Remove telegraf from all hosts

I basically ignore the data anyway. I'll redo monitoring from the ground up later.
This commit is contained in:
Charlotte Van Petegem 2024-11-10 16:24:54 +01:00
parent d5b308d2d1
commit 8e821442af
No known key found for this signature in database
GPG key ID: 019E764B7184435A
15 changed files with 0 additions and 312 deletions

View file

@ -49,6 +49,4 @@
torrents.enable = true; torrents.enable = true;
}; };
}; };
services.telegraf.extraConfig.inputs.disk.mount_points = [ "/boot" ];
} }

View file

@ -72,9 +72,7 @@
}; };
}; };
services = { services = {
garmin-scraper.enable = true;
git.enable = true; git.enable = true;
grafana.enable = true;
mail.enable = true; mail.enable = true;
mastodon.enable = true; mastodon.enable = true;
matrix.enable = true; matrix.enable = true;
@ -139,5 +137,4 @@
}; };
}; };
programs.msmtp.enable = false; programs.msmtp.enable = false;
services.telegraf.extraConfig.inputs.disk.mount_points = [ "/boot/ESP0" "/boot/ESP1" ];
} }

View file

@ -72,5 +72,4 @@
host = "socrates.machines.robbevp.be"; host = "socrates.machines.robbevp.be";
dataset = "zdata/data"; dataset = "zdata/data";
}; };
services.telegraf.extraConfig.inputs.disk.mount_points = [ "/boot/ESP0" "/boot/ESP1" ];
} }

View file

@ -10,7 +10,6 @@
./smartd ./smartd
./ssh ./ssh
./sshd ./sshd
./telegraf
./tmux ./tmux
./zfs ./zfs
./zsh ./zsh

View file

@ -1,50 +0,0 @@
{ config, lib, pkgs, ... }:
{
services.telegraf = {
enable = true;
extraConfig = {
agent = {
interval = "10s";
round_interval = true;
metric_batch_size = 1000;
metric_buffer_limit = 10000;
collection_jitter = "0s";
flush_interval = "10s";
flush_jitter = "0s";
precision = "0s";
omit_hostname = false;
};
outputs.influxdb_v2 = {
urls = [ "https://stats.chvp.be:8086" ];
token = "$TOKEN";
organization = "default";
bucket = "default";
};
inputs = {
cpu = {
percpu = true;
totalcpu = true;
collect_cpu_time = false;
report_active = false;
};
diskio = { };
exec = {
commands = [ "${pkgs.zfs}/libexec/zfs/zpool_influxdb" ];
timeout = "5s";
data_format = "influx";
};
kernel = { };
mem = { };
processes = { };
swap = { };
system = { };
};
};
environmentFiles = [ config.age.secrets."passwords/services/telegraf-env".path ];
};
age.secrets."passwords/services/telegraf-env" = {
file = ../../../../secrets/passwords/services/telegraf-env.age;
owner = "telegraf";
};
}

View file

@ -5,9 +5,7 @@
./accentor ./accentor
./containers ./containers
./data-access ./data-access
./garmin-scraper
./git ./git
./grafana
./mail ./mail
./mastodon ./mastodon
./matrix ./matrix

View file

@ -1,39 +0,0 @@
{ config, lib, pkgs, ... }:
let
garmin2influx = pkgs.writers.writePython3Bin "garmin2influx"
{
libraries = with pkgs.python3Packages; [ garminconnect influxdb-client ];
}
(builtins.readFile ./garmin2influx.py);
in
{
options.chvp.services.garmin-scraper.enable = lib.mkEnableOption "garmin scraper";
config = lib.mkIf config.chvp.services.garmin-scraper.enable {
# Install in environment to allow manual data collection
environment.systemPackages = [ garmin2influx ];
systemd = {
services.garmin2influx = {
description = "Garmin health data importer";
restartIfChanged = false;
unitConfig.X-StopOnRemoval = false;
serviceConfig = {
EnvironmentFile = config.age.secrets."passwords/services/garmin2influx-env".path;
Type = "oneshot";
User = "charlotte";
Group = "users";
ExecStart = "${garmin2influx}/bin/garmin2influx";
RestartSec = "5s";
Restart = "on-failure";
};
startAt = "02/4:00";
};
timers.garmin2influx.timerConfig.RandomizedDelaySec = "30min";
};
age.secrets."passwords/services/garmin2influx-env" = {
file = ../../../../secrets/passwords/services/garmin2influx-env.age;
owner = "charlotte";
};
};
}

View file

@ -1,88 +0,0 @@
import os
import sys
from datetime import date, datetime, timedelta, timezone
from garminconnect import (
Garmin,
GarminConnectConnectionError,
GarminConnectTooManyRequestsError,
GarminConnectAuthenticationError,
)
from influxdb_client import InfluxDBClient, Point, WritePrecision
from influxdb_client.client.write_api import SYNCHRONOUS
email = os.getenv('EMAIL')
password = os.getenv('PASSWORD')
token = os.getenv('TOKEN')
org = 'default'
bucket = 'default'
def hr2point(time, val):
return Point("health") \
.field("heart_rate", val) \
.time(
datetime.fromtimestamp(time / 1000, timezone.utc),
WritePrecision.S
)
def stress2point(time, val):
return Point("health") \
.field("stress", max(val, 0)) \
.time(
datetime.fromtimestamp(time / 1000, timezone.utc),
WritePrecision.S
)
def hr_for_date(api, date_to_fetch):
return api.get_heart_rates(date_to_fetch.isoformat())['heartRateValues']
def stress_for_date(api, date_to_fetch):
return api.get_stress_data(date_to_fetch.isoformat())['stressValuesArray']
date_to_fetch = date.today().isoformat()
if len(sys.argv) > 1:
date_to_fetch = sys.argv[1]
date_to_fetch = date.fromisoformat(date_to_fetch)
try:
api = Garmin(email, password)
api.login()
hr_points = list(map(
lambda p: hr2point(*p),
hr_for_date(api, date_to_fetch - timedelta(days=1))
))
stress_points = list(map(
lambda p: stress2point(*p),
stress_for_date(api, date_to_fetch - timedelta(days=1))
))
hr_points += list(map(
lambda p: hr2point(*p),
hr_for_date(api, date_to_fetch)
))
stress_points += list(map(
lambda p: stress2point(*p),
stress_for_date(api, date_to_fetch)
))
with InfluxDBClient(
url="https://stats.chvp.be:8086",
token=token,
org=org
) as client:
write_api = client.write_api(write_options=SYNCHRONOUS)
write_api.write(bucket, org, hr_points)
write_api.write(bucket, org, stress_points)
except (
GarminConnectConnectionError,
GarminConnectAuthenticationError,
GarminConnectTooManyRequestsError,
) as err:
print(
f'Error occured during Garmin Connect communication: {err}',
file=sys.stderr
)
sys.exit(1)

View file

@ -1,96 +0,0 @@
{ config, lib, pkgs, ... }:
{
options.chvp.services.grafana.enable = lib.mkEnableOption "grafana";
config = lib.mkIf config.chvp.services.grafana.enable {
chvp.services.nginx.hosts = [{
fqdn = "stats.chvp.be";
options.locations."/" = {
proxyPass = "http://grafana";
proxyWebsockets = true;
};
}];
users.users = {
influxdb2.extraGroups = [ "acme" ];
nginx.extraGroups = [ "grafana" ];
};
networking.firewall.allowedTCPPorts = [ 8086 ];
services = {
nginx.upstreams.grafana.servers = { "unix:/run/grafana/grafana.sock" = { }; };
influxdb2 = {
enable = true;
settings = {
reporting-disabled = true;
tls-cert = "${config.security.acme.certs."vanpetegem.me".directory}/fullchain.pem";
tls-key = "${config.security.acme.certs."vanpetegem.me".directory}/key.pem";
};
};
grafana = {
enable = true;
dataDir = "${config.chvp.dataPrefix}/var/lib/grafana";
settings = {
analytics.reporting_enabled = false;
"auth.anonymous" = {
enabled = "true";
org_name = "Van Petegem";
};
database = {
user = "grafana";
type = "postgres";
host = "/run/postgresql/";
name = "grafana";
};
security = {
admin_user = "chvp";
admin_password = "$__file{${config.age.secrets."passwords/services/grafana/admin-password".path}}";
secret_key = "$__file{${config.age.secrets."passwords/services/grafana/secret-key".path}}";
};
server = {
domain = "stats.chvp.be";
http_port = 3000;
protocol = "socket";
root_url = "https://stats.chvp.be";
socket = "/run/grafana/grafana.sock";
};
smtp = {
enabled = true;
host = "mail.vanpetegem.me:25";
user = "noreply@vanpetegem.me";
from_address = "noreply@vanpetegem.me";
password = "$__file{${config.age.secrets."passwords/services/grafana/smtp".path}}";
};
users = {
default_theme = "light";
allow_sign_up = false;
};
};
};
grafana-image-renderer = {
enable = true;
provisionGrafana = true;
chromium = pkgs.ungoogled-chromium;
};
postgresql = {
enable = true;
ensureDatabases = [ "grafana" ];
ensureUsers = [{
name = "grafana";
ensureDBOwnership = true;
}];
};
};
age.secrets."passwords/services/grafana/smtp" = {
file = ../../../../secrets/passwords/services/grafana/smtp.age;
owner = "grafana";
};
age.secrets."passwords/services/grafana/admin-password" = {
file = ../../../../secrets/passwords/services/grafana/admin-password.age;
owner = "grafana";
};
age.secrets."passwords/services/grafana/secret-key" = {
file = ../../../../secrets/passwords/services/grafana/secret-key.age;
owner = "grafana";
};
};
}

View file

@ -86,7 +86,6 @@ in
"secrets/passwords/services/grafana/smtp.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/passwords/services/grafana/smtp.age".publicKeys = [ lasting-integrity ] ++ users;
"secrets/passwords/services/grafana/admin-password.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/passwords/services/grafana/admin-password.age".publicKeys = [ lasting-integrity ] ++ users;
"secrets/passwords/services/grafana/secret-key.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/passwords/services/grafana/secret-key.age".publicKeys = [ lasting-integrity ] ++ users;
"secrets/passwords/services/telegraf-env.age".publicKeys = hosts ++ users;
"secrets/passwords/services/nextcloud-admin.age".publicKeys = [ lasting-integrity ] ++ users; "secrets/passwords/services/nextcloud-admin.age".publicKeys = [ lasting-integrity ] ++ users;

View file

@ -1,9 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 hKAFvQ 9woSTWa4luTKA2jfbkis7IMcsOP+cnuJR1gDH65hrDo
lpwWJCjHCteXj+rys2MEvuPs2f78NTSsdAuELHuTOjk
-> ssh-ed25519 s9rb8g L85FiAeYwhFeomu4w3xcQro41m9oXqtGtUw0ZQx6MiY
k+ZMntX9x7g0a6UeDkDZ9uc359xzBl2HZa1pJdsbWh4
-> ssh-ed25519 +xxExQ giuRie5BEr/p9uq6vw79KQkmbAaGGkG30uBEfyPOCD8
/Js0rmCKqXmhoFefkGoDYZEWpleTEcWFPBj3gRBQhdI
--- jCfREPXg1qBF6uly+ZMMm9e2rJLr/WAUUbl7h4Wuikk
B4éö­þº=À`­ãÞ‡~9í`ˆy{ièïÁ÷t™=`aÈÎ滧i&)àþÕ05?ôv`xõyuï26ÔÉš¿Ú<Î

View file

@ -1,20 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Lbmdyg 86vJ4kz+a0FBs1Ur9u6+f+w+X3tOSQsX9xx0FV2+2mk
Y1nYUGS5PzkaoOUYCOg01B1W4lJhaL62jC886/5g6sY
-> ssh-ed25519 aUd9Ng xv5Qp60hzeiW/8HU1WamQpKrpfiUSI0IAp6Ch2mqAmI
t3PXALWPAybiRm0q46DuP1LYG6f9tWFwkEritfEcJl4
-> ssh-ed25519 hKAFvQ 41w6PqLJ7OV6yHJRHpXwUAYc3PMxvmHtVBWp5AP3MUs
HTtTnX9RSgEdmjfQIF0cQusHzoQt7OF1O1GY3OOvXl0
-> ssh-ed25519 9+Fe5A l9+8Hj9EF1uO0lp+8UXEXG3nDihT+LnfIp/sQyLGlms
bKoJ+fCfNWjjbLtEgOvGrupQIPQZAZLtyaW9VVg+QvE
-> ssh-ed25519 KOkamg PU2WBRNW3yii9F8nfDqUsW8A//P7kstaL55dPPk7Ojg
DfKavW0XzuGWBT/LVen12/wuhuH+q1w/RKTEHENm8iU
-> ssh-ed25519 9PfEBQ o1OkgI6t8r/giSHSURyAp3AA/3pyxRrUk48Lw733B3I
KcPFudRarV+c5SXiVtjrTQt9VWDIcoyXb7XtcRYivUg
-> ssh-ed25519 s9rb8g BANlY5LSIzNjUWD3htwFVZjPD82PU/NMAyoA3uO5mlo
Ss555AqqXTiYcGsaFrJ8i8Q17aCZVN44j6obHmxEJ1I
-> ssh-ed25519 +xxExQ HqZ51lJE/h/4tOPAMqXZ87jz7J3CnE1tW4xjiU+3xCU
hd5HacBYc2Ozd9U5T1a2eo470Idc/jYJNjfpvdSfgtg
--- RFMlPyLIVqChyduvRrhMm7Fl8NiZLzUuxGgzbWeRTeU
­ù²DëøÐ8£Á¬vÜ÷×C|»Â¶ºF„ȺS J1èÌïB<C3AF>Ö+îâ<C3AE>€ùi-èòHê®àüsðö8g×ç¸q.åï=uíŠ8”âm¼Ð
æ­.PSø?jè\ÅÎ7ÚýÙ‡[:Îã#Îi“Q£<É@ÑÇ*7ÑÖ