A Prometheus exporter that probes endpoints over HTTP, HTTPS, DNS, TCP, ICMP, and gRPC to collect blackbox monitoring metrics.
Blackbox Exporter is a Prometheus exporter that performs blackbox probing of network endpoints across multiple protocols including HTTP, HTTPS, DNS, TCP, ICMP, and gRPC. It helps monitor external service availability and performance by simulating client requests from outside the network infrastructure. The exporter provides metrics about probe success, response times, and other diagnostic information that Prometheus can scrape and alert on.
Site reliability engineers, DevOps teams, and system administrators who need to monitor external service availability and performance as part of their observability stack. It's particularly useful for organizations using Prometheus for monitoring.
Developers choose Blackbox Exporter because it's the official Prometheus solution for external monitoring, integrates seamlessly with Prometheus ecosystems, supports multiple network protocols, and provides detailed debugging capabilities. Its configuration flexibility and runtime reloading make it suitable for dynamic environments.
Blackbox prober exporter
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports probing across HTTP, HTTPS, DNS, TCP, ICMP, and gRPC, as detailed in the README's features and running examples, allowing comprehensive external checks.
Customizable modules define specific probe behaviors with YAML configs, and runtime reloading via SIGHUP or HTTP POST enables dynamic updates without restarts, as shown in the Configuration section.
Provides probe logs and timing information through the debug=true parameter, with separate structured loggers for probe operations, demonstrated in the log output examples.
Follows the multi-target exporter pattern with relabelling support, making it easy to scrape metrics into Prometheus, as explained in the Prometheus Configuration examples.
ICMP probes require special permissions like root access or CAP_NET_RAW on Linux, complicating deployment in restricted environments, as noted in the Permissions section.
Setting up modules and Prometheus relabelling can be verbose and error-prone, with YAML files and command-line flags adding overhead, especially for new users.
Primarily designed for Prometheus, lacking native support for other monitoring tools, which may require additional integration efforts for mixed environments.