diff --git a/nixos/modules/impermanence.nix b/nixos/modules/impermanence.nix index 267c9d1..5c6142e 100644 --- a/nixos/modules/impermanence.nix +++ b/nixos/modules/impermanence.nix @@ -39,6 +39,7 @@ config = mkIf cfg.enable { "/etc/ssh/ssh_host_ed25519_key.pub" "/etc/ssh/ssh_host_rsa_key" "/etc/ssh/ssh_host_rsa_key.pub" + "/var/lib/${config.services.prometheus.stateDir}" ]; }; environment.etc.machine-id.source = "${cfg.storagePath}/machine-id"; diff --git a/nixos/roles/default.nix b/nixos/roles/default.nix index bc94eff..b536d28 100644 --- a/nixos/roles/default.nix +++ b/nixos/roles/default.nix @@ -56,5 +56,5 @@ services = { PasswordAuthentication = false; }; }; - }; +}; } diff --git a/nixos/roles/prometheusNodeExporter.nix b/nixos/roles/prometheusNodeExporter.nix index 749c6f4..e717411 100644 --- a/nixos/roles/prometheusNodeExporter.nix +++ b/nixos/roles/prometheusNodeExporter.nix @@ -1,4 +1,3 @@ -{config, ...}: { imports = [ ]; services.prometheus.exporters.node = { @@ -34,5 +33,4 @@ ]; }; networking.firewall.allowedTCPPorts = [ 9100 ]; - environment.persistence.${config.impermanence.name}.directories = [ "/var/lib/${config.services.prometheus.stateDir}" ]; }