Compare commits

..

2 commits

Author SHA1 Message Date
599690ede5
Fix DHCP server
All checks were successful
EVAL x86_64-linux.picard
BUILD x86_64-linux.picard
UPLOAD x86_64-linux.picard
DOWNLOAD x86_64-linux.picard
CACHIX x86_64-linux.picard
ATTIC x86_64-linux.picard
/ test (push) Successful in 2m19s
2025-04-29 11:06:59 +02:00
ddd85e4830
Disable promtail on sisko 2025-04-29 11:06:45 +02:00
2 changed files with 20 additions and 2 deletions

View file

@ -21,7 +21,6 @@
"grafana" "grafana"
"prometheus-exporters" "prometheus-exporters"
"loki" "loki"
"promtail"
"restic" "restic"
"atuin" "atuin"
"immich" "immich"

View file

@ -1,4 +1,7 @@
{ config, lib, ... }: { config, lib, ... }:
let
interface = "enP4p65s0";
in
{ {
services.adguardhome = { services.adguardhome = {
enable = true; enable = true;
@ -6,7 +9,7 @@
settings = { settings = {
dhcp = { dhcp = {
enabled = true; enabled = true;
interface_name = "enP4p65s0"; interface_name = interface;
dhcpv4 = { dhcpv4 = {
gateway_ip = "10.1.1.1"; gateway_ip = "10.1.1.1";
@ -28,6 +31,7 @@
}; };
}; };
# otherwise it creates a directory in /var/lib/private which can't be easily persisted
systemd.services.adguardhome.serviceConfig.DynamicUser = lib.mkForce false; systemd.services.adguardhome.serviceConfig.DynamicUser = lib.mkForce false;
networking.firewall.allowedUDPPorts = [ networking.firewall.allowedUDPPorts = [
@ -35,6 +39,21 @@
67 67
]; ];
networking.firewall.allowedTCPPorts = [ 53 ]; networking.firewall.allowedTCPPorts = [ 53 ];
networking.interfaces.${interface} = {
ipv4.addresses = [
{
address = "10.1.1.2";
prefixLength = 24;
}
];
useDHCP = false;
};
networking.defaultGateway = "10.1.1.1";
networking.nameservers = [ "127.0.0.1" ];
environment.persistence."/persist".directories = [ environment.persistence."/persist".directories = [
"/var/lib/AdGuardHome" "/var/lib/AdGuardHome"
]; ];