mirror of
https://github.com/oddlama/nix-config.git
synced 2025-10-11 07:10:39 +02:00
chore: dont use adguardhome for servers
This commit is contained in:
parent
13d9baedc1
commit
836cd7c6c2
9 changed files with 25 additions and 9 deletions
|
@ -49,7 +49,6 @@ in {
|
|||
bind_host = config.meta.wireguard.proxy-sentinel.ipv4;
|
||||
bind_port = 3000;
|
||||
dns = {
|
||||
edns_client_subnet.enabled = false;
|
||||
bind_hosts = [
|
||||
# This dummy address passes the configuration check and will
|
||||
# later be replaced by the actual interface address.
|
||||
|
@ -60,15 +59,15 @@ in {
|
|||
#trusted_proxied = [];
|
||||
ratelimit = 60;
|
||||
upstream_dns = [
|
||||
"1.1.1.1"
|
||||
"2606:4700:4700::1111"
|
||||
"8.8.8.8"
|
||||
"8.8.4.4"
|
||||
"2001:4860:4860::8888"
|
||||
"2001:4860:4860::8844"
|
||||
];
|
||||
bootstrap_dns = [
|
||||
"1.1.1.1"
|
||||
"2606:4700:4700::1111"
|
||||
"8.8.8.8"
|
||||
"8.8.4.4"
|
||||
"2001:4860:4860::8888"
|
||||
"2001:4860:4860::8844"
|
||||
];
|
||||
dhcp.enabled = false;
|
||||
|
@ -82,5 +81,6 @@ in {
|
|||
INTERFACE_ADDR=$(${pkgs.iproute2}/bin/ip -family inet -brief addr show wan | grep -o "[0-9]\+\.[0-9]\+\.[0-9]\+\.[0-9]\+")
|
||||
sed -i -e "s/123.123.123.123/$INTERFACE_ADDR/" "$STATE_DIRECTORY/AdGuardHome.yaml"
|
||||
'';
|
||||
serviceConfig.RestartSec = lib.mkForce "600"; # Retry every 10 minutes
|
||||
};
|
||||
}
|
||||
|
|
|
@ -129,5 +129,8 @@ in {
|
|||
};
|
||||
};
|
||||
|
||||
systemd.services.grafana.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
systemd.services.grafana = {
|
||||
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
|
||||
};
|
||||
}
|
||||
|
|
|
@ -59,5 +59,8 @@ in {
|
|||
};
|
||||
};
|
||||
|
||||
systemd.services.influxdb2.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
systemd.services.influxdb2 = {
|
||||
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
|
||||
};
|
||||
}
|
||||
|
|
|
@ -72,5 +72,8 @@ in {
|
|||
};
|
||||
};
|
||||
|
||||
systemd.services.kanidm.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
systemd.services.kanidm = {
|
||||
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
|
||||
};
|
||||
}
|
||||
|
|
|
@ -127,5 +127,8 @@ in {
|
|||
};
|
||||
};
|
||||
|
||||
systemd.services.loki.after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
systemd.services.loki = {
|
||||
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
|
||||
};
|
||||
}
|
||||
|
|
|
@ -90,5 +90,6 @@ in {
|
|||
systemd.services.vaultwarden = {
|
||||
after = ["sys-subsystem-net-devices-${utils.escapeSystemdPath "proxy-sentinel"}.device"];
|
||||
serviceConfig.StateDirectory = lib.mkForce "vaultwarden";
|
||||
serviceConfig.RestartSec = "600"; # Retry every 10 minutes
|
||||
};
|
||||
}
|
||||
|
|
|
@ -41,6 +41,7 @@ in {
|
|||
};
|
||||
"10-wan" = {
|
||||
DHCP = "yes";
|
||||
dhcpConfig.UseDNS = false;
|
||||
#address = [
|
||||
# "192.168.178.2/24"
|
||||
# "fdee::1/64"
|
||||
|
|
|
@ -16,6 +16,7 @@ in {
|
|||
systemd.network.networks = {
|
||||
"10-lan1" = {
|
||||
DHCP = "yes";
|
||||
dhcpConfig.UseDNS = false;
|
||||
matchConfig.MACAddress = config.repo.secrets.local.networking.interfaces.lan1.mac;
|
||||
networkConfig = {
|
||||
IPv6PrivacyExtensions = "yes";
|
||||
|
|
|
@ -174,6 +174,7 @@
|
|||
"10-${vmCfg.networking.mainLinkName}" = {
|
||||
matchConfig.MACAddress = mac;
|
||||
DHCP = "yes";
|
||||
dhcpConfig.UseDNS = false;
|
||||
networkConfig = {
|
||||
IPv6PrivacyExtensions = "yes";
|
||||
MulticastDNS = true;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue