No introduction found. Create it?
blackbox-exporter from prometheus-community/charts/prometheus-blackbox-exporter is more popular with 38 repositories.
Install with:
helm repo add prometheus-community oci://ghcr.io/prometheus-community/charts/
helm install blackbox-exporter prometheus-community/prometheus-blackbox-exporter -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
blackbox-exporter | tyriis/home-ops | 66 | 11.0.0 | a day ago |
blackbox-exporter | haraldkoch/kochhaus-home | 145 | 11.0.0 | 9 days ago |
blackbox-exporter | jr0dd/home-ops | 46 | 8.6.1 | a year ago |
See the most popular values for this chart:
Key | Types |
---|---|
string | |
string | |
boolean | |
string | |
string | |
boolean | |
config.modules.http_2xx.http.valid_http_versions[] (16) - HTTP/1.1 | string |
string | |
string | |
string | |
string | |
string | |
boolean | |
string | |
string | |
config.modules.dns_ad_blocking.dns.query_name (1) googleadservices.com | string |
string | |
string | |
config.modules.dns_ad_blocking.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - googleadservices\.com\.\t.*\tIN\tA\t0\.0\.0\.0 | string |
string | |
string | |
config.modules.dns_private.dns.query_name (1) traefik.home.${SECRET_DOMAIN} | string |
string | |
string | |
config.modules.dns_private.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - traefik\.home\.${SECRET_DOMAIN}\.\t.*\tIN\tA\t${TRAEFIK_ADDR/./\.} | string |
string | |
string | |
config.modules.dns_public.dns.query_name (1) www.google.com | string |
string | |
string | |
config.modules.dns_public.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - www\.google\.com\.\t.*\tIN\tA\t.* | string |
string | |
string | |
string | |
string | |
string | |
config.modules.dns_unifi.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - unifi\.home\.\t.*\tIN\tA\t${UNIFI_ADDR/./\.} | string |
string | |
string | |
config.modules.dns.dns.query_name (1) example.com | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
config.modules.http_2xx_insecure.http.valid_http_versions[] (1) - HTTP/1.1 | string |
string | |
string | |
boolean | |
string | |
boolean | |
config.modules.http_4xx_insecure.http.valid_http_versions[] (1) - HTTP/1.1 | string |
number | |
string | |
string | |
string | |
string | |
string | |
config.modules.irc_banner.tcp.query_response[].expect (1) PING :([^ ]+) | string |
config.modules.irc_banner.tcp.query_response[].send (1) NICK prober | string |
string | |
string | |
boolean | |
boolean | |
string | |
string | |
fullnameOverride (20) blackbox-exporter | string |
string | |
string | |
string | |
string | |
string | |
boolean | |
serviceMonitor.targets[].module (9) http_2xx | string |
serviceMonitor.targets[].name (9) betty-http | string |
serviceMonitor.targets[].url (9) http://10.10.20.208 | string |
string | |
boolean | |
prometheusRule.rules[].alert (19) BlackboxProbeFailed | string |
prometheusRule.rules[].expr (19) probe_success == 0 | string |
string | |
string | |
prometheusRule.rules[].annotations.summary (10) The host {{ $labels.target }} is currently unreachable | string |
prometheusRule.rules[].annotations.description (8) The SSL certificate for {{"{{ $labels.target }}"}} will expire in less than 3 days | string |
prometheusRule.rules[].annotations.message (3) The response time for {{"{{ $labels.target }}"}} has been greater than 30 seconds for 5 minutes. | string |
prometheusRule.additionalLabels.app (10) prometheus-operator | string |
string | |
boolean | |
ingress.hosts[].host (17) blackbox.${SECRET_DOMAIN} | string |
string | |
string | |
ingress.className (16) internal | string |
ingress.tls[].hosts[] (12) - blackbox.${SECRET_DOMAIN} | string |
ingress.tls[].secretName (5) blackbox.lab.${SECRET_DOMAIN} | string |
ingress.annotations."external-dns.alpha.kubernetes.io/target" (4) internal.${SECRET_DOMAIN} | string |
string | |
ingress.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
ingress.annotations."haproxy.org/allow-list" (1) ${HAPROXY_WHITELIST} | string |
ingress.annotations."haproxy.org/response-set-header" (1) Strict-Transport-Security "max-age=31536000"
X-Frame-Options "DENY"
X-Content-Type-Options "nosniff"
Referrer-Policy "strict-origin-when-cross-origin"
| string |
string | |
string | |
string | |
string | |
ingress.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) traefik-ingress-sso@kubernetescrd | string |
string | |
boolean | |
string | |
string | |
boolean | |
number | |
boolean | |
number | |
pspEnabled (12) false | boolean |
podSecurityContext.sysctls[].name (8) net.ipv4.ping_group_range | string |
podSecurityContext.sysctls[].value (8) 0 2147483647 | string |
string | |
string | |
string | |
string | |
image.registry (3) quay.io | string |
image.repository (2) prometheus/blackbox-exporter | string |
string | |
allowIcmp (2) true | boolean |
string | |
string | |
service.ipFamilyPolicy (2) PreferDualStack | string |
number |