aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix
diff options
context:
space:
mode:
Diffstat (limited to 'nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix')
-rw-r--r--nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix158
1 files changed, 158 insertions, 0 deletions
diff --git a/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix b/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix
new file mode 100644
index 00000000000..856b9432892
--- /dev/null
+++ b/nixpkgs/nixos/modules/services/monitoring/zabbix-agent.nix
@@ -0,0 +1,158 @@
+{ config, lib, pkgs, ... }:
+
+let
+ cfg = config.services.zabbixAgent;
+
+ inherit (lib) mkDefault mkEnableOption mkIf mkOption;
+ inherit (lib) attrValues concatMapStringsSep literalExample optionalString types;
+
+ user = "zabbix-agent";
+ group = "zabbix-agent";
+
+ moduleEnv = pkgs.symlinkJoin {
+ name = "zabbix-agent-module-env";
+ paths = attrValues cfg.modules;
+ };
+
+ configFile = pkgs.writeText "zabbix_agent.conf" ''
+ LogType = console
+ Server = ${cfg.server}
+ ListenIP = ${cfg.listen.ip}
+ ListenPort = ${toString cfg.listen.port}
+ ${optionalString (cfg.modules != {}) "LoadModulePath = ${moduleEnv}/lib"}
+ ${concatMapStringsSep "\n" (name: "LoadModule = ${name}") (builtins.attrNames cfg.modules)}
+ ${cfg.extraConfig}
+ '';
+
+in
+
+{
+ # interface
+
+ options = {
+
+ services.zabbixAgent = {
+ enable = mkEnableOption "the Zabbix Agent";
+
+ package = mkOption {
+ type = types.package;
+ default = pkgs.zabbix.agent;
+ defaultText = "pkgs.zabbix.agent";
+ description = "The Zabbix package to use.";
+ };
+
+ extraPackages = mkOption {
+ type = types.listOf types.package;
+ default = with pkgs; [ nettools ];
+ defaultText = "[ nettools ]";
+ example = "[ nettools mysql ]";
+ description = ''
+ Packages to be added to the Zabbix <envar>PATH</envar>.
+ Typically used to add executables for scripts, but can be anything.
+ '';
+ };
+
+ modules = mkOption {
+ type = types.attrsOf types.package;
+ description = "A set of modules to load.";
+ default = {};
+ example = literalExample ''
+ {
+ "dummy.so" = pkgs.stdenv.mkDerivation {
+ name = "zabbix-dummy-module-''${cfg.package.version}";
+ src = cfg.package.src;
+ buildInputs = [ cfg.package ];
+ sourceRoot = "zabbix-''${cfg.package.version}/src/modules/dummy";
+ installPhase = '''
+ mkdir -p $out/lib
+ cp dummy.so $out/lib/
+ ''';
+ };
+ }
+ '';
+ };
+
+ server = mkOption {
+ type = types.str;
+ description = ''
+ The IP address or hostname of the Zabbix server to connect to.
+ '';
+ };
+
+ listen = {
+ ip = mkOption {
+ type = types.str;
+ default = "0.0.0.0";
+ description = ''
+ List of comma delimited IP addresses that the agent should listen on.
+ '';
+ };
+
+ port = mkOption {
+ type = types.port;
+ default = 10050;
+ description = ''
+ Agent will listen on this port for connections from the server.
+ '';
+ };
+ };
+
+ openFirewall = mkOption {
+ type = types.bool;
+ default = false;
+ description = ''
+ Open ports in the firewall for the Zabbix Agent.
+ '';
+ };
+
+ # TODO: for bonus points migrate this to https://github.com/NixOS/rfcs/pull/42
+ extraConfig = mkOption {
+ default = "";
+ type = types.lines;
+ description = ''
+ Configuration that is injected verbatim into the configuration file. Refer to
+ <link xlink:href="https://www.zabbix.com/documentation/current/manual/appendix/config/zabbix_agentd"/>
+ for details on supported values.
+ '';
+ };
+
+ };
+
+ };
+
+ # implementation
+
+ config = mkIf cfg.enable {
+
+ networking.firewall = mkIf cfg.openFirewall {
+ allowedTCPPorts = [ cfg.listen.port ];
+ };
+
+ users.users.${user} = {
+ description = "Zabbix Agent daemon user";
+ inherit group;
+ };
+
+ users.groups.${group} = { };
+
+ systemd.services.zabbix-agent = {
+ description = "Zabbix Agent";
+
+ wantedBy = [ "multi-user.target" ];
+
+ path = [ "/run/wrappers" ] ++ cfg.extraPackages;
+
+ serviceConfig = {
+ ExecStart = "@${cfg.package}/sbin/zabbix_agentd zabbix_agentd -f --config ${configFile}";
+ Restart = "always";
+ RestartSec = 2;
+
+ User = user;
+ Group = group;
+ PrivateTmp = true;
+ };
+ };
+
+ };
+
+}