remove bundle:netdata - we have telegraf and grafana now
All checks were successful
bundlewrap/pipeline/head This commit looks good

This commit is contained in:
Franzi 2021-06-05 13:28:25 +02:00
parent 91cf6cd1e5
commit 72d4826dbb
Signed by: kunsi
GPG key ID: 12E3D2136B818350
9 changed files with 1 additions and 103 deletions

View file

@ -1,16 +0,0 @@
[global]
run as user = netdata
hostname = ${node.name}
memory mode = save
history = 86400
[web]
web files owner = root
web files group = root
bind to = 0.0.0.0
[registry]
enabled = no
[health]
enabled = no

View file

@ -1,17 +0,0 @@
files = {
'/etc/netdata/netdata.conf': {
'content_type': 'mako',
'triggers': {
'svc_systemd:netdata:restart',
}
},
}
svc_systemd = {
'netdata': {
'needs': {
'pkg_apt:netdata',
'file:/etc/netdata/netdata.conf',
},
},
}

View file

@ -1,31 +0,0 @@
from bundlewrap.metadata import atomic
defaults = {
'apt': {
'packages': {
'netdata': {},
},
},
'icinga2_api': {
'netdata': {
'services': {
'NETDATA PROCESS': {
'command_on_monitored_host': '/usr/lib/nagios/plugins/check_procs -C netdata -c 1:',
},
},
},
},
}
@metadata_reactor.provides(
'firewall/port_rules/19999',
)
def firewall(metadata):
return {
'firewall': {
'port_rules': {
'19999': atomic(metadata.get('netdata/restrict-to', set())),
},
},
}

View file

@ -1,10 +0,0 @@
jobs:
- name: local
address: 127.0.0.1:8953
timeout: 1
conf_path: /etc/unbound/unbound.conf
cumulative_stats: no
use_tls: yes
tls_skip_verify: no
tls_cert: /etc/unbound/unbound_control.pem
tls_key: /etc/unbound/unbound_control.key

View file

@ -41,7 +41,7 @@ server:
tls-cert-bundle: "/etc/ssl/certs/ca-certificates.crt"
remote-control:
% if node.has_bundle('netdata') or node.has_bundle('telegraf'):
% if node.has_bundle('telegraf'):
control-enable: yes
% else:
control-enable: no

View file

@ -43,14 +43,6 @@ if node.has_bundle('systemd-networkd'):
'file:/etc/resolv.conf',
}
if node.has_bundle('netdata'):
files['/etc/netdata/go.d/unbound.conf'] = {
'source': 'netdata-unbound.yaml',
'triggers': {
'svc_systemd:netdata:restart',
},
}
if node.has_bundle('pppd'):
files['/etc/systemd/system/unbound.service.d/bundlewrap.conf'] = {
'source': 'override.conf',

View file

@ -1,7 +1,6 @@
nodes['home.downloadhelper'] = {
'hostname': '172.19.138.27',
'bundles': {
'netdata',
'nfs-client',
'transmission',
},
@ -34,11 +33,6 @@ nodes['home.downloadhelper'] = {
'enp1s0.42',
},
},
'netdata': {
'restrict-to': {
'172.19.136.0/22',
},
},
'nfs-client': {
'mounts': {
'storage': {

View file

@ -6,7 +6,6 @@ nodes['home.nas'] = {
'backup-server',
'lm-sensors',
'mosquitto',
'netdata',
'nfs-server',
'scansnap',
'smartd',
@ -110,12 +109,6 @@ nodes['home.nas'] = {
'172.19.138.0/24',
},
},
'netdata': {
'restrict-to': {
'172.19.136.0/25',
'172.19.138.0/24',
},
},
'nfs-server': {
'shares': {
'/storage/download': {

View file

@ -2,7 +2,6 @@ nodes['home.router'] = {
'hostname': '172.19.138.1',
'bundles': {
'dhcpd',
'netdata',
'nginx',
'openvpn-client',
'pppd',
@ -116,12 +115,6 @@ nodes['home.router'] = {
],
},
},
'netdata': {
'restrict-to': {
'172.19.136.0/25',
'172.19.138.0/24',
},
},
'nginx': {
'restrict-to': {
'172.19.136.0/25',