Prometheus
services.prometheus.alertmanager.checkConfig
Check configuration with amtool check-config
. The call to amtool
is
subject to sandboxing by Nix.
If you use credentials stored in external files
(environmentFile
, etc),
they will not be visible to amtool
and it will report errors, despite a correct configuration.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.clusterPeers
Initial peers for HA cluster.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.configText
Alertmanager configuration as YAML text. If non-null, this option defines the text that is written to alertmanager.yml. If null, the contents of alertmanager.yml is generated from the structured config options.
Type: null or strings concatenated with "\n"
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.configuration
Alertmanager configuration as nix attribute set.
Type: null or (attribute set)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.enable
Whether to enable Prometheus Alertmanager.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.environmentFile
File to load as environment file. Environment variables
from this file will be interpolated into the config file
using envsubst with this syntax:
$ENVIRONMENT ${VARIABLE}
Type: null or path
Default
null
Example
"/root/alertmanager.env"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.extraFlags
Extra commandline options when launching the Alertmanager.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.listenAddress
Address to listen on for the web interface and API. Empty string will listen on all interfaces. "localhost" will listen on 127.0.0.1 (but not ::1).
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.logFormat
If set use a syslog logger or JSON logging.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.logLevel
Only log messages with the given severity or above.
Type: one of "debug", "info", "warn", "error", "fatal"
Default
"warn"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.package
The prometheus-alertmanager package to use.
Type: package
Default
pkgs.prometheus-alertmanager
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.port
Port to listen on for the web interface and API.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9093
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanager.webExternalUrl
The URL under which Alertmanager is externally reachable (for example, if Alertmanager is served via a reverse proxy). Used for generating relative and absolute links back to Alertmanager itself. If the URL has a path portion, it will be used to prefix all HTTP endoints served by Alertmanager. If omitted, relevant URL components will be derived automatically.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager.nix
services.prometheus.alertmanagerIrcRelay.enable
Whether to enable Alertmanager IRC Relay.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix
services.prometheus.alertmanagerIrcRelay.extraFlags
Extra command line options to pass to alertmanager-irc-relay.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix
services.prometheus.alertmanagerIrcRelay.package
The alertmanager-irc-relay package to use.
Type: package
Default
pkgs.alertmanager-irc-relay
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix
services.prometheus.alertmanagerIrcRelay.settings
Configuration for Alertmanager IRC Relay as a Nix attribute set. For a reference, check out the example configuration and the source code.
Note: The webhook's URL MUST point to the IRC channel where the message
should be posted. For #mychannel
from the example, this would be
http://localhost:8080/mychannel
.
Type: YAML value
Example
`#!nix { http_host = "localhost"; http_port = 8000;
irc_host = "irc.example.com"; irc_port = 7000; irc_nickname = "myalertbot";
irc_channels = [ { name = "#mychannel"; } ]; } `
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix
services.prometheus.alertmanagerNotificationQueueCapacity
The capacity of the queue for pending alert manager notifications.
Type: signed integer
Default
10000
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.alertmanagerWebhookLogger.enable
Whether to enable Alertmanager Webhook Logger.
Type: boolean
Default
false
Example
true
services.prometheus.alertmanagerWebhookLogger.extraFlags
Extra command line options to pass to alertmanager-webhook-logger.
Type: list of string
Default
[ ]
services.prometheus.alertmanagerWebhookLogger.package
The alertmanager-webhook-logger package to use.
Type: package
Default
pkgs.alertmanager-webhook-logger
services.prometheus.alertmanagers
A list of alertmanagers to send alerts to. See the official documentation for more information.
Type: list of (attribute set)
Default
[ ]
Example
[ {scheme = "https";path_prefix = "/alertmanager";static_configs = [ {targets = ["prometheus.domain.tld"];} ];} ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.checkConfig
Check configuration with promtool check
. The call to promtool
is
subject to sandboxing by Nix.
If you use credentials stored in external files
(password_file
, bearer_token_file
, etc),
they will not be visible to promtool
and it will report errors, despite a correct configuration.
To resolve this, you may set this option to "syntax-only"
in order to only syntax check the Prometheus configuration.
Type: boolean or value "syntax-only" (singular enum)
Default
true
Example
"syntax-only"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.configText
If non-null, this option defines the text that is written to prometheus.yml. If null, the contents of prometheus.yml is generated from the structured config options.
Type: null or strings concatenated with "\n"
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.enable
Whether to enable Prometheus monitoring daemon.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.enableAgentMode
Whether to enable agent mode.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.enableReload
Reload prometheus when configuration file changes (instead of restart).
The following property holds: switching to a configuration
(switch-to-configuration
) that changes the prometheus
configuration only finishes successfully when prometheus has finished
loading the new configuration.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.exporters
Prometheus exporter configuration
Type: submodule
Default
{ }
Example
{node = {enable = true;enabledCollectors = [ "systemd" ];};varnish.enable = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.apcupsdAddress
Address of the apcupsd Network Information Server (NIS).
Type: string
Default
":3551"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.apcupsdNetwork
Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".
Type: one of "tcp", "tcp4", "tcp6"
Default
"tcp"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.enable
Whether to enable the prometheus apcupsd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.extraFlags
Extra commandline options to pass to the apcupsd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.apcupsd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9162"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.apcupsd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9162 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.group
Group under which the apcupsd exporter shall be run.
Type: string
Default
"apcupsd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9162
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.apcupsd.user
User name under which the apcupsd exporter shall be run.
Type: string
Default
"apcupsd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.artiAccessToken
Access token for authentication against JFrog Artifactory API. One of the password or access token needs to be set.
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.artiPassword
Password for authentication against JFrog Artifactory API. One of the password or access token needs to be set.
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.artiUsername
Username for authentication against JFrog Artifactory API.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.enable
Whether to enable the prometheus artifactory exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.extraFlags
Extra commandline options to pass to the artifactory exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.artifactory.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9531"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.artifactory.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9531 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.group
Group under which the artifactory exporter shall be run.
Type: string
Default
"artifactory-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9531
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.scrapeUri
URI on which to scrape JFrog Artifactory.
Type: string
Default
"http://localhost:8081/artifactory"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.artifactory.user
User name under which the artifactory exporter shall be run.
Type: string
Default
"artifactory-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.bindGroups
List of statistics to collect. Available: [server, view, tasks]
Type: list of (one of "server", "view", "tasks")
Default
["server""view"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.bindTimeout
Timeout for trying to get stats from Bind.
Type: string
Default
"10s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.bindURI
HTTP XML API address of an Bind server.
Type: string
Default
"http://localhost:8053/"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.bindVersion
BIND statistics version. Can be detected automatically.
Type: one of "xml.v2", "xml.v3", "auto"
Default
"auto"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.enable
Whether to enable the prometheus bind exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.extraFlags
Extra commandline options to pass to the bind exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.bind.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9119"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.bind.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9119 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.group
Group under which the bind exporter shall be run.
Type: string
Default
"bind-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9119
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bind.user
User name under which the bind exporter shall be run.
Type: string
Default
"bind-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.birdSocket
Path to BIRD2 (or BIRD1 v4) socket.
Type: path
Default
"/run/bird/bird.ctl"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.birdVersion
Specifies whether BIRD1 or BIRD2 is in use.
Type: one of 1, 2
Default
2
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.enable
Whether to enable the prometheus bird exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.extraFlags
Extra commandline options to pass to the bird exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.bird.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9324"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.bird.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9324 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.group
Group under which the bird exporter shall be run.
Type: string
Default
"bird-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.newMetricFormat
Enable the new more-generic metric format.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9324
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bird.user
User name under which the bird exporter shall be run.
Type: string
Default
"bird-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.enable
Whether to enable the prometheus bitcoin exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.extraEnv
Extra environment variables for the exporter.
Type: attribute set of string
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.extraFlags
Extra commandline options to pass to the bitcoin exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.bitcoin.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9332"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.bitcoin.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9332 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.group
Group under which the bitcoin exporter shall be run.
Type: string
Default
"bitcoin-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.package
The prometheus-bitcoin-exporter package to use.
Type: package
Default
pkgs.prometheus-bitcoin-exporter
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9332
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.refreshSeconds
How often to ask bitcoind for metrics.
Type: unsigned integer, meaning >=0
Default
300
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.rpcHost
RPC host.
Type: string
Default
"localhost"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.rpcPasswordFile
File containing RPC password.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.rpcPort
RPC port number.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
8332
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.rpcScheme
Whether to connect to bitcoind over http or https.
Type: one of "http", "https"
Default
"http"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.rpcUser
RPC user name.
Type: string
Default
"bitcoinrpc"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.bitcoin.user
User name under which the bitcoin exporter shall be run.
Type: string
Default
"bitcoin-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.configFile
Path to configuration file.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.enable
Whether to enable the prometheus blackbox exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.enableConfigCheck
Whether to run a correctness check for the configuration file. This depends on the configuration file residing in the nix-store. Paths passed as string will be copied to the store.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.extraFlags
Extra commandline options to pass to the blackbox exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.blackbox.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9115"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.blackbox.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9115 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.group
Group under which the blackbox exporter shall be run.
Type: string
Default
"blackbox-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9115
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.blackbox.user
User name under which the blackbox exporter shall be run.
Type: string
Default
"blackbox-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.configFile
The path to the borgmatic config file
Type: path
Default
"/etc/borgmatic/config.yaml"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.enable
Whether to enable the prometheus borgmatic exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.extraFlags
Extra commandline options to pass to the borgmatic exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.borgmatic.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9996"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.borgmatic.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9996 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.group
Group under which the borgmatic exporter shall be run.
Type: string
Default
"borgmatic-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9996
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.borgmatic.user
User name under which the borgmatic exporter shall be run.
Type: string
Default
"borgmatic-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.enable
Whether to enable the prometheus buildkite-agent exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.endpoint
The Buildkite Agent API endpoint.
Type: string
Default
"https://agent.buildkite.com/v3"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.extraFlags
Extra commandline options to pass to the buildkite-agent exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.buildkite-agent.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9876"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.buildkite-agent.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9876 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.group
Group under which the buildkite-agent exporter shall be run.
Type: string
Default
"buildkite-agent-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.interval
How often to update metrics.
Type: string
Default
"30s"
Example
"1min"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9876
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.queues
Which specific queues to process.
Type: null or (list of string)
Default
null
Example
[ "my-queue1" "my-queue2" ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.tokenPath
The token from your Buildkite "Agents" page.
A run-time path to the token file, which is supposed to be provisioned outside of Nix store.
Type: null or path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.buildkite-agent.user
User name under which the buildkite-agent exporter shall be run.
Type: string
Default
"buildkite-agent-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.collectdBinary.authFile
File mapping user names to pre-shared keys (passwords).
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.collectdBinary.enable
Whether to enable collectd binary protocol receiver.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.collectdBinary.listenAddress
Address to listen on for binary network packets.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.collectdBinary.port
Network address on which to accept collectd binary network packets.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
25826
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.collectdBinary.securityLevel
Minimum required security level for accepted packets.
Type: one of "None", "Sign", "Encrypt"
Default
"None"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.enable
Whether to enable the prometheus collectd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.extraFlags
Extra commandline options to pass to the collectd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.collectd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9103"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.collectd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9103 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.group
Group under which the collectd exporter shall be run.
Type: string
Default
"collectd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.logFormat
Set the log format.
Type: one of "logfmt", "json"
Default
"logfmt"
Example
"json"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.logLevel
Only log messages with the given severity or above.
Type: one of "debug", "info", "warn", "error", "fatal"
Default
"info"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9103
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.collectd.user
User name under which the collectd exporter shall be run.
Type: string
Default
"collectd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.delugeHost
Hostname where deluge server is running.
Type: string
Default
"localhost"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.delugePassword
Password to connect to deluge server.
This stores the password unencrypted in the nix store and is thus considered unsafe. Prefer using the delugePasswordFile option.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.delugePasswordFile
File containing the password to connect to deluge server.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.delugePort
Port where deluge server is listening.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
58846
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.delugeUser
User to connect to deluge server.
Type: string
Default
"localclient"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.enable
Whether to enable the prometheus deluge exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.exportPerTorrentMetrics
Enable per-torrent metrics.
This may significantly increase the number of time series depending on the number of torrents in your Deluge instance.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.extraFlags
Extra commandline options to pass to the deluge exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.deluge.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9354"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.deluge.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9354 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.group
Group under which the deluge exporter shall be run.
Type: string
Default
"deluge-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9354
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.deluge.user
User name under which the deluge exporter shall be run.
Type: string
Default
"deluge-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.debug
Whether to declare enable --debug
.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.deduplicationMaxSeconds
How long individual report IDs will be remembered to avoid counting double delivered reports twice.
Type: unsigned integer, meaning >=0
Default
"7 days (in seconds)"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.enable
Whether to enable the prometheus dmarc exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.extraFlags
Extra commandline options to pass to the dmarc exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.dmarc.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9797"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.dmarc.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9797 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.folders.done
IMAP mailbox that successfully processed reports are moved to.
Type: string
Default
"Archive"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.folders.error
IMAP mailbox that emails are moved to that could not be processed.
Type: string
Default
"Invalid"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.folders.inbox
IMAP mailbox that is checked for incoming DMARC aggregate reports
Type: string
Default
"INBOX"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.group
Group under which the dmarc exporter shall be run.
Type: string
Default
"dmarc-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.imap.host
Hostname of IMAP server to connect to.
Type: string
Default
"localhost"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.imap.passwordFile
File containing the login password for the IMAP connection.
Type: string
Example
"/run/secrets/dovecot_pw"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.imap.port
Port of the IMAP server to connect to.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
993
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.imap.username
Login username for the IMAP connection.
Type: string
Example
"postmaster@example.org"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.pollIntervalSeconds
How often to poll the IMAP server in seconds.
Type: unsigned integer, meaning >=0
Default
60
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9797
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dmarc.user
User name under which the dmarc exporter shall be run.
Type: string
Default
"dmarc-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.dnsmasqListenAddress
Address on which dnsmasq listens.
Type: string
Default
"localhost:53"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.enable
Whether to enable the prometheus dnsmasq exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.extraFlags
Extra commandline options to pass to the dnsmasq exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.dnsmasq.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9153"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.dnsmasq.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9153 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.group
Group under which the dnsmasq exporter shall be run.
Type: string
Default
"dnsmasq-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.leasesPath
Path to the dnsmasq.leases
file.
Type: path
Default
"/var/lib/misc/dnsmasq.leases"
Example
"/var/lib/dnsmasq/dnsmasq.leases"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9153
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnsmasq.user
User name under which the dnsmasq exporter shall be run.
Type: string
Default
"dnsmasq-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.configuration
dnssec exporter configuration as nix attribute set.
See https://github.com/chrj/prometheus-dnssec-exporter/blob/master/README.md for the description of the configuration file format.
Type: null or (attribute set)
Default
null
Example
{records = [{zone = "ietf.org";record = "@";type = "SOA";}{zone = "verisigninc.com";record = "@";type = "SOA";}];}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.enable
Whether to enable the prometheus dnssec exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.extraFlags
Extra commandline options when launching Prometheus.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.dnssec.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9204"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.dnssec.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9204 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.group
Group under which the dnssec exporter shall be run.
Type: string
Default
"dnssec-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.listenAddress
Listen address as host IP and port definition.
Type: null or string
Default
null
Example
":9204"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9204
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.resolvers
DNSSEC capable resolver to be used for the check.
Type: list of string
Default
[ ]
Example
["0.0.0.0:53"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.timeout
DNS request timeout duration.
Type: null or string
Default
null
Example
"10s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dnssec.user
User name under which the dnssec exporter shall be run.
Type: string
Default
"dnssec-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.enable
Whether to enable the prometheus domain exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.extraFlags
Extra commandline options to pass to the domain exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.domain.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9222"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.domain.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9222 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.group
Group under which the domain exporter shall be run.
Type: string
Default
"domain-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9222
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.domain.user
User name under which the domain exporter shall be run.
Type: string
Default
"domain-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.enable
Whether to enable the prometheus dovecot exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.extraFlags
Extra commandline options to pass to the dovecot exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.dovecot.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9166"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.dovecot.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9166 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.group
Group under which the dovecot exporter shall be run.
Type: string
Default
"dovecot-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9166
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.scopes
Stats scopes to query.
Type: list of string
Default
["user"]
Example
["user""global"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.socketPath
Path under which the stats socket is placed. The user/group under which the exporter runs, should be able to access the socket in order to scrape the metrics successfully.
Please keep in mind that the stats module has changed in Dovecot 2.3+ which is not compatible with this exporter.
The following extra config has to be passed to Dovecot to ensure that recent versions work with this exporter:
{
services.prometheus.exporters.dovecot.enable = true;
services.prometheus.exporters.dovecot.socketPath = "/var/run/dovecot2/old-stats";
services.dovecot2.mailPlugins.globally.enable = [ "old_stats" ];
services.dovecot2.extraConfig = ''
service old-stats {
unix_listener old-stats {
user = dovecot-exporter
group = dovecot-exporter
mode = 0660
}
fifo_listener old-stats-mail {
mode = 0660
user = dovecot
group = dovecot
}
fifo_listener old-stats-user {
mode = 0660
user = dovecot
group = dovecot
}
}
plugin {
old_stats_refresh = 30 secs
old_stats_track_cmds = yes
}
'';
}
Type: path
Default
"/var/run/dovecot/stats"
Example
"/var/run/dovecot2/old-stats"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.dovecot.user
User name under which the dovecot exporter shall be run.
Type: string
Default
"dovecot-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.apiKeyFile
File containing the api-key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.enable
Whether to enable the prometheus exportarr-bazarr exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.environment
See the configuration guide for available options.
Type: attribute set of string
Default
{ }
Example
{PROWLARR__BACKFILL = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.extraFlags
Extra commandline options to pass to the exportarr-bazarr exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.exportarr-bazarr.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9708"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.exportarr-bazarr.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9708 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.group
Group under which the exportarr-bazarr exporter shall be run.
Type: string
Default
"exportarr-bazarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.package
The exportarr package to use.
Type: package
Default
pkgs.exportarr
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9708
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.url
The full URL to Sonarr, Radarr, or Lidarr.
Type: string
Default
"http://127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-bazarr.user
User name under which the exportarr-bazarr exporter shall be run.
Type: string
Default
"exportarr-bazarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.apiKeyFile
File containing the api-key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.enable
Whether to enable the prometheus exportarr-lidarr exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.environment
See the configuration guide for available options.
Type: attribute set of string
Default
{ }
Example
{PROWLARR__BACKFILL = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.extraFlags
Extra commandline options to pass to the exportarr-lidarr exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.exportarr-lidarr.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9708"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.exportarr-lidarr.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9708 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.group
Group under which the exportarr-lidarr exporter shall be run.
Type: string
Default
"exportarr-lidarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.package
The exportarr package to use.
Type: package
Default
pkgs.exportarr
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9708
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.url
The full URL to Sonarr, Radarr, or Lidarr.
Type: string
Default
"http://127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-lidarr.user
User name under which the exportarr-lidarr exporter shall be run.
Type: string
Default
"exportarr-lidarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.apiKeyFile
File containing the api-key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.enable
Whether to enable the prometheus exportarr-prowlarr exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.environment
See the configuration guide for available options.
Type: attribute set of string
Default
{ }
Example
{PROWLARR__BACKFILL = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.extraFlags
Extra commandline options to pass to the exportarr-prowlarr exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.exportarr-prowlarr.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9708"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.exportarr-prowlarr.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9708 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.group
Group under which the exportarr-prowlarr exporter shall be run.
Type: string
Default
"exportarr-prowlarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.package
The exportarr package to use.
Type: package
Default
pkgs.exportarr
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9708
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.url
The full URL to Sonarr, Radarr, or Lidarr.
Type: string
Default
"http://127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-prowlarr.user
User name under which the exportarr-prowlarr exporter shall be run.
Type: string
Default
"exportarr-prowlarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.apiKeyFile
File containing the api-key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.enable
Whether to enable the prometheus exportarr-radarr exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.environment
See the configuration guide for available options.
Type: attribute set of string
Default
{ }
Example
{PROWLARR__BACKFILL = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.extraFlags
Extra commandline options to pass to the exportarr-radarr exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.exportarr-radarr.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9708"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.exportarr-radarr.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9708 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.group
Group under which the exportarr-radarr exporter shall be run.
Type: string
Default
"exportarr-radarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.package
The exportarr package to use.
Type: package
Default
pkgs.exportarr
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9708
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.url
The full URL to Sonarr, Radarr, or Lidarr.
Type: string
Default
"http://127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-radarr.user
User name under which the exportarr-radarr exporter shall be run.
Type: string
Default
"exportarr-radarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.apiKeyFile
File containing the api-key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.enable
Whether to enable the prometheus exportarr-readarr exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.environment
See the configuration guide for available options.
Type: attribute set of string
Default
{ }
Example
{PROWLARR__BACKFILL = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.extraFlags
Extra commandline options to pass to the exportarr-readarr exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.exportarr-readarr.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9708"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.exportarr-readarr.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9708 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.group
Group under which the exportarr-readarr exporter shall be run.
Type: string
Default
"exportarr-readarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.package
The exportarr package to use.
Type: package
Default
pkgs.exportarr
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9708
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.url
The full URL to Sonarr, Radarr, or Lidarr.
Type: string
Default
"http://127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-readarr.user
User name under which the exportarr-readarr exporter shall be run.
Type: string
Default
"exportarr-readarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.apiKeyFile
File containing the api-key.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.enable
Whether to enable the prometheus exportarr-sonarr exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.environment
See the configuration guide for available options.
Type: attribute set of string
Default
{ }
Example
{PROWLARR__BACKFILL = true;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.extraFlags
Extra commandline options to pass to the exportarr-sonarr exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.exportarr-sonarr.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9708"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.exportarr-sonarr.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9708 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.group
Group under which the exportarr-sonarr exporter shall be run.
Type: string
Default
"exportarr-sonarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.package
The exportarr package to use.
Type: package
Default
pkgs.exportarr
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9708
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.url
The full URL to Sonarr, Radarr, or Lidarr.
Type: string
Default
"http://127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.exportarr-sonarr.user
User name under which the exportarr-sonarr exporter shall be run.
Type: string
Default
"exportarr-sonarr-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.configFile
Path to a fastly-exporter configuration file.
Example one can be generated with fastly-exporter --config-file-example
.
Type: null or path
Default
null
Example
"./fastly-exporter-config.txt"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.enable
Whether to enable the prometheus fastly exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.extraFlags
Extra commandline options to pass to the fastly exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.fastly.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9118"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.fastly.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9118 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.group
Group under which the fastly exporter shall be run.
Type: string
Default
"fastly-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9118
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.tokenPath
A run-time path to the token file, which is supposed to be provisioned outside of Nix store.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fastly.user
User name under which the fastly exporter shall be run.
Type: string
Default
"fastly-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.asn
The ASN being monitored.
Type: positive integer, meaning >0
Example
65542
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.brokers
List of Kafka brokers to connect to.
Type: list of string
Example
[ "kafka.example.org:19092" ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.enable
Whether to enable the prometheus flow exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.extraFlags
Extra commandline options to pass to the flow exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.flow.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9590"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.flow.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9590 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.group
Group under which the flow exporter shall be run.
Type: string
Default
"flow-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.partitions
The number of the partitions to consume, none means all.
Type: list of signed integer
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9590
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.topic
The Kafka topic to consume from.
Type: string
Example
"pmacct.acct"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.flow.user
User name under which the flow exporter shall be run.
Type: string
Default
"flow-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.enable
Whether to enable the prometheus fritz exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.extraFlags
Extra commandline options to pass to the fritz exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.fritz.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9787"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.fritz.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9787 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.group
Group under which the fritz exporter shall be run.
Type: string
Default
"fritz-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9787
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings
Configuration settings for fritz-exporter.
Type: YAML value
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.devices
Fritz!-devices to monitor using the exporter.
Type: list of (YAML value)
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.devices.*.host_info
Enable extended host info for this device. Warning: This will heavily increase scrape time.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.devices.*.hostname
Hostname under which the target device is reachable.
Type: string
Default
"fritz.box"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.devices.*.name
Name to use for the device.
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.devices.*.password_file
Path to a file which contains the password to authenticate with the target device. Needs to be readable by the user the exporter runs under.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.devices.*.username
Username to authenticate with the target device.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.settings.log_level
Log level to use for the exporter.
Type: one of "DEBUG", "INFO", "WARNING", "ERROR", "CRITICAL"
Default
"INFO"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritz.user
User name under which the fritz exporter shall be run.
Type: string
Default
"fritz-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.enable
Whether to enable the prometheus fritzbox exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.extraFlags
Extra commandline options to pass to the fritzbox exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.fritzbox.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9133"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.fritzbox.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9133 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.gatewayAddress
The hostname or IP of the FRITZ!Box.
Type: string
Default
"fritz.box"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.gatewayPort
The port of the FRITZ!Box UPnP service.
Type: signed integer
Default
49000
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.group
Group under which the fritzbox exporter shall be run.
Type: string
Default
"fritzbox-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9133
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.fritzbox.user
User name under which the fritzbox exporter shall be run.
Type: string
Default
"fritzbox-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.enable
Whether to enable the prometheus graphite exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.extraFlags
Extra commandline options to pass to the graphite exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.graphite.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9108"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.graphite.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9108 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.graphitePort
Port to use for the graphite server.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9109
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.group
Group under which the graphite exporter shall be run.
Type: string
Default
"graphite-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.mappingSettings
Mapping configuration for the exporter, see https://github.com/prometheus/graphite_exporter#yaml-config for available options.
Type: YAML value
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9108
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.graphite.user
User name under which the graphite exporter shall be run.
Type: string
Default
"graphite-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.configuration
Configuration for iDRAC exporter, as a nix attribute set.
Configuration reference: https://github.com/mrlhansen/idrac_exporter/#configuration
Mutually exclusive with configurationPath
option.
Type: null or (attribute set)
Default
null
Example
{hosts = {default = {password = "password";username = "username";};};metrics = {memory = true;power = true;sel = true;sensors = true;storage = true;system = true;};retries = 1;timeout = 10;}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.configurationPath
Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.
The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.
Mutually exclusive with configuration
option.
Configuration reference: https://github.com/mrlhansen/idrac_exporter/#configuration
Type: null or path
Default
null
Example
"/etc/prometheus-idrac-exporter/idrac.yml"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.enable
Whether to enable the prometheus idrac exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.extraFlags
Extra commandline options to pass to the idrac exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.idrac.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9348"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.idrac.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9348 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.group
Group under which the idrac exporter shall be run.
Type: string
Default
"idrac-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9348
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.idrac.user
User name under which the idrac exporter shall be run.
Type: string
Default
"idrac-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts
Accounts to monitor
Type: attribute set of (submodule)
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress
Your email address (at the moment used as login name)
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts.<name>.password
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress
mailserver name or address
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport
imap port number (at the moment only tls connection is supported)
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls
set to true for using STARTTLS to start a TLS connection
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.accounts.<name>.username
If empty string mailaddress value is used
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.configurationFile
File containing the configuration
Type: path
Example
"/path/to/config-file"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.enable
Whether to enable the prometheus imap-mailstat exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.extraFlags
Extra commandline options to pass to the imap-mailstat exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.imap-mailstat.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 8081"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.imap-mailstat.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 8081 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.group
Group under which the imap-mailstat exporter shall be run.
Type: string
Default
"imap-mailstat-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.oldestUnseenDate
Enable metric with timestamp of oldest unseen mail
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
8081
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.imap-mailstat.user
User name under which the imap-mailstat exporter shall be run.
Type: string
Default
"imap-mailstat-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.enable
Whether to enable the prometheus influxdb exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.extraFlags
Extra commandline options to pass to the influxdb exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.influxdb.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9122"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.influxdb.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9122 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.group
Group under which the influxdb exporter shall be run.
Type: string
Default
"influxdb-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9122
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.sampleExpiry
How long a sample is valid for
Type: string
Default
"5m"
Example
"10m"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.udpBindAddress
Address on which to listen for udp packets
Type: string
Default
":9122"
Example
"192.0.2.1:9122"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.influxdb.user
User name under which the influxdb exporter shall be run.
Type: string
Default
"influxdb-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.configFile
Path to configuration file.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.enable
Whether to enable the prometheus ipmi exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.extraFlags
Extra commandline options to pass to the ipmi exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.ipmi.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9290"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.ipmi.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9290 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.group
Group under which the ipmi exporter shall be run.
Type: string
Default
"ipmi-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9290
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.user
User name under which the ipmi exporter shall be run.
Type: string
Default
"ipmi-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ipmi.webConfigFile
Path to configuration file that can enable TLS or authentication.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.enable
Whether to enable the prometheus jitsi exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.extraFlags
Extra commandline options to pass to the jitsi exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.jitsi.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9700"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.jitsi.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9700 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.group
Group under which the jitsi exporter shall be run.
Type: string
Default
"jitsi-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.interval
How often to scrape new data
Type: string
Default
"30s"
Example
"1min"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9700
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.url
Jitsi Videobridge metrics URL to monitor. This is usually /colibri/stats on port 8080 of the jitsi videobridge host.
Type: string
Default
"http://localhost:8080/colibri/stats"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.jitsi.user
User name under which the jitsi exporter shall be run.
Type: string
Default
"jitsi-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.configFile
Path to configuration file.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.enable
Whether to enable the prometheus json exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.extraFlags
Extra commandline options to pass to the json exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.json.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 7979"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.json.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 7979 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.group
Group under which the json exporter shall be run.
Type: string
Default
"json-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
7979
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.json.user
User name under which the json exporter shall be run.
Type: string
Default
"json-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.configuration
JunOS exporter configuration as nix attribute set. Mutually exclusive with the configurationFile
option.
Type: null or (attribute set)
Default
null
Example
{devices = [{host = "router1";key_file = "/path/to/key";}];}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.configurationFile
Specify the JunOS exporter configuration file to use.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.enable
Whether to enable the prometheus junos-czerwonk exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.environmentFile
File containing env-vars to be substituted into the exporter's config.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.extraFlags
Extra commandline options to pass to the junos-czerwonk exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.junos-czerwonk.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9326"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.junos-czerwonk.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9326 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.group
Group under which the junos-czerwonk exporter shall be run.
Type: string
Default
"junos-czerwonk-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9326
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.junos-czerwonk.user
User name under which the junos-czerwonk exporter shall be run.
Type: string
Default
"junos-czerwonk-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.enable
Whether to enable the prometheus kea exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.extraFlags
Extra commandline options to pass to the kea exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.kea.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9547"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.kea.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9547 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.group
Group under which the kea exporter shall be run.
Type: string
Default
"kea-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9547
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.targets
Paths or URLs to the Kea control socket.
Type: list of string
Example
["/run/kea/kea-dhcp4.socket""/run/kea/kea-dhcp6.socket""http://127.0.0.1:8547"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.kea.user
User name under which the kea exporter shall be run.
Type: string
Default
"kea-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.enable
Whether to enable the prometheus keylight exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.extraFlags
Extra commandline options to pass to the keylight exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.keylight.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9288"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.keylight.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9288 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.group
Group under which the keylight exporter shall be run.
Type: string
Default
"keylight-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9288
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.keylight.user
User name under which the keylight exporter shall be run.
Type: string
Default
"keylight-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.enable
Whether to enable the prometheus knot exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.extraFlags
Extra commandline options to pass to the knot exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.knot.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9433"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.knot.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9433 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.group
Group under which the knot exporter shall be run.
Type: string
Default
"knot-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.knotLibraryPath
Path to the library of knot-dns
.
Type: null or string
Default
null
Example
"${pkgs.knot-dns.out}/lib/libknot.so"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.knotSocketPath
Socket path of {manpage}knotd(8)
.
Type: string
Default
"/run/knot/knot.sock"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.knotSocketTimeout
Timeout in seconds.
Type: positive integer, meaning >0
Default
2000
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9433
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.knot.user
User name under which the knot exporter shall be run.
Type: string
Default
"knot-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.enable
Whether to enable the prometheus lnd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.extraFlags
Extra commandline options to pass to the lnd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.lnd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9092"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.lnd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9092 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.group
Group under which the lnd exporter shall be run.
Type: string
Default
"lnd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.lndHost
lnd instance gRPC address:port.
Type: string
Default
"localhost:10009"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.lndMacaroonDir
Path to lnd macaroons.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.lndTlsPath
Path to lnd TLS certificate.
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9092
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.lnd.user
User name under which the lnd exporter shall be run.
Type: string
Default
"lnd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configFile
Specify the mailexporter configuration file to use.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration
Specify the mailexporter configuration file to use.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.disableFileDeletion
Disables the exporter's function to delete probing mails.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.mailCheckTimeout
Timeout until mails are considered "didn't make it".
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.monitoringInterval
Time interval between two probe attempts.
Type: string
Example
"10s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers
List of servers that should be probed.
Note: if your mailserver has {manpage}rspamd(8)
configured,
it can happen that emails from this exporter are marked as spam.
It's possible to work around the issue with a config like this:
{
services.rspamd.locals."multimap.conf".text = ''
ALLOWLIST_PROMETHEUS {
filter = "email:domain:tld";
type = "from";
map = "${pkgs.writeText "allowmap" "domain.tld"}";
score = -100.0;
}
'';
}
Type: list of (submodule)
Default
[ ]
Example
[ {name = "testserver";server = "smtp.domain.tld";port = 587;from = "exporteruser@domain.tld";to = "exporteruser@domain.tld";detectionDir = "/path/to/Maildir/new";} ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.detectionDir
Directory in which new mails for the exporter user are placed. Note that this needs to exist when the exporter starts.
Type: path
Example
"/var/spool/mail/exporteruser/new"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.from
Content of 'From' Header for probing mails.
Type: string
Example
"exporteruser@domain.tld"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.login
Username to use for SMTP authentication.
Type: null or string
Default
null
Example
"exporteruser@domain.tld"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.name
Value for label 'configname' which will be added to all metrics.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.passphrase
Password to use for SMTP authentication.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.port
Port to use for SMTP.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Example
587
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.server
Hostname of the server that should be probed.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.configuration.servers.*.to
Content of 'To' Header for probing mails.
Type: string
Example
"exporteruser@domain.tld"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.enable
Whether to enable the prometheus mail exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.environmentFile
File containing env-vars to be substituted into the exporter's config.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.extraFlags
Extra commandline options to pass to the mail exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.mail.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9225"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.mail.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9225 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.group
Group under which the mail exporter shall be run.
Type: string
Default
"mail-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9225
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mail.user
User name under which the mail exporter shall be run.
Type: string
Default
"mail-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.configFile
Path to a mikrotik exporter configuration file. Mutually exclusive with
{option}configuration
option.
Type: null or path
Default
null
Example
./mikrotik.yml
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.configuration
Mikrotik exporter configuration as nix attribute set. Mutually exclusive with
{option}configFile
option.
See https://github.com/nshttpd/mikrotik-exporter/blob/master/README.md for the description of the configuration file format.
Type: null or (attribute set)
Default
null
Example
{devices = [{name = "my_router";address = "10.10.0.1";user = "prometheus";password = "changeme";}];features = {bgp = true;dhcp = true;routes = true;optics = true;};}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.enable
Whether to enable the prometheus mikrotik exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.extraFlags
Extra commandline options to pass to the mikrotik exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.mikrotik.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9436"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.mikrotik.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9436 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.group
Group under which the mikrotik exporter shall be run.
Type: string
Default
"mikrotik-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9436
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mikrotik.user
User name under which the mikrotik exporter shall be run.
Type: string
Default
"mikrotik-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.enable
Whether to enable the prometheus modemmanager exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.extraFlags
Extra commandline options to pass to the modemmanager exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.modemmanager.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9539"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.modemmanager.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9539 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.group
Group under which the modemmanager exporter shall be run.
Type: string
Default
"modemmanager-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9539
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.refreshRate
How frequently ModemManager will refresh the extended signal quality information for each modem. The duration should be specified in seconds ("5s"), minutes ("1m"), or hours ("1h").
Type: string
Default
"5s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.modemmanager.user
User name under which the modemmanager exporter shall be run.
Type: string
Default
"modemmanager-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.collStats
List of comma separared databases.collections to get $collStats
Type: list of string
Default
[ ]
Example
["db1.coll1""db2"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.collectAll
Enable all collectors. Same as specifying all --collector.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.collector
Enabled collectors
Type: list of string
Default
[ ]
Example
["diagnosticdata""replicasetstatus""dbstats""topmetrics""currentopmetrics""indexstats""dbstats""profile"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.enable
Whether to enable the prometheus mongodb exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.extraFlags
Extra commandline options to pass to the mongodb exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.mongodb.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9216"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.mongodb.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9216 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.group
Group under which the mongodb exporter shall be run.
Type: string
Default
"mongodb-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.indexStats
List of comma separared databases.collections to get $indexStats
Type: list of string
Default
[ ]
Example
["db1.coll1""db2"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9216
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.telemetryPath
Metrics expose path
Type: string
Default
"/metrics"
Example
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.uri
MongoDB URI to connect to.
Type: string
Default
"mongodb://localhost:27017/test"
Example
"mongodb://localhost:27017/test"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mongodb.user
User name under which the mongodb exporter shall be run.
Type: string
Default
"mongodb-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.configFile
Path to the services config file.
See https://github.com/prometheus/mysqld_exporter#running for more information about the available options.
::: {.warn} Please do not store this file in the nix store if you choose to include any credentials here, as it would be world-readable. :::
Type: path
Example
"/var/lib/prometheus-mysqld-exporter.cnf"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.enable
Whether to enable the prometheus mysqld exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.extraFlags
Extra commandline options to pass to the mysqld exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.mysqld.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9104"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.mysqld.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9104 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.group
Group under which the mysqld exporter shall be run.
Type: string
Default
"mysqld-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9104
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.runAsLocalSuperUser
Whether to run the exporter as {option}services.mysql.user
.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.mysqld.user
User name under which the mysqld exporter shall be run.
Type: string
Default
"mysqld-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.enable
Whether to enable the prometheus nats exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.extraFlags
Extra commandline options to pass to the nats exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.nats.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 7777"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.nats.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 7777 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.group
Group under which the nats exporter shall be run.
Type: string
Default
"nats-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
7777
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.url
NATS monitor endpoint to query.
Type: string
Default
"http://127.0.0.1:8222"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nats.user
User name under which the nats exporter shall be run.
Type: string
Default
"nats-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.enable
Whether to enable the prometheus nextcloud exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.extraFlags
Extra commandline options to pass to the nextcloud exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.nextcloud.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9205"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.nextcloud.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9205 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.group
Group under which the nextcloud exporter shall be run.
Type: string
Default
"nextcloud-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.passwordFile
File containing the password for connecting to Nextcloud. Make sure that this file is readable by the exporter user.
Type: null or path
Default
null
Example
"/path/to/password-file"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9205
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.timeout
Timeout for getting server info document.
Type: string
Default
"5s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.tokenFile
File containing the token for connecting to Nextcloud. Make sure that this file is readable by the exporter user.
Type: null or path
Default
null
Example
"/path/to/token-file"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.url
URL to the Nextcloud serverinfo page.
Adding the path to the serverinfo API is optional, it defaults
to /ocs/v2.php/apps/serverinfo/api/v1/info
.
Type: string
Example
"https://domain.tld"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.user
User name under which the nextcloud exporter shall be run.
Type: string
Default
"nextcloud-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nextcloud.username
Username for connecting to Nextcloud. Note that this account needs to have admin privileges in Nextcloud. Unused when using token authentication.
Type: string
Default
"nextcloud-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.constLabels
A list of constant labels that will be used in every metric.
Type: list of string
Default
[ ]
Example
["label1=value1""label2=value2"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.enable
Whether to enable the prometheus nginx exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.extraFlags
Extra commandline options to pass to the nginx exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.nginx.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9113"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.nginx.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9113 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.group
Group under which the nginx exporter shall be run.
Type: string
Default
"nginx-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9113
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.scrapeUri
Address to access the nginx status page. Can be enabled with services.nginx.statusPage = true.
Type: string
Default
"http://localhost/nginx_status"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.sslVerify
Whether to perform certificate verification for https.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginx.user
User name under which the nginx exporter shall be run.
Type: string
Default
"nginx-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.enable
Whether to enable the prometheus nginxlog exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.extraFlags
Extra commandline options to pass to the nginxlog exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.nginxlog.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9117"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.nginxlog.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9117 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.group
Group under which the nginxlog exporter shall be run.
Type: string
Default
"nginxlog-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.metricsEndpoint
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9117
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.settings
All settings of nginxlog expressed as an Nix attrset.
Check the official documentation for the corresponding YAML settings that can all be used here: https://github.com/martin-helmich/prometheus-nginxlog-exporter
The listen
object is already generated by port
, listenAddress
and metricsEndpoint
and
will be merged with the value of settings
before writing it as JSON.
Type: submodule
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.settings.consul
Consul integration options. For more information see the example config.
This is disabled by default.
Type: null or (attribute set of anything)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.settings.namespaces
Namespaces to collect the metrics for. For more information see the example config.
Type: list of attribute set of anything
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nginxlog.user
User name under which the nginxlog exporter shall be run.
Type: string
Default
"nginxlog-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.disabledCollectors
Collectors to disable which are enabled by default.
Type: list of string
Default
[ ]
Example
["timex"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.enable
Whether to enable the prometheus node exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.enabledCollectors
Collectors to enable. The collectors listed here are enabled in addition to the default ones.
Type: list of string
Default
[ ]
Example
["systemd"]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.extraFlags
Extra commandline options to pass to the node exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.node.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9100"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.node.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9100 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.group
Group under which the node exporter shall be run.
Type: string
Default
"node-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9100
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.node.user
User name under which the node exporter shall be run.
Type: string
Default
"node-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.enable
Whether to enable the prometheus nut exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.extraFlags
Extra commandline options to pass to the nut exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.nut.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9199"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.nut.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9199 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.group
Group under which the nut exporter shall be run.
Type: string
Default
"nut-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.nutServer
Hostname or address of the NUT server
Type: string
Default
"127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.nutUser
The user to log in into NUT server. If set, passwordPath should also be set.
Default NUT configs usually permit reading variables without authentication.
Type: string
Default
""
Example
"nut"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.nutVariables
List of NUT variable names to monitor.
If no variables are set, all numeric variables will be exported automatically. See the upstream docs for more information.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.passwordPath
A run-time path to the nutUser password file, which should be provisioned outside of Nix store.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9199
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.nut.user
User name under which the nut exporter shall be run.
Type: string
Default
"nut-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.enable
Whether to enable the prometheus openldap exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.extraFlags
Extra commandline options to pass to the openldap exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.openldap.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9330"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.openldap.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9330 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.group
Group under which the openldap exporter shall be run.
Type: string
Default
"openldap-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.interval
Scrape interval of the exporter.
Type: string
Default
"30s"
Example
"1m"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.ldapAddr
Address of the openldap
-instance.
Type: string
Default
"localhost:389"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.ldapCredentialFile
Environment file to contain the credentials to authenticate against
openldap
.
The file should look like this:
---
ldapUser: "cn=monitoring,cn=Monitor"
ldapPass: "secret"
Type: path
Example
"/run/keys/ldap_pass"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.metricsPath
URL path where metrics should be exposed.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9330
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.protocol
Which protocol to use to connect against openldap
.
Type: string
Default
"tcp"
Example
"udp"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.openldap.user
User name under which the openldap exporter shall be run.
Type: string
Default
"openldap-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.connectionString
Connection string for accessing pgBouncer.
NOTE: You MUST keep pgbouncer as database name (special internal db)!!!
NOTE: Admin user (with password or passwordless) MUST exist in the services.pgbouncer.authFile if authType other than any is used.
WARNING: this secret is stored in the world-readable Nix store!
Use {option}connectionStringFile
instead.
Type: string
Default
""
Example
"postgres://admin:@localhost:6432/pgbouncer?sslmode=require"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.connectionStringFile
File that contains pgBouncer connection string in format: postgres://admin:@localhost:6432/pgbouncer?sslmode=require
NOTE: You MUST keep pgbouncer as database name (special internal db)!!!
NOTE: Admin user (with password or passwordless) MUST exist in the services.pgbouncer.authFile if authType other than any is used.
{option}connectionStringFile
takes precedence over {option}connectionString
Type: null or path
Default
null
Example
"/run/keys/pgBouncer-connection-string"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.enable
Whether to enable the prometheus pgbouncer exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.extraFlags
Extra commandline options when launching Prometheus.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.pgbouncer.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9127"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.pgbouncer.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9127 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.group
Group under which the pgbouncer exporter shall be run.
Type: string
Default
"pgbouncer-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.logFormat
Output format of log messages. One of: [logfmt, json]
Type: one of "logfmt", "json"
Default
"logfmt"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.logLevel
Only log messages with the given severity or above.
Type: one of "debug", "info", "warn", "error"
Default
"info"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.pidFile
Path to PgBouncer pid file.
If provided, the standard process metrics get exported for the PgBouncer process, prefixed with 'pgbouncer_process_...'. The pgbouncer_process exporter needs to have read access to files owned by the PgBouncer process. Depends on the availability of /proc.
https://prometheus.io/docs/instrumenting/writing_clientlibs/#process-metrics.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9127
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.user
User name under which the pgbouncer exporter shall be run.
Type: string
Default
"pgbouncer-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.webConfigFile
Path to configuration file that can enable TLS or authentication.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pgbouncer.webSystemdSocket
Use systemd socket activation listeners instead of port listeners (Linux only).
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.enable
Whether to enable the prometheus php-fpm exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.environmentFile
Environment file as defined in {manpage}systemd.exec(5)
.
Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.
Environment variables from this file will be interpolated into the
config file using envsubst with this syntax:
$ENVIRONMENT ${VARIABLE}
For variables to use see options and defaults.
The main use is to set the PHP_FPM_SCRAPE_URI that indicate how to connect to PHP-FPM process.
# Content of the environment file
PHP_FPM_SCRAPE_URI="unix:///tmp/php.sock;/status"
Note that this file needs to be available on the host on which this exporter is running.
Type: null or path
Default
null
Example
"/root/prometheus-php-fpm-exporter.env"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.extraFlags
Extra commandline options to pass to the php-fpm exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.php-fpm.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9253"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.php-fpm.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9253 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.group
Group under which the php-fpm exporter shall be run.
Type: string
Default
"php-fpm-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.package
The prometheus-php-fpm-exporter package to use.
Type: package
Default
pkgs.prometheus-php-fpm-exporter
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9253
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.php-fpm.user
User name under which the php-fpm exporter shall be run.
Type: string
Default
"php-fpm-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.apiToken
Pi-Hole API token which can be used instead of a password
Type: string
Default
""
Example
"580a770cb40511eb85290242ac130003580a770cb40511eb85290242ac130003"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.enable
Whether to enable the prometheus pihole exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.extraFlags
Extra commandline options to pass to the pihole exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.pihole.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9617"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.pihole.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9617 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.group
Group under which the pihole exporter shall be run.
Type: string
Default
"pihole-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.password
The password to login into Pi-Hole. An api token can be used instead.
Type: string
Default
""
Example
"password"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.piholeHostname
Hostname or address where to find the Pi-Hole webinterface
Type: string
Default
"pihole"
Example
"127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.piholePort
The port Pi-Hole webinterface is reachable on
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
80
Example
443
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9617
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.protocol
The protocol which is used to connect to Pi-Hole
Type: one of "http", "https"
Default
"http"
Example
"https"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.timeout
Controls the timeout to connect to a Pi-Hole instance
Type: string
Default
"5s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pihole.user
User name under which the pihole exporter shall be run.
Type: string
Default
"pihole-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.enable
Whether to enable the prometheus ping exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.extraFlags
Extra commandline options to pass to the ping exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.ping.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9427"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.ping.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9427 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.group
Group under which the ping exporter shall be run.
Type: string
Default
"ping-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9427
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.settings
Configuration for ping_exporter, see https://github.com/czerwonk/ping_exporter for supported values.
Type: YAML value
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.ping.user
User name under which the ping exporter shall be run.
Type: string
Default
"ping-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.enable
Whether to enable the prometheus postfix exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.extraFlags
Extra commandline options to pass to the postfix exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.postfix.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9154"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.postfix.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9154 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.group
Group under which the postfix exporter shall be run.
It should match the group that is allowed to access the
showq
socket in the queue/public/
directory.
Defaults to services.postfix.setgidGroup
when postfix is enabled.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.logfilePath
Path where Postfix writes log entries. This file will be truncated by this exporter!
Type: path
Default
"/var/log/postfix_exporter_input.log"
Example
"/var/log/mail.log"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9154
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.showqPath
Path where Postfix places its showq socket.
Type: path
Default
"/var/lib/postfix/queue/public/showq"
Example
"/var/spool/postfix/public/showq"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.systemd.enable
Whether to enable reading metrics from the systemd journal instead of from a logfile
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.systemd.journalPath
Path to the systemd journal.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.systemd.slice
Name of the postfix systemd slice.
This overrides the {option}systemd.unit
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.systemd.unit
Name of the postfix systemd unit.
Type: string
Default
"postfix.service"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postfix.user
User name under which the postfix exporter shall be run.
Type: string
Default
"postfix-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.dataSourceName
Accepts PostgreSQL URI form and key=value form arguments.
Type: string
Default
"user=postgres database=postgres host=/run/postgresql sslmode=disable"
Example
"postgresql://username:password@localhost:5432/postgres?sslmode=disable"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.enable
Whether to enable the prometheus postgres exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.environmentFile
Environment file as defined in {manpage}systemd.exec(5)
.
Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.
Environment variables from this file will be interpolated into the
config file using envsubst with this syntax:
$ENVIRONMENT ${VARIABLE}
The main use is to set the DATA_SOURCE_NAME that contains the postgres password
note that contents from this file will override dataSourceName if you have set it from nix.
# Content of the environment file
DATA_SOURCE_NAME=postgresql://username:password@localhost:5432/postgres?sslmode=disable
Note that this file needs to be available on the host on which this exporter is running.
Type: null or path
Default
null
Example
"/root/prometheus-postgres-exporter.env"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.extraFlags
Extra commandline options to pass to the postgres exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.postgres.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9187"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.postgres.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9187 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.group
Group under which the postgres exporter shall be run.
Type: string
Default
"postgres-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9187
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.runAsLocalSuperUser
Whether to run the exporter as the local 'postgres' super user.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.postgres.user
User name under which the postgres exporter shall be run.
Type: string
Default
"postgres-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.enable
Whether to enable the prometheus process exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.extraFlags
Extra commandline options to pass to the process exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.process.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9256"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.process.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9256 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.group
Group under which the process exporter shall be run.
Type: string
Default
"process-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9256
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.settings.process_names
All settings expressed as an Nix attrset.
Check the official documentation for the corresponding YAML settings that can all be used here: https://github.com/ncabatoff/process-exporter
Type: list of anything
Default
[ ]
Example
[# Remove nix store path from process name{ name = "{{.Matches.Wrapped}} {{ .Matches.Args }}"; cmdline = [ "^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)" ]; }]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.process.user
User name under which the process exporter shall be run.
Type: string
Default
"process-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.collectors.cluster
Collect PVE cluster info
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.collectors.config
Collect PVE onboot status
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.collectors.node
Collect PVE node info
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.collectors.resources
Collect PVE resources info
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.collectors.status
Collect Node/VM/CT status
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.collectors.version
Collect PVE version info
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.configFile
Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.
The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.
If both configFile and environmentFile are provided, the configFile option will be ignored.
Configuration reference: https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication
Type: null or path
Default
null
Example
"/etc/prometheus-pve-exporter/pve.yml"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.enable
Whether to enable the prometheus pve exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.environmentFile
Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.
The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.
Environment reference: https://github.com/prometheus-pve/prometheus-pve-exporter#authentication
Type: null or path
Default
null
Example
"/etc/prometheus-pve-exporter/pve.env"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.extraFlags
Extra commandline options to pass to the pve exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.pve.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9221"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.pve.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9221 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.group
Group under which the pve exporter shall be run.
Type: string
Default
"pve-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.package
The prometheus-pve-exporter package to use.
Type: package
Default
pkgs.prometheus-pve-exporter
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9221
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.server.certFile
Path to a SSL certificate file for the server
Type: null or path
Default
null
Example
"/var/lib/prometheus-pve-exporter/full-chain.pem"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.server.keyFile
Path to a SSL private key file for the server
Type: null or path
Default
null
Example
"/var/lib/prometheus-pve-exporter/privkey.key"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.pve.user
User name under which the pve exporter shall be run.
Type: string
Default
"pve-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.deviceHostname
The hostname of the air purification device from which to scrape the metrics.
Type: string
Example
"192.168.1.123"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.enable
Whether to enable the prometheus py-air-control exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.extraFlags
Extra commandline options to pass to the py-air-control exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.py-air-control.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9896"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.py-air-control.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9896 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.group
Group under which the py-air-control exporter shall be run.
Type: string
Default
"py-air-control-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9896
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.protocol
The protocol to use when communicating with the air purification device. Available: [http, coap, plain_coap]
Type: string
Default
"http"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.stateDir
Directory below /var/lib
to store runtime data.
This directory will be created automatically using systemd's StateDirectory mechanism.
Type: string
Default
"prometheus-py-air-control-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.py-air-control.user
User name under which the py-air-control exporter shall be run.
Type: string
Default
"py-air-control-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.enable
Whether to enable the prometheus redis exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.extraFlags
Extra commandline options to pass to the redis exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.redis.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9121"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.redis.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9121 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.group
Group under which the redis exporter shall be run.
Type: string
Default
"redis-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9121
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.redis.user
User name under which the redis exporter shall be run.
Type: string
Default
"redis-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.enable
Whether to enable the prometheus restic exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.environmentFile
File containing the credentials to access the repository, in the format of an EnvironmentFile as described by systemd.exec(5)
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.extraFlags
Extra commandline options to pass to the restic exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.restic.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9753"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.restic.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9753 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.group
Group under which the restic exporter shall be run.
Type: string
Default
"restic-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.passwordFile
File containing the password to the repository.
Type: path
Example
"/etc/nixos/restic-password"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9753
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.rcloneConfig
Configuration for the rclone remote being used for backup.
See the remote's specific options under rclone's docs at
https://rclone.org/docs/. When specifying
option names, use the "config" name specified in the docs.
For example, to set --b2-hard-delete
for a B2
remote, use hard_delete = true
in the
attribute set.
::: {.warning}
Secrets set in here will be world-readable in the Nix
store! Consider using the {option}rcloneConfigFile
option instead to specify secret values separately. Note that
options set here will override those set in the config file.
:::
Type: attribute set of (string or boolean)
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.rcloneConfigFile
Path to the file containing rclone configuration. This file must contain configuration for the remote specified in this backup set and also must be readable by root.
::: {.caution}
Options set in rcloneConfig
will override those set in this
file.
:::
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.rcloneOptions
Options to pass to rclone to control its behavior.
See https://rclone.org/docs/#options for
available options. When specifying option names, strip the
leading --
. To set a flag such as
--drive-use-trash
, which does not take a value,
set the value to the Boolean true
.
Type: attribute set of (string or boolean)
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.refreshInterval
Refresh interval for the metrics in seconds. Computing the metrics is an expensive task, keep this value as high as possible.
Type: unsigned integer, meaning >=0
Default
60
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.repository
URI pointing to the repository to monitor.
Type: string
Example
"sftp:backup@192.168.1.100:/backups/example"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.restic.user
User name under which the restic exporter shall be run.
Type: string
Default
"restic-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.enable
Whether to enable the prometheus rspamd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.extraFlags
Extra commandline options to pass to the rspamd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.extraLabels
Set of labels added to each metric.
Type: attribute set of string
Default
{ host = config.networking.hostName; }
Example
{host = config.networking.hostName;custom_label = "some_value";}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.rspamd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 7980"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.rspamd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 7980 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.group
Group under which the rspamd exporter shall be run.
Type: string
Default
"rspamd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
7980
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rspamd.user
User name under which the rspamd exporter shall be run.
Type: string
Default
"rspamd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.channels
List of channel matchers to export.
Type: list of (submodule)
Default
[ ]
Example
[{channel = 6543;location = "Kitchen";name = "Acurite";}]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.channels.*.channel
Channel to match.
Type: signed integer
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.channels.*.location
Location to match.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.channels.*.name
Name to match.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.enable
Whether to enable the prometheus rtl_433 exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.extraFlags
Extra commandline options to pass to the rtl_433 exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.rtl_433.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9550"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.rtl_433.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9550 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.group
Group under which the rtl_433 exporter shall be run.
Type: string
Default
"rtl_433-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.ids
List of ID matchers to export.
Type: list of (submodule)
Default
[ ]
Example
[{id = 1;location = "Bedroom";name = "Nexus";}]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.ids.*.id
ID to match.
Type: signed integer
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.ids.*.location
Location to match.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.ids.*.name
Name to match.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9550
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.rtl433Flags
Flags passed verbatim to rtl_433 binary.
Having -C si
(the default) is recommended since only Celsius temperatures are parsed.
Type: string
Default
"-C si"
Example
"-C si -R 19"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.rtl_433.user
User name under which the rtl_433 exporter shall be run.
Type: string
Default
"rtl_433-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.enable
Whether to enable the prometheus sabnzbd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.extraFlags
Extra commandline options to pass to the sabnzbd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.sabnzbd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9387"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.sabnzbd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9387 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.group
Group under which the sabnzbd exporter shall be run.
Type: string
Default
"sabnzbd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9387
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.servers
List of sabnzbd servers to connect to.
Type: list of (submodule)
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile
The path to a file containing the API key. The file is securely passed to the service by leveraging systemd credentials. No special permissions need to be set on this file.
Type: string
Example
"/run/secrets/sabnzbd_apikey"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.servers.*.baseUrl
Base URL of the sabnzbd server.
Type: string
Example
"http://localhost:8080/sabnzbd"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sabnzbd.user
User name under which the sabnzbd exporter shall be run.
Type: string
Default
"sabnzbd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.enable
Whether to enable the prometheus scaphandre exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.extraFlags
Extra commandline options to pass to the scaphandre exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.scaphandre.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 8080"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.scaphandre.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 8080 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.group
Group under which the scaphandre exporter shall be run.
Type: string
Default
"scaphandre-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
8080
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.scaphandre.user
User name under which the scaphandre exporter shall be run.
Type: string
Default
"scaphandre-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.enable
Whether to enable the prometheus script exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.extraFlags
Extra commandline options to pass to the script exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.script.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9172"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.script.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9172 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.group
Group under which the script exporter shall be run.
Type: string
Default
"script-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9172
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.settings.scripts
All settings expressed as an Nix attrset.
Check the official documentation for the corresponding YAML settings that can all be used here: https://github.com/adhocteam/script_exporter#sample-configuration
Type: list of (submodule)
Example
{scripts = [{ name = "sleep"; script = "sleep 5"; }];}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.settings.scripts.*.name
Name of the script.
Type: string
Example
"sleep"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.settings.scripts.*.script
Shell script to execute when metrics are requested.
Type: string
Example
"sleep 5"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.settings.scripts.*.timeout
Optional timeout for the script in seconds.
Type: null or signed integer
Default
null
Example
60
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.script.user
User name under which the script exporter shall be run.
Type: string
Default
"script-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.enable
Whether to enable the prometheus shelly exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.extraFlags
Extra commandline options to pass to the shelly exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.shelly.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9784"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.shelly.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9784 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.group
Group under which the shelly exporter shall be run.
Type: string
Default
"shelly-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.metrics-file
Path to the JSON file with the metric definitions
Type: path
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9784
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.shelly.user
User name under which the shelly exporter shall be run.
Type: string
Default
"shelly-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.devices
Paths to the disks that will be monitored. Will autodiscover all disks if none given.
Type: list of string
Default
[ ]
Example
[ "/dev/sda", "/dev/nvme0n1" ];
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.enable
Whether to enable the prometheus smartctl exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.extraFlags
Extra commandline options to pass to the smartctl exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.smartctl.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9633"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.smartctl.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9633 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.group
Group under which the smartctl exporter shall be run.
Type: string
Default
"smartctl-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.maxInterval
Interval that limits how often a disk can be queried.
Type: string
Default
"60s"
Example
"2m"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9633
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smartctl.user
User name under which the smartctl exporter shall be run.
Type: string
Default
"smartctl-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.buckets
List of buckets to use for the response duration histogram.
Type: strings concatenated with ","
Default
"5e-05,0.0001,0.0002,0.0004,0.0008,0.0016,0.0032,0.0064,0.0128,0.0256,0.0512,0.1024,0.2048,0.4096,0.8192,1.6384,3.2768,6.5536,13.1072,26.2144"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.enable
Whether to enable the prometheus smokeping exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.extraFlags
Extra commandline options to pass to the smokeping exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.smokeping.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9374"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.smokeping.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9374 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.group
Group under which the smokeping exporter shall be run.
Type: string
Default
"smokeping-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.hosts
List of endpoints to probe.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.pingInterval
Interval between pings.
Type: Go duration (https://golang.org/pkg/time/#ParseDuration)
Default
"1s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9374
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.smokeping.user
User name under which the smokeping exporter shall be run.
Type: string
Default
"smokeping-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.configuration
Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.
Type: null or (attribute set)
Default
null
Example
{auths = {public_v2 = {community = "public";version = 2;};};}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.configurationPath
Path to a snmp exporter configuration file. Mutually exclusive with 'configuration' option.
Type: null or path
Default
null
Example
./snmp.yml
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.enable
Whether to enable the prometheus snmp exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.enableConfigCheck
Whether to run a correctness check for the configuration file. This depends on the configuration file residing in the nix-store. Paths passed as string will be copied to the store.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.environmentFile
EnvironmentFile as defined in {manpage}systemd.exec(5)
.
Secrets may be passed to the service without adding them to the world-readable Nix store, by specifying placeholder variables as the option value in Nix and setting these variables accordingly in the environment file.
Environment variables from this file will be interpolated into the
config file using envsubst with this syntax:
$ENVIRONMENT ${VARIABLE}
For variables to use see Prometheus Configuration.
If the file path is set to this option, the parameter
--config.expand-environment-variables
is implicitly added to
ExecStart
.
Note that this file needs to be available on the host on which this exporter is running.
Type: null or path
Default
null
Example
"/root/prometheus-snmp-exporter.env"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.extraFlags
Extra commandline options to pass to the snmp exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.snmp.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9116"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.snmp.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9116 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.group
Group under which the snmp exporter shall be run.
Type: string
Default
"snmp-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.logFormat
Output format of log messages.
Type: one of "logfmt", "json"
Default
"logfmt"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.logLevel
Only log messages with the given severity or above.
Type: one of "debug", "info", "warn", "error"
Default
"info"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9116
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.snmp.user
User name under which the snmp exporter shall be run.
Type: string
Default
"snmp-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configFile
Path to configuration file.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration
Exporter configuration as nix attribute set. Mutually exclusive with 'configFile' option.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs
An attrset of metrics scraping jobs to run.
Type: attribute set of (submodule)
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.connections
A list of connection strings of the SQL servers to scrape metrics from
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.interval
How often to run this job, specified in Go duration format.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.queries
SQL queries to run.
Type: attribute set of (submodule)
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help
A human-readable description of this metric.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels
A set of columns that will be used as Prometheus labels.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query
The SQL query to run.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values
A set of columns that will be used as values of this metric.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql
A list of SQL statements to execute once after making a connection.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.enable
Whether to enable the prometheus sql exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.extraFlags
Extra commandline options to pass to the sql exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.sql.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9237"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.sql.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9237 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.group
Group under which the sql exporter shall be run.
Type: string
Default
"sql-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9237
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.sql.user
User name under which the sql exporter shall be run.
Type: string
Default
"sql-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.enable
Whether to enable the prometheus statsd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.extraFlags
Extra commandline options to pass to the statsd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.statsd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9102"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.statsd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9102 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.group
Group under which the statsd exporter shall be run.
Type: string
Default
"statsd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9102
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.statsd.user
User name under which the statsd exporter shall be run.
Type: string
Default
"statsd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.enable
Whether to enable the prometheus surfboard exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.extraFlags
Extra commandline options to pass to the surfboard exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.surfboard.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9239"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.surfboard.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9239 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.group
Group under which the surfboard exporter shall be run.
Type: string
Default
"surfboard-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.modemAddress
The hostname or IP of the cable modem.
Type: string
Default
"192.168.100.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9239
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.surfboard.user
User name under which the surfboard exporter shall be run.
Type: string
Default
"surfboard-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.enable
Whether to enable the prometheus systemd exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.extraFlags
Extra commandline options to pass to the systemd exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.systemd.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9558"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.systemd.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9558 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.group
Group under which the systemd exporter shall be run.
Type: string
Default
"systemd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9558
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.systemd.user
User name under which the systemd exporter shall be run.
Type: string
Default
"systemd-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.enable
Whether to enable the prometheus tor exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.extraFlags
Extra commandline options to pass to the tor exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.tor.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9130"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.tor.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9130 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.group
Group under which the tor exporter shall be run.
Type: string
Default
"tor-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9130
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.torControlAddress
Tor control IP address or hostname.
Type: string
Default
"127.0.0.1"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.torControlPort
Tor control port.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9051
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.tor.user
User name under which the tor exporter shall be run.
Type: string
Default
"tor-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.enable
Whether to enable the prometheus unbound exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.extraFlags
Extra commandline options to pass to the unbound exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.unbound.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9167"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.unbound.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9167 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.group
Group under which the unbound exporter shall be run.
Type: string
Default
"unbound-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9167
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.unbound.ca
Path to the Unbound server certificate authority
Type: null or path
Default
"/var/lib/unbound/unbound_server.pem"
Example
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.unbound.certificate
Path to the Unbound control socket certificate
Type: null or path
Default
"/var/lib/unbound/unbound_control.pem"
Example
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.unbound.host
Path to the unbound control socket. Supports unix domain sockets, as well as the TCP interface.
Type: string
Default
"tcp://127.0.0.1:8953"
Example
"unix:///run/unbound/unbound.socket"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.unbound.key
Path to the Unbound control socket key.
Type: null or path
Default
"/var/lib/unbound/unbound_control.key"
Example
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unbound.user
User name under which the unbound exporter shall be run.
Type: string
Default
"unbound-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.enable
Whether to enable the prometheus unifi exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.extraFlags
Extra commandline options to pass to the unifi exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.unifi.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9130"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.unifi.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9130 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.group
Group under which the unifi exporter shall be run.
Type: string
Default
"unifi-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9130
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.unifiAddress
URL of the UniFi Controller API.
Type: string
Example
"https://10.0.0.1:8443"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.unifiInsecure
If enabled skip the verification of the TLS certificate of the UniFi Controller API. Use with caution.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.unifiPassword
Password for authentication against UniFi Controller API.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.unifiTimeout
Timeout including unit for UniFi Controller API requests.
Type: string
Default
"5s"
Example
"2m"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.unifiUsername
username for authentication against UniFi Controller API.
Type: string
Example
"ReadOnlyUser"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unifi.user
User name under which the unifi exporter shall be run.
Type: string
Default
"unifi-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.controllers
List of Unifi controllers to poll. Use defaults if empty.
Type: list of (submodule)
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.controllers.*.hash_pii
Hash, with md5, client names and MAC addresses. This attempts to protect personally identifiable information.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.pass
Path of a file containing the password for the unifi service user. This file needs to be readable by the unifi-poller user.
Type: path
Default
unpoller-unifi-default.password
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.save_alarms
Collect and save data from UniFi alarms to influxdb and Loki.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.save_anomalies
Collect and save data from UniFi anomalies to influxdb and Loki.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.save_dpi
Collect and save data from deep packet inspection. Adds around 150 data points and impacts performance.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.save_events
Collect and save data from UniFi events to influxdb and Loki.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.save_ids
Collect and save data from the intrusion detection system to influxdb and Loki.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.save_sites
Collect and save site data.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.sites
List of site names for which statistics should be exported. Or the string "default" for the default site or the string "all" for all sites.
Type: one of "default", "all" or list of string
Default
"all"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.url
URL of the Unifi controller.
Type: string
Default
"https://unifi:8443"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.user
Unifi service user name.
Type: string
Default
"unifi"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.controllers.*.verify_ssl
Verify the Unifi controller's certificate.
Type: boolean
Default
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/unpoller.nix
services.prometheus.exporters.unpoller.enable
Whether to enable the prometheus unpoller exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.extraFlags
Extra commandline options to pass to the unpoller exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.unpoller.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9130"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.unpoller.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9130 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.group
Group under which the unpoller exporter shall be run.
Type: string
Default
"unpoller-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.log.debug
Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.log.prometheusErrors
Whether to enable emitting errors to prometheus.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.log.quiet
Whether to enable startup and error logs only.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.interval
How often the events are polled and pushed to Loki.
Type: string
Default
"2m"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.pass
Path of a file containing the password for Loki. This file needs to be readable by the unifi-poller user.
Type: path
Default
"unpoller-influxdb-default.password"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.tenant_id
Tenant ID to use in Loki.
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.timeout
Should be increased in case of timeout errors.
Type: string
Default
"10s"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.url
URL of the Loki host.
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.user
Username for Loki.
Type: string
Default
""
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.loki.verify_ssl
Verify Loki's certificate.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9130
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.unpoller.user
User name under which the unpoller exporter shall be run.
Type: string
Default
"unpoller-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.enable
Whether to enable the prometheus v2ray exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.extraFlags
Extra commandline options to pass to the v2ray exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.v2ray.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9299"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.v2ray.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9299 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.group
Group under which the v2ray exporter shall be run.
Type: string
Default
"v2ray-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9299
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.user
User name under which the v2ray exporter shall be run.
Type: string
Default
"v2ray-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.v2ray.v2rayEndpoint
v2ray grpc api endpoint
Type: string
Default
"127.0.0.1:54321"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.enable
Whether to enable the prometheus varnish exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.extraFlags
Extra commandline options to pass to the varnish exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.varnish.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9131"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.varnish.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9131 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.group
Group under which the varnish exporter shall be run.
Type: string
Default
"varnish-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.healthPath
Path under which to expose healthcheck. Disabled unless configured.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.instance
varnishstat -n value.
Type: null or string
Default
config.services.varnish.stateDir
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.noExit
Do not exit server on Varnish scrape errors.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9131
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.raw
Enable raw stdout logging without timestamps.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.user
User name under which the varnish exporter shall be run.
Type: string
Default
"varnish-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.varnishStatPath
Path to varnishstat.
Type: string
Default
"varnishstat"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.verbose
Enable verbose logging.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.varnish.withGoMetrics
Export go runtime and http handler metrics.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.enable
Whether to enable the prometheus wireguard exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.extraFlags
Extra commandline options to pass to the wireguard exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.wireguard.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9586"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.wireguard.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9586 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.group
Group under which the wireguard exporter shall be run.
Type: string
Default
"wireguard-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9586
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.singleSubnetPerField
By default, all allowed IPs and subnets are comma-separated in the
allowed_ips
field. With this option enabled,
a single IP and subnet will be listed in fields like allowed_ip_0
,
allowed_ip_1
and so on.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.user
User name under which the wireguard exporter shall be run.
Type: string
Default
"wireguard-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.verbose
Whether to enable verbose logging mode for prometheus-wireguard-exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.wireguardConfig
Path to the Wireguard Config to add the peer's name to the stats of a peer.
Please note that networking.wg-quick
is required for this feature
as networking.wireguard
uses
{manpage}wg(8)
to set the peers up.
Type: null or path or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.wireguard.withRemoteIp
Whether or not the remote IP of a WireGuard peer should be exposed via prometheus.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.enable
Whether to enable the prometheus zfs exporter.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.extraFlags
Extra commandline options to pass to the zfs exporter.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.firewallFilter
Specify a filter for iptables to use when
{option}services.prometheus.exporters.zfs.openFirewall
is true. It is used as ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept
.
Type: null or string
Default
null
Example
"-i eth0 -p tcp -m tcp --dport 9134"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.firewallRules
Specify rules for nftables to add to the input chain
when {option}services.prometheus.exporters.zfs.openFirewall
is true.
Type: null or strings concatenated with "\n"
Default
null
Example
iifname "eth0" tcp dport 9134 counter accept
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.group
Group under which the zfs exporter shall be run.
Type: string
Default
"zfs-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.listenAddress
Address to listen on.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.openFirewall
Open port in firewall for incoming connections.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.pools
Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
Type: null or (list of string)
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9134
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.telemetryPath
Path under which to expose metrics.
Type: string
Default
"/metrics"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.exporters.zfs.user
User name under which the zfs exporter shall be run.
Type: string
Default
"zfs-exporter"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/exporters.nix
services.prometheus.extraFlags
Extra commandline options when launching Prometheus.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.globalConfig
Parameters that are valid in all configuration contexts. They also serve as defaults for other configuration sections
Type: submodule
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.globalConfig.evaluation_interval
How frequently to evaluate rules by default.
Defaults to 1m
in prometheus
when set to null
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.globalConfig.external_labels
The labels to add to any time series or alerts when communicating with external systems (federation, remote storage, Alertmanager).
Type: null or (attribute set of string)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.globalConfig.query_log_file
Path to the file prometheus should write its query log to.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.globalConfig.scrape_interval
How frequently to scrape targets by default.
Defaults to 1m
in prometheus
when set to null
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.globalConfig.scrape_timeout
How long until a scrape request times out.
Defaults to 10s
in prometheus
when set to null
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.listenAddress
Address to listen on for the web interface, API, and telemetry.
Type: string
Default
"0.0.0.0"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.package
The prometheus package to use.
Type: package
Default
pkgs.prometheus
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.port
Port to listen on.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9090
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.pushgateway.enable
Whether to enable Prometheus Pushgateway.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.extraFlags
Extra commandline options when launching the Pushgateway.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.log.format
Set the log target and format.
null
will default to logger:stderr
.
Type: null or string
Default
null
Example
"logger:syslog?appname=bob&local=7"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.log.level
Only log messages with the given severity or above.
null
will default to info
.
Type: null or one of "debug", "info", "warn", "error", "fatal"
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.package
The prometheus-pushgateway package to use.
Type: package
Default
pkgs.prometheus-pushgateway
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.persistMetrics
Whether to persist metrics to a file.
When enabled metrics will be saved to a file called
metrics
in the directory
/var/lib/pushgateway
. The directory below
/var/lib
can be set using
{option}services.prometheus.pushgateway.stateDir
.
Type: boolean
Default
false
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.persistence.interval
The minimum interval at which to write out the persistence file.
null
will default to 5m
.
Type: null or string
Default
null
Example
"10m"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.stateDir
Directory below /var/lib
to store metrics.
This directory will be created automatically using systemd's
StateDirectory mechanism when
{option}services.prometheus.pushgateway.persistMetrics
is enabled.
Type: string
Default
"pushgateway"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.web.external-url
The URL under which Pushgateway is externally reachable.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.web.listen-address
Address to listen on for the web interface, API and telemetry.
null
will default to :9091
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.web.route-prefix
Prefix for the internal routes of web endpoints.
Defaults to the path of
{option}services.prometheus.pushgateway.web.external-url
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.pushgateway.web.telemetry-path
Path under which to expose metrics.
null
will default to /metrics
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/pushgateway.nix
services.prometheus.remoteRead
Parameters of the endpoints to query from. See the official documentation for more information.
Type: list of (submodule)
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.basic_auth
Sets the Authorization
header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.basic_auth.password
HTTP password
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.basic_auth.password_file
HTTP password file
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.basic_auth.username
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.bearer_token
Sets the Authorization
header on every remote read request with
the configured bearer token. It is mutually exclusive with bearer_token_file
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.bearer_token_file
Sets the Authorization
header on every remote read request with the bearer token
read from the configured file. It is mutually exclusive with bearer_token
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.headers
Custom HTTP headers to be sent along with each remote read request. Be aware that headers that are set by Prometheus itself can't be overwritten.
Type: null or (attribute set of string)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.name
Name of the remote read config, which if specified must be unique among remote read configs. The name will be used in metrics and logging in place of a generated value to help users distinguish between remote read configs.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.proxy_url
Optional Proxy URL.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.read_recent
Whether reads should be made for queries for time ranges that the local storage should have complete data for.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.remote_timeout
Timeout for requests to the remote read endpoint.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.required_matchers
An optional list of equality matchers which have to be present in a selector to query the remote read endpoint.
Type: null or (attribute set of string)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.tls_config
Configures the remote read request's TLS settings.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.tls_config.ca_file
CA certificate to validate API server certificate with.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.tls_config.cert_file
Certificate file for client cert authentication to the server.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.tls_config.insecure_skip_verify
Disable validation of the server certificate.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.tls_config.key_file
Key file for client cert authentication to the server.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.tls_config.server_name
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteRead.*.url
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite
Parameters of the endpoints to send samples to. See the official documentation for more information.
Type: list of (submodule)
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.basic_auth
Sets the Authorization
header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.basic_auth.password
HTTP password
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.basic_auth.password_file
HTTP password file
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.basic_auth.username
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.bearer_token
Sets the Authorization
header on every remote write request with
the configured bearer token. It is mutually exclusive with bearer_token_file
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.bearer_token_file
Sets the Authorization
header on every remote write request with the bearer token
read from the configured file. It is mutually exclusive with bearer_token
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.headers
Custom HTTP headers to be sent along with each remote write request. Be aware that headers that are set by Prometheus itself can't be overwritten.
Type: null or (attribute set of string)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.metadata_config
Configures the sending of series metadata to remote storage. Metadata configuration is subject to change at any point or be removed in future releases.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.metadata_config.send
Whether metric metadata is sent to remote storage or not.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.metadata_config.send_interval
How frequently metric metadata is sent to remote storage.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.name
Name of the remote write config, which if specified must be unique among remote write configs. The name will be used in metrics and logging in place of a generated value to help users distinguish between remote write configs.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.proxy_url
Optional Proxy URL.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config
Configures the queue used to write to remote storage.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.batch_send_deadline
Maximum time a sample will wait in buffer.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.capacity
Number of samples to buffer per shard before we block reading of more samples from the WAL. It is recommended to have enough capacity in each shard to buffer several requests to keep throughput up while processing occasional slow remote requests.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.max_backoff
Maximum retry delay.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.max_samples_per_send
Maximum number of samples per send.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.max_shards
Maximum number of shards, i.e. amount of concurrency.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.min_backoff
Initial retry delay. Gets doubled for every retry.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.queue_config.min_shards
Minimum number of shards, i.e. amount of concurrency.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.remote_timeout
Timeout for requests to the remote write endpoint.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.tls_config
Configures the remote write request's TLS settings.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.tls_config.ca_file
CA certificate to validate API server certificate with.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.tls_config.cert_file
Certificate file for client cert authentication to the server.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.tls_config.insecure_skip_verify
Disable validation of the server certificate.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.tls_config.key_file
Key file for client cert authentication to the server.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.tls_config.server_name
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.url
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs
List of remote write relabel configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.action
{services-prometheus-remoteWrite--write_relabel_configs--action}
Action to perform based on regex matching.
Defaults to replace
in prometheus
when set to null
.
Type: null or one of "replace", "lowercase", "uppercase", "keep", "drop", "hashmod", "labelmap", "labeldrop", "labelkeep"
Default {services-prometheus-remoteWrite--write_relabel_configs--action-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.modulus
{services-prometheus-remoteWrite--write_relabel_configs--modulus}
Modulus to take of the hash of the source label values.
Type: null or signed integer
Default {services-prometheus-remoteWrite--write_relabel_configs--modulus-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.regex
{services-prometheus-remoteWrite--write_relabel_configs--regex}
Regular expression against which the extracted value is matched.
Defaults to (.*)
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-remoteWrite--write_relabel_configs--regex-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.replacement
{services-prometheus-remoteWrite--write_relabel_configs--replacement}
Replacement value against which a regex replace is performed if the regular expression matches.
Defaults to $1
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-remoteWrite--write_relabel_configs--replacement-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.separator
{services-prometheus-remoteWrite--write_relabel_configs--separator}
Separator placed between concatenated source label values.
Defaults to ;
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-remoteWrite--write_relabel_configs--separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.source_labels
{services-prometheus-remoteWrite--write_relabel_configs--source_labels}
The source labels select values from existing labels. Their content is concatenated using the configured separator and matched against the configured regular expression.
Type: null or (list of string)
Default {services-prometheus-remoteWrite--write_relabel_configs--source_labels-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.remoteWrite.*.write_relabel_configs.*.target_label
{services-prometheus-remoteWrite--write_relabel_configs--target_label}
Label to which the resulting value is written in a replace action. It is mandatory for replace actions.
Type: null or string
Default {services-prometheus-remoteWrite--write_relabel_configs--target_label-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.retentionTime
How long to retain samples in storage.
Type: null or string
Default
null
Example
"15d"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.ruleFiles
Any additional rules files to include in this configuration.
Type: list of path
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.rules
Alerting and/or Recording rules to evaluate at runtime.
Type: list of string
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.sachet.address
The address Sachet will listen to.
Type: string
Default
"localhost"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix
services.prometheus.sachet.configuration
Sachet's configuration as a nix attribute set.
Type: null or (attribute set)
Default
null
Example
{providers = {twilio = {# environment variables gets expanded at runtimeaccount_sid = "$TWILIO_ACCOUNT";auth_token = "$TWILIO_TOKEN";};};templates = [ ./some-template.tmpl ];receivers = [{name = "pager";provider = "twilio";to = [ "+33123456789" ];text = "{{ template \"message\" . }}";}];}
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix
services.prometheus.sachet.enable
Whether to enable Sachet, an SMS alerting tool for the Prometheus Alertmanager.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix
services.prometheus.sachet.port
The port Sachet will listen to.
Type: 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default
9876
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/sachet.nix
services.prometheus.scrapeConfigs
A list of scrape configurations.
Type: list of (submodule)
Default
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.authorization
Sets the Authorization
header on every scrape request with the configured credentials.
Type: null or (attribute set)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs
List of Azure service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method
{services-prometheus-scrapeConfigs--azure_sd_configs--authentication_method}
The authentication method, either OAuth or ManagedIdentity. See https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview
Defaults to OAuth
in prometheus
when set to null
.
Type: null or one of "OAuth", "ManagedIdentity"
Default {services-prometheus-scrapeConfigs--azure_sd_configs--authentication_method-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_id
{services-prometheus-scrapeConfigs--azure_sd_configs--client_id}
Optional client ID. Only required with authentication_method OAuth.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_secret
{services-prometheus-scrapeConfigs--azure_sd_configs--client_secret}
Optional client secret. Only required with authentication_method OAuth.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment
{services-prometheus-scrapeConfigs--azure_sd_configs--environment}
The Azure environment.
Defaults to AzurePublicCloud
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--environment-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--azure_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--azure_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port
{services-prometheus-scrapeConfigs--azure_sd_configs--port}
The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--azure_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--azure_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--azure_sd_configs--refresh_interval}
Refresh interval to re-read the instance list.
Defaults to 300s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.subscription_id
{services-prometheus-scrapeConfigs--azure_sd_configs--subscription_id}
The subscription ID.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tenant_id
{services-prometheus-scrapeConfigs--azure_sd_configs--tenant_id}
Optional tenant ID. Only required with authentication_method OAuth.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tenant_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--azure_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--azure_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.basic_auth
Sets the Authorization
header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.basic_auth.password
HTTP password
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.basic_auth.password_file
HTTP password file
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.basic_auth.username
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.bearer_token
Sets the Authorization
header on every scrape request with
the configured bearer token. It is mutually exclusive with
{option}bearer_token_file
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.bearer_token_file
Sets the Authorization
header on every scrape request with
the bearer token read from the configured file. It is mutually
exclusive with {option}bearer_token
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.body_size_limit
An uncompressed response body larger than this many bytes will cause the scrape to fail. 0 means no limit. Example: 100MB. This is an experimental feature, this behaviour could change or be removed in the future.
Defaults to 0
in prometheus
when set to null
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs
List of Consul service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.allow_stale
{services-prometheus-scrapeConfigs--consul_sd_configs--allow_stale}
Allow stale Consul results (see https://www.consul.io/api/index.html#consistency-modes).
Will reduce load on Consul.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--consul_sd_configs--allow_stale-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--consul_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--consul_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--consul_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.datacenter
{services-prometheus-scrapeConfigs--consul_sd_configs--datacenter}
Consul datacenter
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--datacenter-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--consul_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--consul_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.node_meta
{services-prometheus-scrapeConfigs--consul_sd_configs--node_meta}
Node metadata used to filter nodes for a given service.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--node_meta-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.password
{services-prometheus-scrapeConfigs--consul_sd_configs--password}
Consul password
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--consul_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--consul_sd_configs--refresh_interval}
The time after which the provided names are refreshed.
On large setup it might be a good idea to increase this value because the catalog will change all the time.
Defaults to 30s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.scheme
{services-prometheus-scrapeConfigs--consul_sd_configs--scheme}
Consul scheme
Defaults to http
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--scheme-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.server
{services-prometheus-scrapeConfigs--consul_sd_configs--server}
Consul server to query.
Defaults to localhost:8500
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--server-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.services
{services-prometheus-scrapeConfigs--consul_sd_configs--services}
A list of services for which targets are retrieved.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--services-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tag_separator
{services-prometheus-scrapeConfigs--consul_sd_configs--tag_separator}
The string by which Consul tags are joined into the tag label.
Defaults to ,
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tag_separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tags
{services-prometheus-scrapeConfigs--consul_sd_configs--tags}
An optional list of tags used to filter nodes for a given service. Services must contain all tags in the list.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tags-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--consul_sd_configs--tls_config}
Configures the Consul request's TLS settings.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.token
{services-prometheus-scrapeConfigs--consul_sd_configs--token}
Consul token
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--token-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username
{services-prometheus-scrapeConfigs--consul_sd_configs--username}
Consul username
Type: null or string
Default {services-prometheus-scrapeConfigs--consul_sd_configs--username-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs
List of DigitalOcean service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--port}
The port to scrape metrics from.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--refresh_interval}
The time after which the droplets are refreshed.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--digitalocean_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dns_sd_configs
List of DNS service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names
{services-prometheus-scrapeConfigs--dns_sd_configs--names}
A list of DNS SRV record names to be queried.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port
{services-prometheus-scrapeConfigs--dns_sd_configs--port}
The port number used if the query type is not SRV.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--dns_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dns_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--dns_sd_configs--refresh_interval}
The time after which the provided names are refreshed.
Defaults to 30s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--dns_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dns_sd_configs.*.type
{services-prometheus-scrapeConfigs--dns_sd_configs--type}
The type of DNS query to perform. One of SRV, A, or AAAA.
Defaults to SRV
in prometheus
when set to null
.
Type: null or one of "SRV", "A", "AAAA"
Default {services-prometheus-scrapeConfigs--dns_sd_configs--type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs
List of Docker service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--docker_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--docker_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--docker_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters
{services-prometheus-scrapeConfigs--docker_sd_configs--filters}
Optional filters to limit the discovery process to a subset of available resources.
Type: null or (list of (submodule))
Default {services-prometheus-scrapeConfigs--docker_sd_configs--filters-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name
{services-prometheus-scrapeConfigs--docker_sd_configs--filters-*-name}
Name of the filter. The available filters are listed in the upstream documentation: Services: https://docs.docker.com/engine/api/v1.40/#operation/ServiceList Tasks: https://docs.docker.com/engine/api/v1.40/#operation/TaskList Nodes: https://docs.docker.com/engine/api/v1.40/#operation/NodeList
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.values
{services-prometheus-scrapeConfigs--docker_sd_configs--filters-*-values}
Value for the filter.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--docker_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--docker_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host
{services-prometheus-scrapeConfigs--docker_sd_configs--host}
Address of the Docker daemon.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host_networking_host
{services-prometheus-scrapeConfigs--docker_sd_configs--host_networking_host}
The host to use if the container is in host networking mode.
Defaults to localhost
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--host_networking_host-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port
{services-prometheus-scrapeConfigs--docker_sd_configs--port}
The port to scrape metrics from, when role
is nodes, and for discovered
tasks and services that don't have published ports.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--docker_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--docker_sd_configs--refresh_interval}
The time after which the containers are refreshed.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--docker_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--docker_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs
List of Docker Swarm service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters}
Optional filters to limit the discovery process to a subset of available resources.
Type: null or (list of (submodule))
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters-*-name}
Name of the filter. The available filters are listed in the upstream documentation: Services: https://docs.docker.com/engine/api/v1.40/#operation/ServiceList Tasks: https://docs.docker.com/engine/api/v1.40/#operation/TaskList Nodes: https://docs.docker.com/engine/api/v1.40/#operation/NodeList
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.values
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--filters-*-values}
Value for the filter.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.host
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--host}
Address of the Docker daemon.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--port}
The port to scrape metrics from, when role
is nodes, and for discovered
tasks and services that don't have published ports.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--refresh_interval}
The time after which the containers are refreshed.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.role
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--role}
Role of the targets to retrieve. Must be services
, tasks
, or nodes
.
Type: one of "services", "tasks", "nodes"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--dockerswarm_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs
List of EC2 service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key
{services-prometheus-scrapeConfigs--ec2_sd_configs--access_key}
The AWS API key id. If blank, the environment variable
AWS_ACCESS_KEY_ID
is used.
Type: null or string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--access_key-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint
{services-prometheus-scrapeConfigs--ec2_sd_configs--endpoint}
Custom endpoint to be used.
Type: null or string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--endpoint-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters
{services-prometheus-scrapeConfigs--ec2_sd_configs--filters}
Filters can be used optionally to filter the instance list by other criteria.
Type: null or (list of (submodule))
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--filters-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name
{services-prometheus-scrapeConfigs--ec2_sd_configs--filters-*-name}
See this list for the available filters.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.values
{services-prometheus-scrapeConfigs--ec2_sd_configs--filters-*-values}
Value of the filter.
Type: list of string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--filters-*-values-default}
[ ]
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port
{services-prometheus-scrapeConfigs--ec2_sd_configs--port}
The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile
{services-prometheus-scrapeConfigs--ec2_sd_configs--profile}
Named AWS profile used to connect to the API.
Type: null or string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--profile-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--ec2_sd_configs--refresh_interval}
Refresh interval to re-read the instance list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region
{services-prometheus-scrapeConfigs--ec2_sd_configs--region}
The AWS Region. If blank, the region from the instance metadata is used.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn
{services-prometheus-scrapeConfigs--ec2_sd_configs--role_arn}
AWS Role ARN, an alternative to using AWS API keys.
Type: null or string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--role_arn-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key
{services-prometheus-scrapeConfigs--ec2_sd_configs--secret_key}
The AWS API key secret. If blank, the environment variable
AWS_SECRET_ACCESS_KEY
is used.
Type: null or string
Default {services-prometheus-scrapeConfigs--ec2_sd_configs--secret_key-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs
List of Eureka service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--eureka_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--eureka_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--eureka_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--eureka_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.server
{services-prometheus-scrapeConfigs--eureka_sd_configs--server}
The URL to connect to the Eureka server.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--eureka_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.file_sd_configs
List of file service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.file_sd_configs.*.files
{services-prometheus-scrapeConfigs--file_sd_configs--files}
Patterns for files from which target groups are extracted. Refer to the Prometheus documentation for permitted filename patterns and formats.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.file_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--file_sd_configs--refresh_interval}
Refresh interval to re-read the files.
Defaults to 5m
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--file_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs
List of Google Compute Engine service discovery configurations.
See the relevant Prometheus configuration docs for more detail.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter
{services-prometheus-scrapeConfigs--gce_sd_configs--filter}
Filter can be used optionally to filter the instance list by other criteria Syntax of this filter string is described here in the filter query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.
Type: null or string
Default {services-prometheus-scrapeConfigs--gce_sd_configs--filter-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port
{services-prometheus-scrapeConfigs--gce_sd_configs--port}
The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--gce_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs.*.project
{services-prometheus-scrapeConfigs--gce_sd_configs--project}
The GCP Project.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--gce_sd_configs--refresh_interval}
Refresh interval to re-read the cloud instance list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--gce_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator
{services-prometheus-scrapeConfigs--gce_sd_configs--tag_separator}
The tag separator used to separate concatenated GCE instance network tags.
See the GCP documentation on network tags for more information: https://cloud.google.com/vpc/docs/add-remove-network-tags
Defaults to ,
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--gce_sd_configs--tag_separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.gce_sd_configs.*.zone
{services-prometheus-scrapeConfigs--gce_sd_configs--zone}
The zone of the scrape targets. If you need multiple zones use multiple gce_sd_configs.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs
List of Hetzner service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--hetzner_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--hetzner_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port
{services-prometheus-scrapeConfigs--hetzner_sd_configs--port}
The port to scrape metrics from.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--hetzner_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--hetzner_sd_configs--refresh_interval}
The time after which the servers are refreshed.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.role
{services-prometheus-scrapeConfigs--hetzner_sd_configs--role}
The Hetzner role of entities that should be discovered.
One of robot
or hcloud
.
Type: one of "robot", "hcloud"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--hetzner_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.honor_labels
Controls how Prometheus handles conflicts between labels that are already present in scraped data and labels that Prometheus would attach server-side ("job" and "instance" labels, manually configured target labels, and labels generated by service discovery implementations).
If honor_labels is set to "true", label conflicts are resolved by keeping label values from the scraped data and ignoring the conflicting server-side labels.
If honor_labels is set to "false", label conflicts are resolved by renaming conflicting labels in the scraped data to "exported_\<original-label>" (for example "exported_instance", "exported_job") and then attaching server-side labels. This is useful for use cases such as federation, where all labels specified in the target should be preserved.
Defaults to false
in prometheus
when set to null
.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.honor_timestamps
honor_timestamps controls whether Prometheus respects the timestamps present in scraped data.
If honor_timestamps is set to true
, the timestamps of the metrics exposed
by the target will be used.
If honor_timestamps is set to false
, the timestamps of the metrics exposed
by the target will be ignored.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs
List of HTTP service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--http_sd_configs--basic_auth}
Authentication information used to authenticate to the API server. password and password_file are mutually exclusive.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--http_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--http_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--http_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--http_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--http_sd_configs--refresh_interval}
Refresh interval to re-query the endpoint.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--http_sd_configs--tls_config}
Configures the scrape request's TLS settings.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--http_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--http_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--http_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--http_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--http_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--http_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.http_sd_configs.*.url
{services-prometheus-scrapeConfigs--http_sd_configs--url}
URL from which the targets are fetched.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.job_name
The job name assigned to scraped metrics by default.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs
List of Kubernetes service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--api_server}
The API server addresses. If left empty, Prometheus is assumed to run inside of the cluster and will discover API servers automatically and use the pod's CA certificate and bearer token file at /var/run/secrets/kubernetes.io/serviceaccount/.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--api_server-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.kubeconfig_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--kubeconfig_file}
Optional path to a kubeconfig file. Note that api_server and kube_config are mutually exclusive.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--kubeconfig_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces}
Optional namespace discovery. If omitted, all namespaces are used.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces-names}
Namespace name.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--namespaces-names-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.role
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--role}
The Kubernetes role of entities that should be discovered. One of endpoints, service, pod, node, or ingress.
Type: one of "endpoints", "service", "pod", "node", "ingress"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors}
Optional label and field selectors to limit the discovery process to a subset of available resources. See https://kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/ and https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ to learn more about the possible filters that can be used. Endpoints role supports pod, service and endpoints selectors, other roles only support selectors matching the role itself (e.g. node role can only contain node selectors).
Note: When making decision about using field/label selector make sure that this is the best approach - it will prevent Prometheus from reusing single list/watch for all scrape configs. This might result in a bigger load on the Kubernetes API, because per each selector combination there will be additional LIST/WATCH. On the other hand, if you just want to monitor small subset of pods in large cluster it's recommended to use selectors. Decision, if selectors should be used or not depends on the particular situation.
Type: null or (list of (submodule))
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.field
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-field}
Selector field
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-field-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.label
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-label}
Selector label
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-label-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.role
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--selectors-*-role}
Selector role
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--kubernetes_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs
List of Kuma service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--kuma_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--kuma_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.fetch_timeout
{services-prometheus-scrapeConfigs--kuma_sd_configs--fetch_timeout}
The time after which the monitoring assignments are refreshed.
Defaults to 2m
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--fetch_timeout-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--kuma_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--kuma_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--kuma_sd_configs--refresh_interval}
The time to wait between polling update requests.
Defaults to 30s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.server
{services-prometheus-scrapeConfigs--kuma_sd_configs--server}
Address of the Kuma Control Plane's MADS xDS server.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--kuma_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.label_limit
Per-scrape limit on number of labels that will be accepted for a sample. If more than this number of labels are present post metric-relabeling, the entire scrape will be treated as failed. 0 means no limit.
Defaults to 0
in prometheus
when set to null
.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.label_name_length_limit
Per-scrape limit on length of labels name that will be accepted for a sample. If a label name is longer than this number post metric-relabeling, the entire scrape will be treated as failed. 0 means no limit.
Defaults to 0
in prometheus
when set to null
.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.label_value_length_limit
Per-scrape limit on length of labels value that will be accepted for a sample. If a label value is longer than this number post metric-relabeling, the entire scrape will be treated as failed. 0 means no limit.
Defaults to 0
in prometheus
when set to null
.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs
List of Lightsail service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key
{services-prometheus-scrapeConfigs--lightsail_sd_configs--access_key}
The AWS API keys. If blank, the environment variable AWS_ACCESS_KEY_ID
is used.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--access_key-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.endpoint
{services-prometheus-scrapeConfigs--lightsail_sd_configs--endpoint}
Custom endpoint to be used.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--endpoint-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port
{services-prometheus-scrapeConfigs--lightsail_sd_configs--port}
The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile
{services-prometheus-scrapeConfigs--lightsail_sd_configs--profile}
Named AWS profile used to connect to the API.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--profile-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--lightsail_sd_configs--refresh_interval}
Refresh interval to re-read the instance list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region
{services-prometheus-scrapeConfigs--lightsail_sd_configs--region}
The AWS region. If blank, the region from the instance metadata is used.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--region-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.role_arn
{services-prometheus-scrapeConfigs--lightsail_sd_configs--role_arn}
AWS Role ARN, an alternative to using AWS API keys.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--role_arn-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key
{services-prometheus-scrapeConfigs--lightsail_sd_configs--secret_key}
The AWS API keys. If blank, the environment variable AWS_SECRET_ACCESS_KEY
is used.
Type: null or string
Default {services-prometheus-scrapeConfigs--lightsail_sd_configs--secret_key-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs
List of Linode service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--linode_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--linode_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--linode_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--linode_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--linode_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port
{services-prometheus-scrapeConfigs--linode_sd_configs--port}
The port to scrape metrics from.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--linode_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--linode_sd_configs--refresh_interval}
The time after which the linode instances are refreshed.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator
{services-prometheus-scrapeConfigs--linode_sd_configs--tag_separator}
The string by which Linode Instance tags are joined into the tag label.
Defaults to ,
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tag_separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--linode_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--linode_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs
List of Marathon service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token
{services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token}
Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token_file
and other authentication mechanisms.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token_file}
Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token
and other authentication mechanisms.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--auth_token_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--marathon_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--marathon_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--marathon_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--marathon_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--marathon_sd_configs--refresh_interval}
Polling interval.
Defaults to 30s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.servers
{services-prometheus-scrapeConfigs--marathon_sd_configs--servers}
List of URLs to be used to contact Marathon servers. You need to provide at least one server URL.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--marathon_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs
List of metric relabel configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.action
{services-prometheus-scrapeConfigs--metric_relabel_configs--action}
Action to perform based on regex matching.
Defaults to replace
in prometheus
when set to null
.
Type: null or one of "replace", "lowercase", "uppercase", "keep", "drop", "hashmod", "labelmap", "labeldrop", "labelkeep"
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--action-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.modulus
{services-prometheus-scrapeConfigs--metric_relabel_configs--modulus}
Modulus to take of the hash of the source label values.
Type: null or signed integer
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--modulus-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.regex
{services-prometheus-scrapeConfigs--metric_relabel_configs--regex}
Regular expression against which the extracted value is matched.
Defaults to (.*)
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--regex-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.replacement
{services-prometheus-scrapeConfigs--metric_relabel_configs--replacement}
Replacement value against which a regex replace is performed if the regular expression matches.
Defaults to $1
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--replacement-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.separator
{services-prometheus-scrapeConfigs--metric_relabel_configs--separator}
Separator placed between concatenated source label values.
Defaults to ;
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.source_labels
{services-prometheus-scrapeConfigs--metric_relabel_configs--source_labels}
The source labels select values from existing labels. Their content is concatenated using the configured separator and matched against the configured regular expression.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--source_labels-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.target_label
{services-prometheus-scrapeConfigs--metric_relabel_configs--target_label}
Label to which the resulting value is written in a replace action. It is mandatory for replace actions.
Type: null or string
Default {services-prometheus-scrapeConfigs--metric_relabel_configs--target_label-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.metrics_path
The HTTP resource path on which to fetch metrics from targets.
Defaults to /metrics
in prometheus
when set to null
.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.nerve_sd_configs
List of AirBnB's Nerve service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.paths
{services-prometheus-scrapeConfigs--nerve_sd_configs--paths}
Paths can point to a single service, or the root of a tree of services.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.servers
{services-prometheus-scrapeConfigs--nerve_sd_configs--servers}
The Zookeeper servers.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.timeout
{services-prometheus-scrapeConfigs--nerve_sd_configs--timeout}
Timeout value.
Defaults to 10s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--nerve_sd_configs--timeout-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs
List of OpenStack service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants
{services-prometheus-scrapeConfigs--openstack_sd_configs--all_tenants}
Whether the service discovery should list all instances for all projects. It is only relevant for the 'instance' role and usually requires admin permissions.
Defaults to false
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--all_tenants-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id
{services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_id}
The application_credential_id or application_credential_name fields are required if using an application credential to authenticate. Some providers allow you to create an application credential to authenticate rather than a password.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name
{services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_name}
The application_credential_id or application_credential_name fields are required if using an application credential to authenticate. Some providers allow you to create an application credential to authenticate rather than a password.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret
{services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_secret}
The application_credential_secret field is required if using an application credential to authenticate.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--application_credential_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.availability
{services-prometheus-scrapeConfigs--openstack_sd_configs--availability}
The availability of the endpoint to connect to. Must be one of public, admin or internal.
Defaults to public
in prometheus
when set to null
.
Type: null or one of "public", "admin", "internal"
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--availability-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id
{services-prometheus-scrapeConfigs--openstack_sd_configs--domain_id}
At most one of domain_id and domain_name must be provided if using username with Identity V3. Otherwise, either are optional.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--domain_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name
{services-prometheus-scrapeConfigs--openstack_sd_configs--domain_name}
At most one of domain_id and domain_name must be provided if using username with Identity V3. Otherwise, either are optional.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--domain_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.identity_endpoint
{services-prometheus-scrapeConfigs--openstack_sd_configs--identity_endpoint}
identity_endpoint specifies the HTTP endpoint that is required to work with the Identity API of the appropriate version. While it's ultimately needed by all of the identity services, it will often be populated by a provider-level function.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--identity_endpoint-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password
{services-prometheus-scrapeConfigs--openstack_sd_configs--password}
password for the Identity V2 and V3 APIs. Consult with your provider's control panel to discover your account's preferred method of authentication.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port
{services-prometheus-scrapeConfigs--openstack_sd_configs--port}
The port to scrape metrics from. If using the public IP address, this must instead be specified in the relabeling rule.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id
{services-prometheus-scrapeConfigs--openstack_sd_configs--project_id}
The project_id and project_name fields are optional for the Identity V2 API. Some providers allow you to specify a project_name instead of the project_id. Some require both. Your provider's authentication policies will determine how these fields influence authentication.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--project_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name
{services-prometheus-scrapeConfigs--openstack_sd_configs--project_name}
The project_id and project_name fields are optional for the Identity V2 API. Some providers allow you to specify a project_name instead of the project_id. Some require both. Your provider's authentication policies will determine how these fields influence authentication.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--project_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--openstack_sd_configs--refresh_interval}
Refresh interval to re-read the instance list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.region
{services-prometheus-scrapeConfigs--openstack_sd_configs--region}
The OpenStack Region.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.role
{services-prometheus-scrapeConfigs--openstack_sd_configs--role}
The OpenStack role of entities that should be discovered.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid
{services-prometheus-scrapeConfigs--openstack_sd_configs--userid}
username is required if using Identity V2 API. Consult with your provider's control panel to discover your account's username. In Identity V3, either userid or a combination of username and domain_id or domain_name are needed.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--userid-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username
{services-prometheus-scrapeConfigs--openstack_sd_configs--username}
username is required if using Identity V2 API. Consult with your provider's control panel to discover your account's username. In Identity V3, either userid or a combination of username and domain_id or domain_name are needed.
Type: null or string
Default {services-prometheus-scrapeConfigs--openstack_sd_configs--username-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.params
Optional HTTP URL parameters.
Type: null or (attribute set of list of string)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.proxy_url
Optional proxy URL.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs
List of PuppetDB service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--include_parameters}
Whether to include the parameters as meta labels. Due to the differences between parameter types and Prometheus labels, some parameters might not be rendered. The format of the parameters might also change in future releases.
Note: Enabling this exposes parameters in the Prometheus UI and API. Make sure that you don't have secrets exposed as parameters if you enable this.
Defaults to false
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--include_parameters-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--port}
The port to scrape metrics from.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.query
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--query}
Puppet Query Language (PQL) query. Only resources are supported. https://puppet.com/docs/puppetdb/latest/api/query/v4/pql.html
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--refresh_interval}
Refresh interval to re-read the resources list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--puppetdb_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.url
{services-prometheus-scrapeConfigs--puppetdb_sd_configs--url}
The URL of the PuppetDB root query endpoint.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs
List of relabel configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.action
{services-prometheus-scrapeConfigs--relabel_configs--action}
Action to perform based on regex matching.
Defaults to replace
in prometheus
when set to null
.
Type: null or one of "replace", "lowercase", "uppercase", "keep", "drop", "hashmod", "labelmap", "labeldrop", "labelkeep"
Default {services-prometheus-scrapeConfigs--relabel_configs--action-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus
{services-prometheus-scrapeConfigs--relabel_configs--modulus}
Modulus to take of the hash of the source label values.
Type: null or signed integer
Default {services-prometheus-scrapeConfigs--relabel_configs--modulus-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.regex
{services-prometheus-scrapeConfigs--relabel_configs--regex}
Regular expression against which the extracted value is matched.
Defaults to (.*)
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--relabel_configs--regex-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.replacement
{services-prometheus-scrapeConfigs--relabel_configs--replacement}
Replacement value against which a regex replace is performed if the regular expression matches.
Defaults to $1
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--relabel_configs--replacement-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.separator
{services-prometheus-scrapeConfigs--relabel_configs--separator}
Separator placed between concatenated source label values.
Defaults to ;
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--relabel_configs--separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.source_labels
{services-prometheus-scrapeConfigs--relabel_configs--source_labels}
The source labels select values from existing labels. Their content is concatenated using the configured separator and matched against the configured regular expression.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--relabel_configs--source_labels-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.relabel_configs.*.target_label
{services-prometheus-scrapeConfigs--relabel_configs--target_label}
Label to which the resulting value is written in a replace action. It is mandatory for replace actions.
Type: null or string
Default {services-prometheus-scrapeConfigs--relabel_configs--target_label-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.sample_limit
Per-scrape limit on number of scraped samples that will be accepted. If more than this number of samples are present after metric relabelling the entire scrape will be treated as failed. 0 means no limit.
Defaults to 0
in prometheus
when set to null
.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs
List of Scaleway service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.access_key
{services-prometheus-scrapeConfigs--scaleway_sd_configs--access_key}
Access key to use. https://console.scaleway.com/project/credentials
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.api_url
{services-prometheus-scrapeConfigs--scaleway_sd_configs--api_url}
API URL to use when doing the server listing requests.
Defaults to https://api.scaleway.com
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--api_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--scaleway_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter
{services-prometheus-scrapeConfigs--scaleway_sd_configs--name_filter}
Specify a name filter (works as a LIKE) to apply on the server listing request.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--name_filter-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port
{services-prometheus-scrapeConfigs--scaleway_sd_configs--port}
The port to scrape metrics from.
Defaults to 80
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.project_id
{services-prometheus-scrapeConfigs--scaleway_sd_configs--project_id}
Project ID of the targets.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--scaleway_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--scaleway_sd_configs--refresh_interval}
Refresh interval to re-read the managed targets list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role
{services-prometheus-scrapeConfigs--scaleway_sd_configs--role}
Role of the targets to retrieve. Must be instance
or baremetal
.
Type: one of "instance", "baremetal"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key
{services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key}
Secret key to use when listing targets. https://console.scaleway.com/project/credentials
It is mutually exclusive with secret_key_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file
{services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key_file}
Sets the secret key with the credentials read from the configured file.
It is mutually exclusive with secret_key
.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--secret_key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tags_filter
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tags_filter}
Specify a tag filter (a server needs to have all defined tags to be listed) to apply on the server listing request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tags_filter-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.zone
{services-prometheus-scrapeConfigs--scaleway_sd_configs--zone}
Zone is the availability zone of your targets (e.g. fr-par-1).
Defaults to fr-par-1
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--scaleway_sd_configs--zone-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scheme
The URL scheme with which to fetch metrics from targets.
Defaults to http
in prometheus
when set to null
.
Type: null or one of "http", "https"
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scrape_interval
How frequently to scrape targets from this job. Defaults to the globally configured default.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.scrape_timeout
Per-target timeout when scraping this job. Defaults to the globally configured default.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.serverset_sd_configs
List of Zookeeper Serverset service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.paths
{services-prometheus-scrapeConfigs--serverset_sd_configs--paths}
Paths can point to a single service, or the root of a tree of services.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.servers
{services-prometheus-scrapeConfigs--serverset_sd_configs--servers}
The Zookeeper servers.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.timeout
{services-prometheus-scrapeConfigs--serverset_sd_configs--timeout}
Timeout value.
Defaults to 10s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--serverset_sd_configs--timeout-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.static_configs
List of labeled target groups for this job.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.static_configs.*.labels
{services-prometheus-scrapeConfigs--static_configs--labels}
Labels assigned to all metrics scraped from the targets.
Type: attribute set of string
Default {services-prometheus-scrapeConfigs--static_configs--labels-default}
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.static_configs.*.targets
{services-prometheus-scrapeConfigs--static_configs--targets}
The targets specified by the target group.
Type: list of string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.target_limit
Per-scrape config limit on number of unique targets that will be accepted. If more than this number of targets are present after target relabeling, Prometheus will mark the targets as failed without scraping them. 0 means no limit. This is an experimental feature, this behaviour could change in the future.
Defaults to 0
in prometheus
when set to null
.
Type: null or signed integer
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.tls_config
Configures the scrape request's TLS settings.
Type: null or (submodule)
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.tls_config.ca_file
CA certificate to validate API server certificate with.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.tls_config.cert_file
Certificate file for client cert authentication to the server.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.tls_config.insecure_skip_verify
Disable validation of the server certificate.
Type: null or boolean
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.tls_config.key_file
Key file for client cert authentication to the server.
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.tls_config.server_name
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs
List of Triton Serverset service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.account
{services-prometheus-scrapeConfigs--triton_sd_configs--account}
The account to use for discovering new targets.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.dns_suffix
{services-prometheus-scrapeConfigs--triton_sd_configs--dns_suffix}
The DNS suffix which should be applied to target.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.endpoint
{services-prometheus-scrapeConfigs--triton_sd_configs--endpoint}
The Triton discovery endpoint (e.g. cmon.us-east-3b.triton.zone
). This is
often the same value as dns_suffix.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups
{services-prometheus-scrapeConfigs--triton_sd_configs--groups}
A list of groups for which targets are retrieved, only supported when targeting the container
role.
If omitted all containers owned by the requesting account are scraped.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--triton_sd_configs--groups-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port
{services-prometheus-scrapeConfigs--triton_sd_configs--port}
The port to use for discovery and metric scraping.
Defaults to 9163
in prometheus
when set to null
.
Type: null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)
Default {services-prometheus-scrapeConfigs--triton_sd_configs--port-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--triton_sd_configs--refresh_interval}
The interval which should be used for refreshing targets.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--triton_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.role
{services-prometheus-scrapeConfigs--triton_sd_configs--role}
The type of targets to discover, can be set to: - "container" to discover virtual machines (SmartOS zones, lx/KVM/bhyve branded zones) running on Triton - "cn" to discover compute nodes (servers/global zones) making up the Triton infrastructure
Defaults to container
in prometheus
when set to null
.
Type: null or one of "container", "cn"
Default {services-prometheus-scrapeConfigs--triton_sd_configs--role-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--triton_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--triton_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.triton_sd_configs.*.version
{services-prometheus-scrapeConfigs--triton_sd_configs--version}
The Triton discovery API version.
Defaults to 1
in prometheus
when set to null
.
Type: null or signed integer
Default {services-prometheus-scrapeConfigs--triton_sd_configs--version-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs
List of Uyuni Serverset service discovery configurations.
Type: null or (list of (submodule))
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization
{services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization}
Optional Authorization
header configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials
{services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials}
Sets the credentials. It is mutually exclusive with credentials_file
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file
{services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials_file}
Sets the credentials to the credentials read from the configured file.
It is mutually exclusive with credentials
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-credentials_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type
{services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-type}
Sets the authentication type.
Defaults to Bearer
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--authorization-type-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth
{services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth}
Optional HTTP basic authentication information.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password
{services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password}
HTTP password
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file
{services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password_file}
HTTP password file
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-password_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username
{services-prometheus-scrapeConfigs--uyuni_sd_configs--basic_auth-username}
HTTP username
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.entitlement
{services-prometheus-scrapeConfigs--uyuni_sd_configs--entitlement}
The entitlement string to filter eligible systems.
Defaults to monitoring_entitled
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--entitlement-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.follow_redirects
{services-prometheus-scrapeConfigs--uyuni_sd_configs--follow_redirects}
Configure whether HTTP requests follow HTTP 3xx redirects.
Defaults to true
in prometheus
when set to null
.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--follow_redirects-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2}
Optional OAuth 2.0 configuration. Cannot be used at the same time as basic_auth or authorization.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_id
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_id}
OAuth client ID.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_id-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret}
OAuth client secret.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret_file
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret_file}
Read the client secret from a file. It is mutually exclusive with client_secret
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-client_secret_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.endpoint_params
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-endpoint_params}
Optional parameters to append to the token URL.
Type: null or (attribute set of string)
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-endpoint_params-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-scopes}
Scopes for the token request.
Type: null or (list of string)
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-scopes-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.token_url
{services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-token_url}
The URL to fetch the token from.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--oauth2-token_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password
{services-prometheus-scrapeConfigs--uyuni_sd_configs--password}
Credentials are used to authenticate the requests to Uyuni API.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.proxy_url
{services-prometheus-scrapeConfigs--uyuni_sd_configs--proxy_url}
Optional proxy URL.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--proxy_url-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.refresh_interval
{services-prometheus-scrapeConfigs--uyuni_sd_configs--refresh_interval}
Refresh interval to re-read the managed targets list.
Defaults to 60s
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--refresh_interval-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator
{services-prometheus-scrapeConfigs--uyuni_sd_configs--separator}
The string by which Uyuni group names are joined into the groups label
Defaults to ,
in prometheus
when set to null
.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--separator-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.server
{services-prometheus-scrapeConfigs--uyuni_sd_configs--server}
The URL to connect to the Uyuni server.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config
{services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config}
TLS configuration.
Type: null or (submodule)
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file
{services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-ca_file}
CA certificate to validate API server certificate with.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-ca_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file
{services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-cert_file}
Certificate file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-cert_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify
{services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-insecure_skip_verify}
Disable validation of the server certificate.
Type: null or boolean
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-insecure_skip_verify-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file
{services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-key_file}
Key file for client cert authentication to the server.
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-key_file-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name
{services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-server_name}
ServerName extension to indicate the name of the server. http://tools.ietf.org/html/rfc4366#section-3.1
Type: null or string
Default {services-prometheus-scrapeConfigs--uyuni_sd_configs--tls_config-server_name-default}
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username
{services-prometheus-scrapeConfigs--uyuni_sd_configs--username}
Credentials are used to authenticate the requests to Uyuni API.
Type: string
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.stateDir
Directory below /var/lib
to store Prometheus metrics data.
This directory will be created automatically using systemd's StateDirectory mechanism.
Type: string
Default
"prometheus2"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.webConfigFile
Specifies which file should be used as web.config.file and be passed on startup. See https://prometheus.io/docs/prometheus/latest/configuration/https/ for valid options.
Type: null or path
Default
null
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.webExternalUrl
The URL under which Prometheus is externally reachable (for example, if Prometheus is served via a reverse proxy).
Type: null or string
Default
null
Example
"https://example.com/"
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/default.nix
services.prometheus.xmpp-alerts.enable
Whether to enable XMPP Web hook service for Alertmanager.
Type: boolean
Default
false
Example
true
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/xmpp-alerts.nix
services.prometheus.xmpp-alerts.settings
Configuration for prometheus xmpp-alerts, see https://github.com/jelmer/prometheus-xmpp-alerts/blob/master/xmpp-alerts.yml.example for supported values.
Type: YAML value
Default
{ }
Declared by: https://github.com/nixos/nixpkgs/blob/master/nixos/modules/services/monitoring/prometheus/xmpp-alerts.nix