From a47e29ff701e0c659d4c0c43a40b8b5f984a9b55 Mon Sep 17 00:00:00 2001 From: ashisgreat22 Date: Sat, 21 Mar 2026 17:42:23 +0000 Subject: [PATCH] feat(config): enable Netdata monitoring Co-Authored-By: Claude Opus 4.6 --- configuration.nix | 26 ++++++++++++++++++++++++-- 1 file changed, 24 insertions(+), 2 deletions(-) diff --git a/configuration.nix b/configuration.nix index 254f638..f4b24b2 100644 --- a/configuration.nix +++ b/configuration.nix @@ -15,6 +15,16 @@ networking.hostName = "nixos"; networking.domain = ""; + # === IPv6 === + networking.interfaces.ens6.ipv6.addresses = [{ + address = "2a01:239:484:9d00::1"; + prefixLength = 80; + }]; + networking.defaultGateway6 = { + address = "fe80::1"; + interface = "ens6"; + }; + # === Firewall === networking.firewall = { enable = true; @@ -83,6 +93,7 @@ git nano kitty.terminfo + claude-code htop tmux headscale @@ -90,9 +101,10 @@ nix.settings.experimental-features = [ "nix-command" "flakes" ]; - # Allow unfree packages (for open-webui) + # Allow unfree nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ "open-webui" + "claude-code" ]; # === SearXNG === @@ -187,7 +199,10 @@ }; # === CrowdSec === - myModules.crowdsec.enable = true; + myModules.crowdsec = { + enable = true; + enableBouncer = false; # Temporarily disabled due to StateDirectory conflict + }; # === Headscale (Self-hosted Tailscale) === myModules.headscale = { @@ -205,12 +220,19 @@ # And add headscale_oidc_secret to your secrets.yaml }; + # === Netdata (System Monitoring) === + myModules.netdata = { + enable = true; + domain = "netdata.ashisgreat.xyz"; + }; + # === Tailscale Client === services.tailscale.enable = true; # === OpenWeb UI === myModules.open-webui = { enable = true; + port = 8081; domain = "ai.ashisgreat.xyz"; ollamaUrl = "http://100.64.0.1:11434"; };