Files
nixos/roles/dbserver-postgresql.nix

74 lines
1.9 KiB
Nix

# Module: roles/dbserver-postgresql
# Enables a database server running PostgreSQL
{
config,
lib,
pkgs,
pkgsUnstable,
inputs,
...
}:
with lib;
let
cfg = config.dbserver-postgresql;
defaultPostgresPackage = pkgs.postgresql;
defaultPsycopg2Package = pkgs.python313Packages.psycopg2;
in
{
options.dbserver-postgresql = {
enable = mkEnableOption "Enables dbserver-postgresql role";
dbPackage = mkOption {
type = types.package;
default = defaultPostgresPackage;
description = "Package to use for the database server";
example = postgresql;
};
};
config = mkIf cfg.enable {
environment.systemPackages = with pkgs; [
cfg.dbPackage
(python3.withPackages (ps: with ps; [ psycopg2 ]))
];
services.postgresql = {
enable = true;
package = cfg.dbPackage;
enableTCPIP = true;
settings = {
ssl = "off";
};
authentication = pkgs.lib.mkOverride 10 ''
local replication all trust
local all all peer
local all all scram-sha-256
host all all all scram-sha-256
'';
};
environment.etc."alloy/postgresql.alloy".text = ''
prometheus.exporter.postgres "postgresql" {
data_source_names = ["postgresql://alloy:{{ postgres_role_alloy_pass }}@localhost:${config.services.postgresql.settings.port}/postgres?sslmode=disable"]
autodiscovery {
enabled = true
database_denylist = ["postgres", "template0", "template1"]
}
enabled_collectors = ["database", "locks", "long_running_transactions", "replication", "replication_slot", "stat_database", "stat_user_tables", "statio_user_tables", "wal"]
}
prometheus.scrape "postgresql_scrape" {
targets = prometheus.exporter.postgres.postgresql.targets
forward_to = [prometheus.remote_write.default.receiver]
}
'';
};
}