infrastructure/machines/vault01/_configuration.nix
catvayor 3b766e6a2b
All checks were successful
build configuration / build_web02 (push) Successful in 1m47s
build configuration / build_storage01 (push) Successful in 1m50s
build configuration / build_compute01 (push) Successful in 1m56s
build configuration / build_vault01 (push) Successful in 2m0s
build configuration / build_web01 (push) Successful in 2m25s
lint / check (push) Successful in 39s
build configuration / build_geo02 (push) Successful in 1m26s
build configuration / build_geo01 (push) Successful in 1m30s
build configuration / build_rescue01 (push) Successful in 1m35s
build configuration / build_bridge01 (push) Successful in 1m28s
build configuration / push_to_cache_web02 (push) Successful in 1m33s
build configuration / push_to_cache_storage01 (push) Successful in 1m30s
build configuration / push_to_cache_geo01 (push) Successful in 1m43s
build configuration / push_to_cache_geo02 (push) Successful in 1m47s
build configuration / push_to_cache_compute01 (push) Successful in 2m18s
build configuration / push_to_cache_rescue01 (push) Successful in 1m46s
build configuration / push_to_cache_bridge01 (push) Successful in 1m36s
build configuration / push_to_cache_web01 (push) Successful in 2m26s
feat(ulogd): enabling ulogd
2024-09-08 12:21:08 +02:00

23 lines
370 B
Nix

{ lib, ... }:
lib.extra.mkConfig {
enabledModules = [
# List of modules to enable
];
enabledServices = [
# List of services to enable
"k-radius"
"networking"
"ups"
"ulogd"
];
extraConfig = {
services.netbird.enable = true;
services.nginx.enable = true;
networking.firewall.allowedTCPPorts = [ 80 ];
};
root = ./.;
}