Blackbox Exporter是Prometheus社區提供的官方黑盒監控解決方案,其允許用戶通過:HTTP、HTTPS、DNS、TCP以及ICMP的方式對網絡進行探測。
1、安裝部署
cd /usr/loacl tar -xvf blackbox_exporter-0.14.0.linux-amd64.tar.gz ln -s /usr/local/blackbox_exporter-0.14.0.linux-amd64 /usr/local/blackbox_exporter cd /usr/local/blackbox_exporter;mkdir bin conf mv blackbox_exporter ./bin mv blackbox.yml ./conf
2、配置
modules:
http_2xx_check:
prober: http
timeout: 5s
http:
valid_status_codes: []
method: GET
icmp_check:
prober: icmp
timeout: 5s
icmp:
preferred_ip_protocol: "ip4"
dns_examplecom_check:
prober: dns
dns:
preferred_ip_protocol: "ip4"
query_name: "www.cnblogs.com"
3、啟動
nohup /usr/local/blackbox_exporter/bin/blackbox_exporter --config.file=/usr/local/blackbox_exporter/conf/blackbox.yml > blackbox_exporter.out 2>&1 &
4、prometheus.yml 配置
- job_name: 'http_probe'
metrics_path: /probe
params:
module: [http_2xx_check]
file_sd_configs:
- files:
- 'targets/probes/*.json'
refresh_interval: 5m
relabel_configs:
- source_labels: [__address__]
target_label: __param_target
- source_labels: [__param_target]
target_label: instance
- target_label: __address__
replacement: 192.168.31.82:9115
備注:
- 第一個relabel通過將__address__標簽(當前目標地址)寫入__param_target標簽來創建一個參數。
- 第二個relabel將__param_target標簽寫為實例標簽。
- 最后一個使用我們的主機名(和端口)重新標記__address__標簽。
5、targets/probes/probes.json配置
[{
"targets": [
"http://www.cnblogs.com"
]
}]
6、重載
curl -X POST http://127.0.0.1:9090/-/reload


