diff --git a/nixos/modules/impermanence.nix b/nixos/modules/impermanence.nix index 5c6142e..267c9d1 100644 --- a/nixos/modules/impermanence.nix +++ b/nixos/modules/impermanence.nix @@ -39,7 +39,6 @@ config = mkIf cfg.enable { "/etc/ssh/ssh_host_ed25519_key.pub" "/etc/ssh/ssh_host_rsa_key" "/etc/ssh/ssh_host_rsa_key.pub" - "/var/lib/${config.services.prometheus.stateDir}" ]; }; environment.etc.machine-id.source = "${cfg.storagePath}/machine-id"; diff --git a/nixos/roles/default.nix b/nixos/roles/default.nix index b536d28..bc94eff 100644 --- a/nixos/roles/default.nix +++ b/nixos/roles/default.nix @@ -56,5 +56,5 @@ services = { PasswordAuthentication = false; }; }; -}; + }; } diff --git a/nixos/roles/prometheusNodeExporter.nix b/nixos/roles/prometheusNodeExporter.nix index e717411..749c6f4 100644 --- a/nixos/roles/prometheusNodeExporter.nix +++ b/nixos/roles/prometheusNodeExporter.nix @@ -1,3 +1,4 @@ +{config, ...}: { imports = [ ]; services.prometheus.exporters.node = { @@ -33,4 +34,5 @@ ]; }; networking.firewall.allowedTCPPorts = [ 9100 ]; + environment.persistence.${config.impermanence.name}.directories = [ "/var/lib/${config.services.prometheus.stateDir}" ]; }