Update podman.nix

This commit is contained in:
albert 2025-02-24 13:26:23 -08:00
parent 00029a7d3c
commit 43e8db6119
Signed by: albert
GPG key ID: 3895DD267CA11BA9
2 changed files with 36 additions and 37 deletions
nixos/common/services

View file

@ -1,11 +1,10 @@
{ pkgs, ... }: {
# Need to increase this because the number of
# containers I have drive the defaults over the max
boot.kernel.sysctl = {
"fs.inotify.max_user_watches" = 52428800;
"fs.inotify.max_user_instances" = 4096;
# Testing...
# "net.core.netdev_max_backlog" = 4000;
# "net.ipv4.tcp_max_syn_backlog" = 4096;
};
# Allow Docker containers to access Tailscale network

View file

@ -1,39 +1,39 @@
{ inputs, pkgs, system, ... }: {
# Need to increase this because the number of
# containers I have drive the defaults over the max
boot.kernel.sysctl = {
"fs.inotify.max_user_watches" = 10485760;
"fs.inotify.max_user_instances" = 1024;
};
# Allow Docker containers to access Tailscale network
networking.firewall = {
trustedInterfaces = [ "tailscale0" ];
allowedUDPPorts = [ 41641 ]; # Tailscale port
{ pkgs, ... }: {
# Need to increase this because the number of
# containers I have drive the defaults over the max
boot.kernel.sysctl = {
"fs.inotify.max_user_watches" = 10485760;
"fs.inotify.max_user_instances" = 1024;
};
virtualisation.podman = {
enable = true;
dockerSocket.enable = true;
dockerCompat = true;
autoPrune = {
enable = true;
dates = "weekly";
flags = [ "--all" ];
};
defaultNetwork.settings = {
dns_enabled = true;
};
};
# Allow Podman containers to access Tailscale network
networking.firewall = {
trustedInterfaces = [ "tailscale0" ];
allowedUDPPorts = [ 41641 ]; # Tailscale port
};
environment.systemPackages = with pkgs; [
podman-compose
podman-tui
];
# Add the docker telegraf listener
services.telegraf.extraConfig.inputs.docker = {
endpoint = "unix://run/podman/podman.sock";
virtualisation.podman = {
enable = true;
dockerSocket.enable = true;
dockerCompat = true;
autoPrune = {
enable = true;
dates = "weekly";
flags = [ "--all" ];
};
users.users.telegraf.extraGroups = [ "podman" ];
defaultNetwork.settings = {
dns_enabled = true;
};
};
environment.systemPackages = with pkgs; [
podman-compose
podman-tui
];
# Add the docker telegraf listener
services.telegraf.extraConfig.inputs.docker = {
endpoint = "unix://run/podman/podman.sock";
};
users.users.telegraf.extraGroups = [ "podman" ];
}