{ config, lib, pkgs, options }: with lib; let cfg = config.services.prometheus.exporters.node; in { port = 9100; extraOpts = { enabledCollectors = mkOption { type = types.listOf types.str; default = []; example = [ "systemd" ]; description = '' Collectors to enable. The collectors listed here are enabled in addition to the default ones. ''; }; disabledCollectors = mkOption { type = types.listOf types.str; default = []; example = [ "timex" ]; description = '' Collectors to disable which are enabled by default. ''; }; }; serviceOpts = { serviceConfig = { DynamicUser = false; RuntimeDirectory = "prometheus-node-exporter"; ExecStart = '' ${pkgs.prometheus-node-exporter}/bin/node_exporter \ ${concatMapStringsSep " " (x: "--collector." + x) cfg.enabledCollectors} \ ${concatMapStringsSep " " (x: "--no-collector." + x) cfg.disabledCollectors} \ --web.listen-address ${cfg.listenAddress}:${toString cfg.port} ${concatStringsSep " " cfg.extraFlags} ''; RestrictAddressFamilies = optionals (any (collector: (collector == "logind" || collector == "systemd")) cfg.enabledCollectors) [ # needs access to dbus via unix sockets (logind/systemd) "AF_UNIX" ] ++ optionals (any (collector: (collector == "network_route" || collector == "wifi")) cfg.enabledCollectors) [ # needs netlink sockets for wireless collector "AF_NETLINK" ]; # The timex collector needs to access clock APIs ProtectClock = any (collector: collector == "timex") cfg.disabledCollectors; }; }; }