mirror of
https://github.com/SebastianWendel/nixpkgs.git
synced 2024-09-20 12:29:02 +02:00
Merge pull request #271481 from eliandoran/feature/snmpd
nixos/snmpd: init
This commit is contained in:
commit
3bf05ba941
|
@ -834,6 +834,7 @@
|
||||||
./services/monitoring/riemann.nix
|
./services/monitoring/riemann.nix
|
||||||
./services/monitoring/scollector.nix
|
./services/monitoring/scollector.nix
|
||||||
./services/monitoring/smartd.nix
|
./services/monitoring/smartd.nix
|
||||||
|
./services/monitoring/snmpd.nix
|
||||||
./services/monitoring/statsd.nix
|
./services/monitoring/statsd.nix
|
||||||
./services/monitoring/sysstat.nix
|
./services/monitoring/sysstat.nix
|
||||||
./services/monitoring/teamviewer.nix
|
./services/monitoring/teamviewer.nix
|
||||||
|
|
83
nixos/modules/services/monitoring/snmpd.nix
Normal file
83
nixos/modules/services/monitoring/snmpd.nix
Normal file
|
@ -0,0 +1,83 @@
|
||||||
|
{ pkgs, config, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.snmpd;
|
||||||
|
configFile = if cfg.configText != "" then
|
||||||
|
pkgs.writeText "snmpd.cfg" ''
|
||||||
|
${cfg.configText}
|
||||||
|
'' else null;
|
||||||
|
in {
|
||||||
|
options.services.snmpd = {
|
||||||
|
enable = lib.mkEnableOption "snmpd";
|
||||||
|
|
||||||
|
package = lib.mkPackageOption pkgs "net-snmp" {};
|
||||||
|
|
||||||
|
listenAddress = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "0.0.0.0";
|
||||||
|
description = lib.mdDoc ''
|
||||||
|
The address to listen on for SNMP and AgentX messages.
|
||||||
|
'';
|
||||||
|
example = "127.0.0.1";
|
||||||
|
};
|
||||||
|
|
||||||
|
port = lib.mkOption {
|
||||||
|
type = lib.types.port;
|
||||||
|
default = 161;
|
||||||
|
description = lib.mdDoc ''
|
||||||
|
The port to listen on for SNMP and AgentX messages.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
openFirewall = lib.mkOption {
|
||||||
|
type = lib.types.bool;
|
||||||
|
default = false;
|
||||||
|
description = lib.mdDoc ''
|
||||||
|
Open port in firewall for snmpd.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
configText = lib.mkOption {
|
||||||
|
type = lib.types.lines;
|
||||||
|
default = "";
|
||||||
|
description = lib.mdDoc ''
|
||||||
|
The contents of the snmpd.conf. If the {option}`configFile` option
|
||||||
|
is set, this value will be ignored.
|
||||||
|
|
||||||
|
Note that the contents of this option will be added to the Nix
|
||||||
|
store as world-readable plain text, {option}`configFile` can be used in
|
||||||
|
addition to a secret management tool to protect sensitive data.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
configFile = lib.mkOption {
|
||||||
|
type = lib.types.path;
|
||||||
|
default = configFile;
|
||||||
|
defaultText = lib.literalMD "The value of {option}`configText`.";
|
||||||
|
description = lib.mdDoc ''
|
||||||
|
Path to the snmpd.conf file. By default, if {option}`configText` is set,
|
||||||
|
a config file will be automatically generated.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
systemd.services."snmpd" = {
|
||||||
|
description = "Simple Network Management Protocol (SNMP) daemon.";
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "simple";
|
||||||
|
ExecStart = "${lib.getExe' cfg.package "snmpd"} -f -Lo -c ${cfg.configFile} ${cfg.listenAddress}:${toString cfg.port}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
networking.firewall.allowedUDPPorts = lib.mkIf cfg.openFirewall [
|
||||||
|
cfg.port
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
meta.maintainers = [ lib.maintainers.eliandoran ];
|
||||||
|
|
||||||
|
}
|
|
@ -773,6 +773,7 @@ in {
|
||||||
sing-box = handleTest ./sing-box.nix {};
|
sing-box = handleTest ./sing-box.nix {};
|
||||||
slimserver = handleTest ./slimserver.nix {};
|
slimserver = handleTest ./slimserver.nix {};
|
||||||
slurm = handleTest ./slurm.nix {};
|
slurm = handleTest ./slurm.nix {};
|
||||||
|
snmpd = handleTest ./snmpd.nix {};
|
||||||
smokeping = handleTest ./smokeping.nix {};
|
smokeping = handleTest ./smokeping.nix {};
|
||||||
snapcast = handleTest ./snapcast.nix {};
|
snapcast = handleTest ./snapcast.nix {};
|
||||||
snapper = handleTest ./snapper.nix {};
|
snapper = handleTest ./snapper.nix {};
|
||||||
|
|
23
nixos/tests/snmpd.nix
Normal file
23
nixos/tests/snmpd.nix
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
import ./make-test-python.nix ({ pkgs, lib, ... }: {
|
||||||
|
name = "snmpd";
|
||||||
|
|
||||||
|
nodes.snmpd = {
|
||||||
|
environment.systemPackages = with pkgs; [
|
||||||
|
net-snmp
|
||||||
|
];
|
||||||
|
|
||||||
|
services.snmpd = {
|
||||||
|
enable = true;
|
||||||
|
configText = ''
|
||||||
|
rocommunity public
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
start_all();
|
||||||
|
machine.wait_for_unit("snmpd.service")
|
||||||
|
machine.succeed("snmpwalk -v 2c -c public localhost | grep SNMPv2-MIB::sysName.0");
|
||||||
|
'';
|
||||||
|
|
||||||
|
})
|
Loading…
Reference in a new issue