diff options
-rw-r--r-- | nixos/modules/services/monitoring/prometheus/exporters/node.nix | 11 |
1 files changed, 6 insertions, 5 deletions
diff --git a/nixos/modules/services/monitoring/prometheus/exporters/node.nix b/nixos/modules/services/monitoring/prometheus/exporters/node.nix index 5e5fc7cd5524..d7579c199476 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters/node.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters/node.nix @@ -29,11 +29,12 @@ in serviceConfig = { DynamicUser = false; RuntimeDirectory = "prometheus-node-exporter"; - ExecStart = '' - ${pkgs.prometheus-node-exporter}/bin/node_exporter \ - ${concatMapStringsSep " " (x: "--collector." + x) cfg.enabledCollectors} \ - ${concatMapStringsSep " " (x: "--no-collector." + x) cfg.disabledCollectors} \ - --web.listen-address ${cfg.listenAddress}:${toString cfg.port} ${concatStringsSep " " cfg.extraFlags} + ExecStart = let + enabledCollectors = concatMapStringsSep " " (x: "--collector." + x) cfg.enabledCollectors; + disabledCollectors = concatMapStringsSep " " (x: "--no-collector." + x) cfg.disabledCollectors; + listenAddr = "--web.listen-address ${cfg.listenAddress}:${toString cfg.port} ${concatStringsSep " " cfg.extraFlags}"; + in '' + ${pkgs.prometheus-node-exporter}/bin/node_exporter ${enabledCollectors} ${disabledCollectors} ${listenAddr} ''; RestrictAddressFamilies = optionals (any (collector: (collector == "logind" || collector == "systemd")) cfg.enabledCollectors) [ # needs access to dbus via unix sockets (logind/systemd) |