mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-15 14:26:33 +01:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
234 lines
7.1 KiB
Nix
234 lines
7.1 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.elasticsearch;
|
|
|
|
es7 = builtins.compareVersions cfg.package.version "7" >= 0;
|
|
|
|
esConfig = ''
|
|
network.host: ${cfg.listenAddress}
|
|
cluster.name: ${cfg.cluster_name}
|
|
${lib.optionalString cfg.single_node "discovery.type: single-node"}
|
|
${lib.optionalString (cfg.single_node && es7) "gateway.auto_import_dangling_indices: true"}
|
|
|
|
http.port: ${toString cfg.port}
|
|
transport.port: ${toString cfg.tcp_port}
|
|
|
|
${cfg.extraConf}
|
|
'';
|
|
|
|
configDir = cfg.dataDir + "/config";
|
|
|
|
elasticsearchYml = pkgs.writeTextFile {
|
|
name = "elasticsearch.yml";
|
|
text = esConfig;
|
|
};
|
|
|
|
loggingConfigFilename = "log4j2.properties";
|
|
loggingConfigFile = pkgs.writeTextFile {
|
|
name = loggingConfigFilename;
|
|
text = cfg.logging;
|
|
};
|
|
|
|
esPlugins = pkgs.buildEnv {
|
|
name = "elasticsearch-plugins";
|
|
paths = cfg.plugins;
|
|
postBuild = "${pkgs.coreutils}/bin/mkdir -p $out/plugins";
|
|
};
|
|
|
|
in
|
|
{
|
|
|
|
###### interface
|
|
|
|
options.services.elasticsearch = {
|
|
enable = mkOption {
|
|
description = "Whether to enable elasticsearch.";
|
|
default = false;
|
|
type = types.bool;
|
|
};
|
|
|
|
package = mkPackageOption pkgs "elasticsearch" { };
|
|
|
|
listenAddress = mkOption {
|
|
description = "Elasticsearch listen address.";
|
|
default = "127.0.0.1";
|
|
type = types.str;
|
|
};
|
|
|
|
port = mkOption {
|
|
description = "Elasticsearch port to listen for HTTP traffic.";
|
|
default = 9200;
|
|
type = types.port;
|
|
};
|
|
|
|
tcp_port = mkOption {
|
|
description = "Elasticsearch port for the node to node communication.";
|
|
default = 9300;
|
|
type = types.int;
|
|
};
|
|
|
|
cluster_name = mkOption {
|
|
description = "Elasticsearch name that identifies your cluster for auto-discovery.";
|
|
default = "elasticsearch";
|
|
type = types.str;
|
|
};
|
|
|
|
single_node = mkOption {
|
|
description = "Start a single-node cluster";
|
|
default = true;
|
|
type = types.bool;
|
|
};
|
|
|
|
extraConf = mkOption {
|
|
description = "Extra configuration for elasticsearch.";
|
|
default = "";
|
|
type = types.str;
|
|
example = ''
|
|
node.name: "elasticsearch"
|
|
node.master: true
|
|
node.data: false
|
|
'';
|
|
};
|
|
|
|
logging = mkOption {
|
|
description = "Elasticsearch logging configuration.";
|
|
default = ''
|
|
logger.action.name = org.elasticsearch.action
|
|
logger.action.level = info
|
|
|
|
appender.console.type = Console
|
|
appender.console.name = console
|
|
appender.console.layout.type = PatternLayout
|
|
appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] %marker%m%n
|
|
|
|
rootLogger.level = info
|
|
rootLogger.appenderRef.console.ref = console
|
|
'';
|
|
type = types.str;
|
|
};
|
|
|
|
dataDir = mkOption {
|
|
type = types.path;
|
|
default = "/var/lib/elasticsearch";
|
|
description = ''
|
|
Data directory for elasticsearch.
|
|
'';
|
|
};
|
|
|
|
extraCmdLineOptions = mkOption {
|
|
description = "Extra command line options for the elasticsearch launcher.";
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
};
|
|
|
|
extraJavaOptions = mkOption {
|
|
description = "Extra command line options for Java.";
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
example = [ "-Djava.net.preferIPv4Stack=true" ];
|
|
};
|
|
|
|
plugins = mkOption {
|
|
description = "Extra elasticsearch plugins";
|
|
default = [ ];
|
|
type = types.listOf types.package;
|
|
example = lib.literalExpression "[ pkgs.elasticsearchPlugins.discovery-ec2 ]";
|
|
};
|
|
|
|
restartIfChanged = mkOption {
|
|
type = types.bool;
|
|
description = ''
|
|
Automatically restart the service on config change.
|
|
This can be set to false to defer restarts on a server or cluster.
|
|
Please consider the security implications of inadvertently running an older version,
|
|
and the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.
|
|
'';
|
|
default = true;
|
|
};
|
|
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
systemd.services.elasticsearch = {
|
|
description = "Elasticsearch Daemon";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
path = [ pkgs.inetutils ];
|
|
inherit (cfg) restartIfChanged;
|
|
environment = {
|
|
ES_HOME = cfg.dataDir;
|
|
ES_JAVA_OPTS = toString cfg.extraJavaOptions;
|
|
ES_PATH_CONF = configDir;
|
|
};
|
|
serviceConfig = {
|
|
ExecStart = "${cfg.package}/bin/elasticsearch ${toString cfg.extraCmdLineOptions}";
|
|
User = "elasticsearch";
|
|
PermissionsStartOnly = true;
|
|
LimitNOFILE = "1024000";
|
|
Restart = "always";
|
|
TimeoutStartSec = "infinity";
|
|
};
|
|
preStart = ''
|
|
${optionalString (!config.boot.isContainer) ''
|
|
# Only set vm.max_map_count if lower than ES required minimum
|
|
# This avoids conflict if configured via boot.kernel.sysctl
|
|
if [ `${pkgs.procps}/bin/sysctl -n vm.max_map_count` -lt 262144 ]; then
|
|
${pkgs.procps}/bin/sysctl -w vm.max_map_count=262144
|
|
fi
|
|
''}
|
|
|
|
mkdir -m 0700 -p ${cfg.dataDir}
|
|
|
|
# Install plugins
|
|
ln -sfT ${esPlugins}/plugins ${cfg.dataDir}/plugins
|
|
ln -sfT ${cfg.package}/lib ${cfg.dataDir}/lib
|
|
ln -sfT ${cfg.package}/modules ${cfg.dataDir}/modules
|
|
|
|
# elasticsearch needs to create the elasticsearch.keystore in the config directory
|
|
# so this directory needs to be writable.
|
|
mkdir -m 0700 -p ${configDir}
|
|
|
|
# Note that we copy config files from the nix store instead of symbolically linking them
|
|
# because otherwise X-Pack Security will raise the following exception:
|
|
# java.security.AccessControlException:
|
|
# access denied ("java.io.FilePermission" "/var/lib/elasticsearch/config/elasticsearch.yml" "read")
|
|
|
|
cp ${elasticsearchYml} ${configDir}/elasticsearch.yml
|
|
# Make sure the logging configuration for old elasticsearch versions is removed:
|
|
rm -f "${configDir}/logging.yml"
|
|
cp ${loggingConfigFile} ${configDir}/${loggingConfigFilename}
|
|
mkdir -p ${configDir}/scripts
|
|
cp ${cfg.package}/config/jvm.options ${configDir}/jvm.options
|
|
# redirect jvm logs to the data directory
|
|
mkdir -m 0700 -p ${cfg.dataDir}/logs
|
|
${pkgs.sd}/bin/sd 'logs/gc.log' '${cfg.dataDir}/logs/gc.log' ${configDir}/jvm.options \
|
|
|
|
if [ "$(id -u)" = 0 ]; then chown -R elasticsearch:elasticsearch ${cfg.dataDir}; fi
|
|
'';
|
|
postStart = ''
|
|
# Make sure elasticsearch is up and running before dependents
|
|
# are started
|
|
while ! ${pkgs.curl}/bin/curl -sS -f http://${cfg.listenAddress}:${toString cfg.port} 2>/dev/null; do
|
|
sleep 1
|
|
done
|
|
'';
|
|
};
|
|
|
|
environment.systemPackages = [ cfg.package ];
|
|
|
|
users = {
|
|
groups.elasticsearch.gid = config.ids.gids.elasticsearch;
|
|
users.elasticsearch = {
|
|
uid = config.ids.uids.elasticsearch;
|
|
description = "Elasticsearch daemon user";
|
|
home = cfg.dataDir;
|
|
group = "elasticsearch";
|
|
};
|
|
};
|
|
};
|
|
}
|