nixos/prometheus-node-exporter: fix netdev collect

Netdev collector needs AF_NETLINK permissions to work. It will fail with
the message "couldn't get netstats: socket: address family is not
supported by protocol" otherwise.
This commit is contained in:
KFears
2022-10-30 14:59:05 +04:00
parent 593929c748
commit b3782f29ff

View File

@@ -4,6 +4,8 @@ with lib;
let let
cfg = config.services.prometheus.exporters.node; cfg = config.services.prometheus.exporters.node;
collectorIsEnabled = final: any (collector: (final == collector)) cfg.enabledCollectors;
collectorIsDisabled = final: any (collector: (final == collector)) cfg.disabledCollectors;
in in
{ {
port = 9100; port = 9100;
@@ -35,15 +37,15 @@ in
${concatMapStringsSep " " (x: "--no-collector." + x) cfg.disabledCollectors} \ ${concatMapStringsSep " " (x: "--no-collector." + x) cfg.disabledCollectors} \
--web.listen-address ${cfg.listenAddress}:${toString cfg.port} ${concatStringsSep " " cfg.extraFlags} --web.listen-address ${cfg.listenAddress}:${toString cfg.port} ${concatStringsSep " " cfg.extraFlags}
''; '';
RestrictAddressFamilies = optionals (any (collector: (collector == "logind" || collector == "systemd")) cfg.enabledCollectors) [ RestrictAddressFamilies = optionals (collectorIsEnabled "logind" || collectorIsEnabled "systemd") [
# needs access to dbus via unix sockets (logind/systemd) # needs access to dbus via unix sockets (logind/systemd)
"AF_UNIX" "AF_UNIX"
] ++ optionals (any (collector: (collector == "network_route" || collector == "wifi")) cfg.enabledCollectors) [ ] ++ optionals (collectorIsEnabled "network_route" || collectorIsEnabled "wifi" || ! collectorIsDisabled "netdev") [
# needs netlink sockets for wireless collector # needs netlink sockets for wireless collector
"AF_NETLINK" "AF_NETLINK"
]; ];
# The timex collector needs to access clock APIs # The timex collector needs to access clock APIs
ProtectClock = any (collector: collector == "timex") cfg.disabledCollectors; ProtectClock = collectorIsDisabled "timex";
# Allow space monitoring under /home # Allow space monitoring under /home
ProtectHome = true; ProtectHome = true;
}; };