Loading nixos/modules/services/monitoring/prometheus/default.nix +23 −0 Original line number Diff line number Diff line Loading @@ -201,6 +201,26 @@ let }; }; promTypes.sigv4 = types.submodule { options = { region = mkOpt types.str '' The AWS region. ''; access_key = mkOpt types.str '' The Access Key ID. ''; secret_key = mkOpt types.str '' The Secret Access Key. ''; profile = mkOpt types.str '' The named AWS profile used to authenticate. ''; role_arn = mkOpt types.str '' The AWS role ARN. ''; }; }; promTypes.tls_config = types.submodule { options = { ca_file = mkOpt types.str '' Loading Loading @@ -1464,6 +1484,9 @@ let Sets the `Authorization` header on every remote write request with the bearer token read from the configured file. It is mutually exclusive with `bearer_token`. ''; sigv4 = mkOpt promTypes.sigv4 '' Configures AWS Signature Version 4 settings. ''; tls_config = mkOpt promTypes.tls_config '' Configures the remote write request's TLS settings. ''; Loading Loading
nixos/modules/services/monitoring/prometheus/default.nix +23 −0 Original line number Diff line number Diff line Loading @@ -201,6 +201,26 @@ let }; }; promTypes.sigv4 = types.submodule { options = { region = mkOpt types.str '' The AWS region. ''; access_key = mkOpt types.str '' The Access Key ID. ''; secret_key = mkOpt types.str '' The Secret Access Key. ''; profile = mkOpt types.str '' The named AWS profile used to authenticate. ''; role_arn = mkOpt types.str '' The AWS role ARN. ''; }; }; promTypes.tls_config = types.submodule { options = { ca_file = mkOpt types.str '' Loading Loading @@ -1464,6 +1484,9 @@ let Sets the `Authorization` header on every remote write request with the bearer token read from the configured file. It is mutually exclusive with `bearer_token`. ''; sigv4 = mkOpt promTypes.sigv4 '' Configures AWS Signature Version 4 settings. ''; tls_config = mkOpt promTypes.tls_config '' Configures the remote write request's TLS settings. ''; Loading