapeConfigs--azure_sd_configs--environment}

The Azure environment.

Defaults to AzurePublicCloud in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--environment-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--azure_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--azure_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port {services-prometheus-scrapeConfigs--azure_sd_configs--port}

The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--azure_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--azure_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--azure_sd_configs--refresh_interval}

Refresh interval to re-read the instance list.

Defaults to 300s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.subscription_id {services-prometheus-scrapeConfigs--azure_sd_configs--subscription_id}

The subscription ID.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tenant_id {services-prometheus-scrapeConfigs--azure_sd_configs--tenant_id}

Optional tenant ID. Only required with authentication_method OAuth.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tenant_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.basic_auth

Sets the Authorization header on every scrape request with the configured username and password. password and password_file are mutually exclusive.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.basic_auth.password

HTTP password Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.basic_auth.password_file

HTTP password file Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.basic_auth.username

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.bearer_token

Sets the Authorization header on every scrape request with the configured bearer token. It is mutually exclusive with {option}bearer_token_file.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.bearer_token_file

Sets the Authorization header on every scrape request with the bearer token read from the configured file. It is mutually exclusive with {option}bearer_token.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.body_size_limit

An uncompressed response body larger than this many bytes will cause the scrape to fail. 0 means no limit. Example: 100MB. This is an experimental feature, this behaviour could change or be removed in the future.

Defaults to 0 in prometheus when set to null.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs

List of Consul service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.allow_stale {services-prometheus-scrapeConfigs--consul_sd_configs--allow_stale}

Allow stale Consul results (see https://www.consul.io/api/index.html#consistency-modes).

Will reduce load on Consul.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--consul_sd_configs--allow_stale-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization {services-prometheus-scrapeConfigs--consul_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.datacenter {services-prometheus-scrapeConfigs--consul_sd_configs--datacenter}

Consul datacenter Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--datacenter-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--consul_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--consul_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.node_meta {services-prometheus-scrapeConfigs--consul_sd_configs--node_meta}

Node metadata used to filter nodes for a given service.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--node_meta-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.password {services-prometheus-scrapeConfigs--consul_sd_configs--password}

Consul password Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--consul_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--consul_sd_configs--refresh_interval}

The time after which the provided names are refreshed.

On large setup it might be a good idea to increase this value because the catalog will change all the time.

Defaults to 30s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.scheme {services-prometheus-scrapeConfigs--consul_sd_configs--scheme}

Consul scheme Defaults to http in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--scheme-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.server {services-prometheus-scrapeConfigs--consul_sd_configs--server}

Consul server to query.

Defaults to localhost:8500 in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--server-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.services {services-prometheus-scrapeConfigs--consul_sd_configs--services}

A list of services for which targets are retrieved.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--services-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tag_separator {services-prometheus-scrapeConfigs--consul_sd_configs--tag_separator}

The string by which Consul tags are joined into the tag label.

Defaults to , in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tag_separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tags {services-prometheus-scrapeConfigs--consul_sd_configs--tags}

An optional list of tags used to filter nodes for a given service. Services must contain all tags in the list.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tags-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config}

Configures the Consul request's TLS settings.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.token {services-prometheus-scrapeConfigs--consul_sd_configs--token}

Consul token Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--token-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username {services-prometheus-scrapeConfigs--consul_sd_configs--username}

Consul username Type: null or string

Default {services-prometheus-scrapeConfigs--consul_sd_configs--username-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs

List of DigitalOcean service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--digitalocean_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port {services-prometheus-scrapeConfigs--digitalocean_sd_configs--port}

The port to scrape metrics from.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--digitalocean_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--digitalocean_sd_configs--refresh_interval}

The time after which the droplets are refreshed.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dns_sd_configs

List of DNS service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names {services-prometheus-scrapeConfigs--dns_sd_configs--names}

A list of DNS SRV record names to be queried.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port {services-prometheus-scrapeConfigs--dns_sd_configs--port}

The port number used if the query type is not SRV.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--dns_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dns_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--dns_sd_configs--refresh_interval}

The time after which the provided names are refreshed.

Defaults to 30s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--dns_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dns_sd_configs.*.type {services-prometheus-scrapeConfigs--dns_sd_configs--type}

The type of DNS query to perform. One of SRV, A, or AAAA.

Defaults to SRV in prometheus when set to null.

Type: null or one of "SRV", "A", "AAAA"

Default {services-prometheus-scrapeConfigs--dns_sd_configs--type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs

List of Docker service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization {services-prometheus-scrapeConfigs--docker_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters {services-prometheus-scrapeConfigs--docker_sd_configs--filters}

Optional filters to limit the discovery process to a subset of available resources.

Type: null or (list of (submodule))

Default {services-prometheus-scrapeConfigs--docker_sd_configs--filters-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name {services-prometheus-scrapeConfigs--docker_sd_configs--filters-*-name}

Name of the filter. The available filters are listed in the upstream documentation: Services: https://docs.docker.com/engine/api/v1.40/#operation/ServiceList Tasks: https://docs.docker.com/engine/api/v1.40/#operation/TaskList Nodes: https://docs.docker.com/engine/api/v1.40/#operation/NodeList

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.values {services-prometheus-scrapeConfigs--docker_sd_configs--filters-*-values}

Value for the filter.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--docker_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--docker_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host {services-prometheus-scrapeConfigs--docker_sd_configs--host}

Address of the Docker daemon.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host_networking_host {services-prometheus-scrapeConfigs--docker_sd_configs--host_networking_host}

The host to use if the container is in host networking mode.

Defaults to localhost in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--host_networking_host-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port {services-prometheus-scrapeConfigs--docker_sd_configs--port}

The port to scrape metrics from, when role is nodes, and for discovered tasks and services that don't have published ports.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--docker_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--docker_sd_configs--refresh_interval}

The time after which the containers are refreshed.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs

List of Docker Swarm service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters}

Optional filters to limit the discovery process to a subset of available resources.

Type: null or (list of (submodule))

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters-*-name}

Name of the filter. The available filters are listed in the upstream documentation: Services: https://docs.docker.com/engine/api/v1.40/#operation/ServiceList Tasks: https://docs.docker.com/engine/api/v1.40/#operation/TaskList Nodes: https://docs.docker.com/engine/api/v1.40/#operation/NodeList

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.values {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters-*-values}

Value for the filter.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.host {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--host}

Address of the Docker daemon.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--port}

The port to scrape metrics from, when role is nodes, and for discovered tasks and services that don't have published ports.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--refresh_interval}

The time after which the containers are refreshed.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.role {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--role}

Role of the targets to retrieve. Must be services, tasks, or nodes.

Type: one of "services", "tasks", "nodes"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs

List of EC2 service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key {services-prometheus-scrapeConfigs--ec2_sd_configs--access_key}

The AWS API key id. If blank, the environment variable AWS_ACCESS_KEY_ID is used.

Type: null or string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--access_key-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint {services-prometheus-scrapeConfigs--ec2_sd_configs--endpoint}

Custom endpoint to be used.

Type: null or string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--endpoint-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters {services-prometheus-scrapeConfigs--ec2_sd_configs--filters}

Filters can be used optionally to filter the instance list by other criteria.

Type: null or (list of (submodule))

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--filters-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name {services-prometheus-scrapeConfigs--ec2_sd_configs--filters-*-name}

See this list for the available filters.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.values {services-prometheus-scrapeConfigs--ec2_sd_configs--filters-*-values}

Value of the filter.

Type: list of string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--filters-*-values-default}

[ ]

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port {services-prometheus-scrapeConfigs--ec2_sd_configs--port}

The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile {services-prometheus-scrapeConfigs--ec2_sd_configs--profile}

Named AWS profile used to connect to the API.

Type: null or string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--profile-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--ec2_sd_configs--refresh_interval}

Refresh interval to re-read the instance list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region {services-prometheus-scrapeConfigs--ec2_sd_configs--region}

The AWS Region. If blank, the region from the instance metadata is used.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn {services-prometheus-scrapeConfigs--ec2_sd_configs--role_arn}

AWS Role ARN, an alternative to using AWS API keys.

Type: null or string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--role_arn-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key {services-prometheus-scrapeConfigs--ec2_sd_configs--secret_key}

The AWS API key secret. If blank, the environment variable AWS_SECRET_ACCESS_KEY is used.

Type: null or string

Default {services-prometheus-scrapeConfigs--ec2_sd_configs--secret_key-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs

List of Eureka service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--eureka_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--eureka_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.server {services-prometheus-scrapeConfigs--eureka_sd_configs--server}

The URL to connect to the Eureka server.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.file_sd_configs

List of file service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.file_sd_configs.*.files {services-prometheus-scrapeConfigs--file_sd_configs--files}

Patterns for files from which target groups are extracted. Refer to the Prometheus documentation for permitted filename patterns and formats.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.file_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--file_sd_configs--refresh_interval}

Refresh interval to re-read the files.

Defaults to 5m in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--file_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs

List of Google Compute Engine service discovery configurations.

See the relevant Prometheus configuration docs for more detail.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter {services-prometheus-scrapeConfigs--gce_sd_configs--filter}

Filter can be used optionally to filter the instance list by other criteria Syntax of this filter string is described here in the filter query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.

Type: null or string

Default {services-prometheus-scrapeConfigs--gce_sd_configs--filter-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port {services-prometheus-scrapeConfigs--gce_sd_configs--port}

The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--gce_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs.*.project {services-prometheus-scrapeConfigs--gce_sd_configs--project}

The GCP Project.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--gce_sd_configs--refresh_interval}

Refresh interval to re-read the cloud instance list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--gce_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator {services-prometheus-scrapeConfigs--gce_sd_configs--tag_separator}

The tag separator used to separate concatenated GCE instance network tags.

See the GCP documentation on network tags for more information: https://cloud.google.com/vpc/docs/add-remove-network-tags

Defaults to , in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--gce_sd_configs--tag_separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.gce_sd_configs.*.zone {services-prometheus-scrapeConfigs--gce_sd_configs--zone}

The zone of the scrape targets. If you need multiple zones use multiple gce_sd_configs.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs

List of Hetzner service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--hetzner_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port {services-prometheus-scrapeConfigs--hetzner_sd_configs--port}

The port to scrape metrics from.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--hetzner_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--hetzner_sd_configs--refresh_interval}

The time after which the servers are refreshed.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.role {services-prometheus-scrapeConfigs--hetzner_sd_configs--role}

The Hetzner role of entities that should be discovered. One of robot or hcloud.

Type: one of "robot", "hcloud"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.honor_labels

Controls how Prometheus handles conflicts between labels that are already present in scraped data and labels that Prometheus would attach server-side ("job" and "instance" labels, manually configured target labels, and labels generated by service discovery implementations).

If honor_labels is set to "true", label conflicts are resolved by keeping label values from the scraped data and ignoring the conflicting server-side labels.

If honor_labels is set to "false", label conflicts are resolved by renaming conflicting labels in the scraped data to "exported_\<original-label>" (for example "exported_instance", "exported_job") and then attaching server-side labels. This is useful for use cases such as federation, where all labels specified in the target should be preserved.

Defaults to false in prometheus when set to null.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.honor_timestamps

honor_timestamps controls whether Prometheus respects the timestamps present in scraped data.

If honor_timestamps is set to true, the timestamps of the metrics exposed by the target will be used.

If honor_timestamps is set to false, the timestamps of the metrics exposed by the target will be ignored.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs

List of HTTP service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth}

Authentication information used to authenticate to the API server. password and password_file are mutually exclusive.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--http_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--http_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--http_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--http_sd_configs--refresh_interval}

Refresh interval to re-query the endpoint.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--http_sd_configs--tls_config}

Configures the scrape request's TLS settings.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.http_sd_configs.*.url {services-prometheus-scrapeConfigs--http_sd_configs--url}

URL from which the targets are fetched.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.job_name

The job name assigned to scraped metrics by default.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs

List of Kubernetes service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server {services-prometheus-scrapeConfigs--kubernetes_sd_configs--api_server}

The API server addresses. If left empty, Prometheus is assumed to run inside of the cluster and will discover API servers automatically and use the pod's CA certificate and bearer token file at /var/run/secrets/kubernetes.io/serviceaccount/.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--api_server-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--kubernetes_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.kubeconfig_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--kubeconfig_file}

Optional path to a kubeconfig file. Note that api_server and kube_config are mutually exclusive.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--kubeconfig_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces {services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces}

Optional namespace discovery. If omitted, all namespaces are used.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names {services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces-names}

Namespace name.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces-names-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--kubernetes_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.role {services-prometheus-scrapeConfigs--kubernetes_sd_configs--role}

The Kubernetes role of entities that should be discovered. One of endpoints, service, pod, node, or ingress.

Type: one of "endpoints", "service", "pod", "node", "ingress"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors}

Optional label and field selectors to limit the discovery process to a subset of available resources. See https://kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/ and https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ to learn more about the possible filters that can be used. Endpoints role supports pod, service and endpoints selectors, other roles only support selectors matching the role itself (e.g. node role can only contain node selectors).

Note: When making decision about using field/label selector make sure that this is the best approach - it will prevent Prometheus from reusing single list/watch for all scrape configs. This might result in a bigger load on the Kubernetes API, because per each selector combination there will be additional LIST/WATCH. On the other hand, if you just want to monitor small subset of pods in large cluster it's recommended to use selectors. Decision, if selectors should be used or not depends on the particular situation.

Type: null or (list of (submodule))

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.field {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-field}

Selector field

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-field-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.label {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-label}

Selector label

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-label-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.role {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-role}

Selector role

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs

List of Kuma service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.fetch_timeout {services-prometheus-scrapeConfigs--kuma_sd_configs--fetch_timeout}

The time after which the monitoring assignments are refreshed.

Defaults to 2m in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--fetch_timeout-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--kuma_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--kuma_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--kuma_sd_configs--refresh_interval}

The time to wait between polling update requests.

Defaults to 30s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.server {services-prometheus-scrapeConfigs--kuma_sd_configs--server}

Address of the Kuma Control Plane's MADS xDS server.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.label_limit

Per-scrape limit on number of labels that will be accepted for a sample. If more than this number of labels are present post metric-relabeling, the entire scrape will be treated as failed. 0 means no limit.

Defaults to 0 in prometheus when set to null.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.label_name_length_limit

Per-scrape limit on length of labels name that will be accepted for a sample. If a label name is longer than this number post metric-relabeling, the entire scrape will be treated as failed. 0 means no limit.

Defaults to 0 in prometheus when set to null.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.label_value_length_limit

Per-scrape limit on length of labels value that will be accepted for a sample. If a label value is longer than this number post metric-relabeling, the entire scrape will be treated as failed. 0 means no limit.

Defaults to 0 in prometheus when set to null.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs

List of Lightsail service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key {services-prometheus-scrapeConfigs--lightsail_sd_configs--access_key}

The AWS API keys. If blank, the environment variable AWS_ACCESS_KEY_ID is used.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--access_key-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.endpoint {services-prometheus-scrapeConfigs--lightsail_sd_configs--endpoint}

Custom endpoint to be used.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--endpoint-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port {services-prometheus-scrapeConfigs--lightsail_sd_configs--port}

The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile {services-prometheus-scrapeConfigs--lightsail_sd_configs--profile}

Named AWS profile used to connect to the API.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--profile-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--lightsail_sd_configs--refresh_interval}

Refresh interval to re-read the instance list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region {services-prometheus-scrapeConfigs--lightsail_sd_configs--region}

The AWS region. If blank, the region from the instance metadata is used.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--region-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.role_arn {services-prometheus-scrapeConfigs--lightsail_sd_configs--role_arn}

AWS Role ARN, an alternative to using AWS API keys.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--role_arn-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key {services-prometheus-scrapeConfigs--lightsail_sd_configs--secret_key}

The AWS API keys. If blank, the environment variable AWS_SECRET_ACCESS_KEY is used.

Type: null or string

Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--secret_key-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs

List of Linode service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization {services-prometheus-scrapeConfigs--linode_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--linode_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--linode_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port {services-prometheus-scrapeConfigs--linode_sd_configs--port}

The port to scrape metrics from.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--linode_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--linode_sd_configs--refresh_interval}

The time after which the linode instances are refreshed.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator {services-prometheus-scrapeConfigs--linode_sd_configs--tag_separator}

The string by which Linode Instance tags are joined into the tag label.

Defaults to , in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tag_separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs

List of Marathon service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token {services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token}

Optional authentication information for token-based authentication: https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token It is mutually exclusive with auth_token_file and other authentication mechanisms.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token_file {services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token_file}

Optional authentication information for token-based authentication: https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token It is mutually exclusive with auth_token and other authentication mechanisms.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--marathon_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--marathon_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--marathon_sd_configs--refresh_interval}

Polling interval.

Defaults to 30s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.servers {services-prometheus-scrapeConfigs--marathon_sd_configs--servers}

List of URLs to be used to contact Marathon servers. You need to provide at least one server URL.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs

List of metric relabel configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.action {services-prometheus-scrapeConfigs--metric_relabel_configs--action}

Action to perform based on regex matching.

Defaults to replace in prometheus when set to null.

Type: null or one of "replace", "lowercase", "uppercase", "keep", "drop", "hashmod", "labelmap", "labeldrop", "labelkeep"

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--action-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.modulus {services-prometheus-scrapeConfigs--metric_relabel_configs--modulus}

Modulus to take of the hash of the source label values.

Type: null or signed integer

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--modulus-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.regex {services-prometheus-scrapeConfigs--metric_relabel_configs--regex}

Regular expression against which the extracted value is matched.

Defaults to (.*) in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--regex-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.replacement {services-prometheus-scrapeConfigs--metric_relabel_configs--replacement}

Replacement value against which a regex replace is performed if the regular expression matches.

Defaults to $1 in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--replacement-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.separator {services-prometheus-scrapeConfigs--metric_relabel_configs--separator}

Separator placed between concatenated source label values.

Defaults to ; in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.source_labels {services-prometheus-scrapeConfigs--metric_relabel_configs--source_labels}

The source labels select values from existing labels. Their content is concatenated using the configured separator and matched against the configured regular expression.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--source_labels-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.target_label {services-prometheus-scrapeConfigs--metric_relabel_configs--target_label}

Label to which the resulting value is written in a replace action. It is mandatory for replace actions.

Type: null or string

Default {services-prometheus-scrapeConfigs--metric_relabel_configs--target_label-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.metrics_path

The HTTP resource path on which to fetch metrics from targets.

Defaults to /metrics in prometheus when set to null.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.nerve_sd_configs

List of AirBnB's Nerve service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.paths {services-prometheus-scrapeConfigs--nerve_sd_configs--paths}

Paths can point to a single service, or the root of a tree of services.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.servers {services-prometheus-scrapeConfigs--nerve_sd_configs--servers}

The Zookeeper servers.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.timeout {services-prometheus-scrapeConfigs--nerve_sd_configs--timeout}

Timeout value.

Defaults to 10s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--nerve_sd_configs--timeout-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs

List of OpenStack service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants {services-prometheus-scrapeConfigs--openstack_sd_configs--all_tenants}

Whether the service discovery should list all instances for all projects. It is only relevant for the 'instance' role and usually requires admin permissions.

Defaults to false in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--all_tenants-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_id}

The application_credential_id or application_credential_name fields are required if using an application credential to authenticate. Some providers allow you to create an application credential to authenticate rather than a password.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_name}

The application_credential_id or application_credential_name fields are required if using an application credential to authenticate. Some providers allow you to create an application credential to authenticate rather than a password.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_secret}

The application_credential_secret field is required if using an application credential to authenticate.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.availability {services-prometheus-scrapeConfigs--openstack_sd_configs--availability}

The availability of the endpoint to connect to. Must be one of public, admin or internal.

Defaults to public in prometheus when set to null.

Type: null or one of "public", "admin", "internal"

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--availability-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id {services-prometheus-scrapeConfigs--openstack_sd_configs--domain_id}

At most one of domain_id and domain_name must be provided if using username with Identity V3. Otherwise, either are optional.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--domain_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name {services-prometheus-scrapeConfigs--openstack_sd_configs--domain_name}

At most one of domain_id and domain_name must be provided if using username with Identity V3. Otherwise, either are optional.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--domain_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.identity_endpoint {services-prometheus-scrapeConfigs--openstack_sd_configs--identity_endpoint}

identity_endpoint specifies the HTTP endpoint that is required to work with the Identity API of the appropriate version. While it's ultimately needed by all of the identity services, it will often be populated by a provider-level function.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--identity_endpoint-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password {services-prometheus-scrapeConfigs--openstack_sd_configs--password}

password for the Identity V2 and V3 APIs. Consult with your provider's control panel to discover your account's preferred method of authentication.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port {services-prometheus-scrapeConfigs--openstack_sd_configs--port}

The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id {services-prometheus-scrapeConfigs--openstack_sd_configs--project_id}

The project_id and project_name fields are optional for the Identity V2 API. Some providers allow you to specify a project_name instead of the project_id. Some require both. Your provider's authentication policies will determine how these fields influence authentication.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--project_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name {services-prometheus-scrapeConfigs--openstack_sd_configs--project_name}

The project_id and project_name fields are optional for the Identity V2 API. Some providers allow you to specify a project_name instead of the project_id. Some require both. Your provider's authentication policies will determine how these fields influence authentication.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--project_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--openstack_sd_configs--refresh_interval}

Refresh interval to re-read the instance list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.region {services-prometheus-scrapeConfigs--openstack_sd_configs--region}

The OpenStack Region.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.role {services-prometheus-scrapeConfigs--openstack_sd_configs--role}

The OpenStack role of entities that should be discovered.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid {services-prometheus-scrapeConfigs--openstack_sd_configs--userid}

username is required if using Identity V2 API. Consult with your provider's control panel to discover your account's username. In Identity V3, either userid or a combination of username and domain_id or domain_name are needed.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--userid-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username {services-prometheus-scrapeConfigs--openstack_sd_configs--username}

username is required if using Identity V2 API. Consult with your provider's control panel to discover your account's username. In Identity V3, either userid or a combination of username and domain_id or domain_name are needed.

Type: null or string

Default {services-prometheus-scrapeConfigs--openstack_sd_configs--username-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.params

Optional HTTP URL parameters.

Type: null or (attribute set of list of string)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.proxy_url

Optional proxy URL.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs

List of PuppetDB service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--puppetdb_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters {services-prometheus-scrapeConfigs--puppetdb_sd_configs--include_parameters}

Whether to include the parameters as meta labels. Due to the differences between parameter types and Prometheus labels, some parameters might not be rendered. The format of the parameters might also change in future releases.

Note: Enabling this exposes parameters in the Prometheus UI and API. Make sure that you don't have secrets exposed as parameters if you enable this.

Defaults to false in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--include_parameters-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port {services-prometheus-scrapeConfigs--puppetdb_sd_configs--port}

The port to scrape metrics from.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--puppetdb_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.query {services-prometheus-scrapeConfigs--puppetdb_sd_configs--query}

Puppet Query Language (PQL) query. Only resources are supported. https://puppet.com/docs/puppetdb/latest/api/query/v4/pql.html

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--puppetdb_sd_configs--refresh_interval}

Refresh interval to re-read the resources list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.url {services-prometheus-scrapeConfigs--puppetdb_sd_configs--url}

The URL of the PuppetDB root query endpoint.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs

List of relabel configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.action {services-prometheus-scrapeConfigs--relabel_configs--action}

Action to perform based on regex matching.

Defaults to replace in prometheus when set to null.

Type: null or one of "replace", "lowercase", "uppercase", "keep", "drop", "hashmod", "labelmap", "labeldrop", "labelkeep"

Default {services-prometheus-scrapeConfigs--relabel_configs--action-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus {services-prometheus-scrapeConfigs--relabel_configs--modulus}

Modulus to take of the hash of the source label values.

Type: null or signed integer

Default {services-prometheus-scrapeConfigs--relabel_configs--modulus-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.regex {services-prometheus-scrapeConfigs--relabel_configs--regex}

Regular expression against which the extracted value is matched.

Defaults to (.*) in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--relabel_configs--regex-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.replacement {services-prometheus-scrapeConfigs--relabel_configs--replacement}

Replacement value against which a regex replace is performed if the regular expression matches.

Defaults to $1 in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--relabel_configs--replacement-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.separator {services-prometheus-scrapeConfigs--relabel_configs--separator}

Separator placed between concatenated source label values.

Defaults to ; in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--relabel_configs--separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.source_labels {services-prometheus-scrapeConfigs--relabel_configs--source_labels}

The source labels select values from existing labels. Their content is concatenated using the configured separator and matched against the configured regular expression.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--relabel_configs--source_labels-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.relabel_configs.*.target_label {services-prometheus-scrapeConfigs--relabel_configs--target_label}

Label to which the resulting value is written in a replace action. It is mandatory for replace actions.

Type: null or string

Default {services-prometheus-scrapeConfigs--relabel_configs--target_label-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.sample_limit

Per-scrape limit on number of scraped samples that will be accepted. If more than this number of samples are present after metric relabelling the entire scrape will be treated as failed. 0 means no limit.

Defaults to 0 in prometheus when set to null.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs

List of Scaleway service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.access_key {services-prometheus-scrapeConfigs--scaleway_sd_configs--access_key}

Access key to use. https://console.scaleway.com/project/credentials

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.api_url {services-prometheus-scrapeConfigs--scaleway_sd_configs--api_url}

API URL to use when doing the server listing requests.

Defaults to https://api.scaleway.com in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--api_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--scaleway_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter {services-prometheus-scrapeConfigs--scaleway_sd_configs--name_filter}

Specify a name filter (works as a LIKE) to apply on the server listing request.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--name_filter-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port {services-prometheus-scrapeConfigs--scaleway_sd_configs--port}

The port to scrape metrics from.

Defaults to 80 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.project_id {services-prometheus-scrapeConfigs--scaleway_sd_configs--project_id}

Project ID of the targets.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--scaleway_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--scaleway_sd_configs--refresh_interval}

Refresh interval to re-read the managed targets list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role {services-prometheus-scrapeConfigs--scaleway_sd_configs--role}

Role of the targets to retrieve. Must be instance or baremetal.

Type: one of "instance", "baremetal"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key {services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key}

Secret key to use when listing targets. https://console.scaleway.com/project/credentials It is mutually exclusive with secret_key_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file {services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key_file}

Sets the secret key with the credentials read from the configured file. It is mutually exclusive with secret_key.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tags_filter {services-prometheus-scrapeConfigs--scaleway_sd_configs--tags_filter}

Specify a tag filter (a server needs to have all defined tags to be listed) to apply on the server listing request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tags_filter-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.zone {services-prometheus-scrapeConfigs--scaleway_sd_configs--zone}

Zone is the availability zone of your targets (e.g. fr-par-1).

Defaults to fr-par-1 in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--zone-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scheme

The URL scheme with which to fetch metrics from targets.

Defaults to http in prometheus when set to null.

Type: null or one of "http", "https"

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scrape_interval

How frequently to scrape targets from this job. Defaults to the globally configured default.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.scrape_timeout

Per-target timeout when scraping this job. Defaults to the globally configured default.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.serverset_sd_configs

List of Zookeeper Serverset service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.paths {services-prometheus-scrapeConfigs--serverset_sd_configs--paths}

Paths can point to a single service, or the root of a tree of services.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.servers {services-prometheus-scrapeConfigs--serverset_sd_configs--servers}

The Zookeeper servers.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.timeout {services-prometheus-scrapeConfigs--serverset_sd_configs--timeout}

Timeout value.

Defaults to 10s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--serverset_sd_configs--timeout-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.static_configs

List of labeled target groups for this job.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.static_configs.*.labels {services-prometheus-scrapeConfigs--static_configs--labels}

Labels assigned to all metrics scraped from the targets.

Type: attribute set of string

Default {services-prometheus-scrapeConfigs--static_configs--labels-default}

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.static_configs.*.targets {services-prometheus-scrapeConfigs--static_configs--targets}

The targets specified by the target group.

Type: list of string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.target_limit

Per-scrape config limit on number of unique targets that will be accepted. If more than this number of targets are present after target relabeling, Prometheus will mark the targets as failed without scraping them. 0 means no limit. This is an experimental feature, this behaviour could change in the future.

Defaults to 0 in prometheus when set to null.

Type: null or signed integer

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.tls_config

Configures the scrape request's TLS settings.

Type: null or (submodule)

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.tls_config.ca_file

CA certificate to validate API server certificate with.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.tls_config.cert_file

Certificate file for client cert authentication to the server.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.tls_config.insecure_skip_verify

Disable validation of the server certificate.

Type: null or boolean

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.tls_config.key_file

Key file for client cert authentication to the server.

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.tls_config.server_name

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs

List of Triton Serverset service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.account {services-prometheus-scrapeConfigs--triton_sd_configs--account}

The account to use for discovering new targets.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.dns_suffix {services-prometheus-scrapeConfigs--triton_sd_configs--dns_suffix}

The DNS suffix which should be applied to target.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.endpoint {services-prometheus-scrapeConfigs--triton_sd_configs--endpoint}

The Triton discovery endpoint (e.g. cmon.us-east-3b.triton.zone). This is often the same value as dns_suffix.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups {services-prometheus-scrapeConfigs--triton_sd_configs--groups}

A list of groups for which targets are retrieved, only supported when targeting the container role. If omitted all containers owned by the requesting account are scraped.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--triton_sd_configs--groups-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port {services-prometheus-scrapeConfigs--triton_sd_configs--port}

The port to use for discovery and metric scraping.

Defaults to 9163 in prometheus when set to null.

Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)

Default {services-prometheus-scrapeConfigs--triton_sd_configs--port-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--triton_sd_configs--refresh_interval}

The interval which should be used for refreshing targets.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--triton_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.role {services-prometheus-scrapeConfigs--triton_sd_configs--role}

The type of targets to discover, can be set to: - "container" to discover virtual machines (SmartOS zones, lx/KVM/bhyve branded zones) running on Triton - "cn" to discover compute nodes (servers/global zones) making up the Triton infrastructure

Defaults to container in prometheus when set to null.

Type: null or one of "container", "cn"

Default {services-prometheus-scrapeConfigs--triton_sd_configs--role-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.triton_sd_configs.*.version {services-prometheus-scrapeConfigs--triton_sd_configs--version}

The Triton discovery API version.

Defaults to 1 in prometheus when set to null.

Type: null or signed integer

Default {services-prometheus-scrapeConfigs--triton_sd_configs--version-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs

List of Uyuni Serverset service discovery configurations.

Type: null or (list of (submodule))

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization}

Optional Authorization header configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials}

Sets the credentials. It is mutually exclusive with credentials_file.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials_file}

Sets the credentials to the credentials read from the configured file. It is mutually exclusive with credentials.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-type}

Sets the authentication type.

Defaults to Bearer in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-type-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth}

Optional HTTP basic authentication information.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password}

HTTP password Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password_file}

HTTP password file Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-username}

HTTP username

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.entitlement {services-prometheus-scrapeConfigs--uyuni_sd_configs--entitlement}

The entitlement string to filter eligible systems.

Defaults to monitoring_entitled in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--entitlement-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.follow_redirects {services-prometheus-scrapeConfigs--uyuni_sd_configs--follow_redirects}

Configure whether HTTP requests follow HTTP 3xx redirects.

Defaults to true in prometheus when set to null.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--follow_redirects-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2 {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2}

Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_id {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_id}

OAuth client ID.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_id-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret}

OAuth client secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret_file {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret_file}

Read the client secret from a file. It is mutually exclusive with client_secret.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.endpoint_params {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-endpoint_params}

Optional parameters to append to the token URL.

Type: null or (attribute set of string)

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-endpoint_params-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-scopes}

Scopes for the token request.

Type: null or (list of string)

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-scopes-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.token_url {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-token_url}

The URL to fetch the token from.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-token_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password {services-prometheus-scrapeConfigs--uyuni_sd_configs--password}

Credentials are used to authenticate the requests to Uyuni API.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.proxy_url {services-prometheus-scrapeConfigs--uyuni_sd_configs--proxy_url}

Optional proxy URL.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--proxy_url-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.refresh_interval {services-prometheus-scrapeConfigs--uyuni_sd_configs--refresh_interval}

Refresh interval to re-read the managed targets list.

Defaults to 60s in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--refresh_interval-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator {services-prometheus-scrapeConfigs--uyuni_sd_configs--separator}

The string by which Uyuni group names are joined into the groups label

Defaults to , in prometheus when set to null.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--separator-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.server {services-prometheus-scrapeConfigs--uyuni_sd_configs--server}

The URL to connect to the Uyuni server.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config}

TLS configuration.

Type: null or (submodule)

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-ca_file}

CA certificate to validate API server certificate with.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-ca_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-cert_file}

Certificate file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-cert_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-insecure_skip_verify}

Disable validation of the server certificate.

Type: null or boolean

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-insecure_skip_verify-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-key_file}

Key file for client cert authentication to the server.

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-key_file-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-server_name}

ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1

Type: null or string

Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-server_name-default}

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username {services-prometheus-scrapeConfigs--uyuni_sd_configs--username}

Credentials are used to authenticate the requests to Uyuni API.

Type: string

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.stateDir

Directory below /var/lib to store Prometheus metrics data. This directory will be created automatically using systemd's StateDirectory mechanism.

Type: string

Default

"prometheus2"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.webConfigFile

Specifies which file should be used as web.config.file and be passed on startup. See https://prometheus.io/docs/prometheus/latest/configuration/https/ for valid options.

Type: null or path

Default

null

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.webExternalUrl

The URL under which Prometheus is externally reachable (for example, if Prometheus is served via a reverse proxy).

Type: null or string

Default

null

Example

"https://example.com/"

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix

services.prometheus.xmpp-alerts.enable

Whether to enable XMPP Web hook service for Alertmanager. Type: boolean

Default

false

Example

true

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/xmpp-alerts.nix

services.prometheus.xmpp-alerts.settings

Configuration for prometheus xmpp-alerts, see https://github.com/jelmer/prometheus-xmpp-alerts/blob/master/xmpp-alerts.yml.example for supported values.

Type: YAML value

Default

{ }

Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/xmpp-alerts.nix