Disable monitoring on blowhole

Signed-off-by: magic_rb <richard@brezak.sk>
This commit is contained in:
magic_rb 2023-10-07 22:28:48 +02:00
parent efeb5579db
commit e49ef5e713
No known key found for this signature in database
GPG key ID: 08D5287CC5DDCA0E
3 changed files with 21 additions and 25 deletions

View file

@ -33,7 +33,7 @@ in
# ./hostapd.nix
./ical2org.nix
./klipper.nix
./monitoring.nix
# ./monitoring.nix
./nas.nix
./networking.nix
./nfs.nix

View file

@ -51,6 +51,14 @@ in
};
};
# path "${vaultConsulMount}/creds/${tf "module.blowhole.envoy_grafana.name"}" {
# capabilities = ["read"]
# }
# path "${vaultConsulMount}/creds/${tf "module.blowhole.envoy_blowhole.name"}" {
# capabilities = ["read"]
# }
resource."vault_policy"."vault-agent-blowhole" = {
name = "blowhole-id_ed_camera";
@ -67,14 +75,6 @@ in
capabilities = ["read"]
}
path "${vaultConsulMount}/creds/${tf "module.blowhole.envoy_grafana.name"}" {
capabilities = ["read"]
}
path "${vaultConsulMount}/creds/${tf "module.blowhole.envoy_blowhole.name"}" {
capabilities = ["read"]
}
path "${vaultConsulMount}/creds/${tf "module.blowhole.envoy_klipper.name"}" {
capabilities = ["read"]
}

View file

@ -34,9 +34,9 @@ in
address = "http://nomad.in.redalder.org:4646";
};
provider."influxdb-v2" = {
url = "http://influx.in.redalder.org";
};
# provider."influxdb-v2" = {
# url = "http://influx.in.redalder.org";
# };
variable."hcloud_token" = {
sensitive = true;
@ -86,10 +86,10 @@ in
source = ./containers/ingress-blowhole;
};
module."ingress-toothpick" = elib.terraformModule {
name = "ingress-toothpick";
source = ./containers/ingress-toothpick;
};
# module."ingress-toothpick" = elib.terraformModule {
# name = "ingress-toothpick";
# source = ./containers/ingress-toothpick;
# };
module."gateway-mesh" = elib.terraformModule {
name = "gateway-mesh";
@ -116,11 +116,6 @@ in
# source = ./containers/minecraft/ftb-integrations;
# };
module."altra" = elib.terraformModule {
name = "altra";
source = ./altra.nix;
};
imports = [
./lib
./modules/push_approles.nix
@ -129,6 +124,7 @@ in
./pki.nix
./blowhole.nix
./toothpick.nix
./altra.nix
];
terraform.backend."consul" = {
@ -137,10 +133,10 @@ in
path = "terraform/dotfiles";
};
terraform.required_providers = {
hcloud.source = "hetznercloud/hcloud";
influxdb-v2.source = "MagicRB/influxdb-v2";
};
# terraform.required_providers = {
# hcloud.source = "hetznercloud/hcloud";
# influxdb-v2.source = "MagicRB/influxdb-v2";
# };
resource."vault_auth_backend"."approle" = {
type = "approle";