{ self, ... }: { modulesPath, lib, config, ... }: { imports = [ (modulesPath + "/virtualisation/lxc-container.nix") ../../users/root ../../users/erwin ./grafana ./loki ./prometheus ./promtail ]; eboskma = { users.erwin = { enable = true; server = true; }; nix-common = { enable = true; remote-builders = true; }; tailscale.enable = true; }; boot = { isContainer = true; }; time.timeZone = "Europe/Amsterdam"; system.configurationRevision = lib.mkIf (self ? rev) self.rev; networking = { hostName = "saga"; useDHCP = false; useHostResolvConf = false; networkmanager.enable = false; useNetworkd = true; nftables.enable = true; firewall.trustedInterfaces = [ "tailscale0" ]; }; systemd.network = { enable = true; wait-online.anyInterface = true; networks = { "40-eth0" = { matchConfig = { Name = "eth0"; }; networkConfig = { Address = "10.0.0.212/24"; Gateway = "10.0.0.1"; DNS = "10.0.0.206"; DHCP = "no"; }; }; }; }; security = { sudo-rs = { enable = true; execWheelOnly = true; wheelNeedsPassword = false; }; sudo.enable = false; }; sops.defaultSopsFile = ./secrets.yaml; sops.secrets = { metrics_ca = { owner = config.systemd.services.prometheus.serviceConfig.User; }; metrics_cert = { owner = config.systemd.services.prometheus.serviceConfig.User; }; metrics_key = { owner = config.systemd.services.prometheus.serviceConfig.User; }; grafana-oauth2-secret = { owner = config.systemd.services.grafana.serviceConfig.User; }; }; system.stateVersion = "24.05"; }