No introduction found. Create it?
blackbox-exporter from prometheus-community/charts/prometheus-blackbox-exporter is more popular with 48 repositories.
Install with:
helm repo add prometheus-community oci://ghcr.io/prometheus-community/charts/
helm install blackbox-exporter prometheus-community/prometheus-blackbox-exporter -f values.yamlSee examples from other people.
| Name | Repo | Stars | Version | Timestamp |
|---|---|---|---|---|
| blackbox-exporter | haraldkoch/kochhaus-home | 156 | 11.4.0 | a month ago |
| blackbox-exporter | jr0dd/home-ops | 46 | 8.6.1 | a year ago |
See the most popular values for this chart:
| Key | Types |
|---|---|
| string | |
| string | |
| boolean | |
| string | |
| string | |
| boolean | |
config.modules.http_2xx.http.valid_http_versions[] (11) - HTTP/1.1 | string |
| string | |
| string | |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| string | |
config.modules.dns_ad_blocking.dns.query_name (1) googleadservices.com | string |
| string | |
| string | |
config.modules.dns_ad_blocking.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - googleadservices\.com\.\t.*\tIN\tA\t0\.0\.0\.0 | string |
| string | |
| string | |
config.modules.dns_private.dns.query_name (1) traefik.home.${SECRET_DOMAIN} | string |
| string | |
| string | |
config.modules.dns_private.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - traefik\.home\.${SECRET_DOMAIN}\.\t.*\tIN\tA\t${TRAEFIK_ADDR/./\.} | string |
| string | |
| string | |
config.modules.dns_public.dns.query_name (1) www.google.com | string |
| string | |
| string | |
config.modules.dns_public.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - www\.google\.com\.\t.*\tIN\tA\t.* | string |
| string | |
| string | |
| string | |
| string | |
| string | |
config.modules.dns_unifi.dns.validate_answer_rrs.fail_if_not_matches_regexp[] (1) - unifi\.home\.\t.*\tIN\tA\t${UNIFI_ADDR/./\.} | string |
| string | |
| string | |
config.modules.dns.dns.query_name (1) example.com | string |
| string | |
| string | |
| string | |
| boolean | |
| string | |
| boolean | |
config.modules.http_2xx_insecure.http.valid_http_versions[] (1) - HTTP/1.1 | string |
| string | |
| string | |
| boolean | |
| string | |
| boolean | |
config.modules.http_4xx_insecure.http.valid_http_versions[] (1) - HTTP/1.1 | string |
| number | |
| string | |
| string | |
| string | |
| string | |
| string | |
config.modules.irc_banner.tcp.query_response[].expect (1) PING :([^ ]+) | string |
config.modules.irc_banner.tcp.query_response[].send (1) NICK prober | string |
| string | |
| string | |
| boolean | |
| boolean | |
| string | |
| string | |
fullnameOverride (15) blackbox-exporter | string |
| string | |
| string | |
| string | |
| boolean | |
serviceMonitor.targets[].module (6) icmp | string |
| string | |
serviceMonitor.targets[].url (6) 192.168.1.2 | string |
| boolean | |
prometheusRule.rules[].alert (14) BlackboxProbeFailed | string |
prometheusRule.rules[].expr (14) probe_success == 0 | string |
| string | |
| string | |
prometheusRule.rules[].annotations.summary (8) The host {{ $labels.target }} is currently unreachable | string |
prometheusRule.rules[].annotations.description (5) The host {{"{{ $labels.instance }}"}} is currently unreachable | string |
prometheusRule.rules[].annotations.message (2) The host "{{ $labels.target }}" is currently unreachable | string |
prometheusRule.additionalLabels.app (7) prometheus-operator | string |
| string | |
| boolean | |
| string | |
| string | |
| boolean | |
| number | |
| boolean | |
| number | |
| boolean | |
ingress.hosts[].host (11) blackbox-exporter.${SECRET_DOMAIN} | string |
| string | |
| string | |
ingress.className (10) internal | string |
ingress.tls[].hosts[] (7) - blackbox.${SECRET_DOMAIN} | string |
ingress.tls[].secretName (3) ${SECRET_DOMAIN/./-}-tls | string |
ingress.annotations."external-dns.alpha.kubernetes.io/target" (5) internal.${SECRET_DOMAIN} | string |
| string | |
ingress.annotations."haproxy.org/allow-list" (1) ${HAPROXY_WHITELIST} | string |
ingress.annotations."haproxy.org/response-set-header" (1) Strict-Transport-Security "max-age=31536000"
X-Frame-Options "DENY"
X-Content-Type-Options "nosniff"
Referrer-Policy "strict-origin-when-cross-origin"
| string |
| string | |
pspEnabled (9) false | boolean |
podSecurityContext.sysctls[].name (6) net.ipv4.ping_group_range | string |
podSecurityContext.sysctls[].value (6) 0 2147483647 | string |
| string | |
| string | |
| string | |
| string | |
image.registry (2) quay.io | string |
image.repository (1) prometheus/blackbox-exporter | string |
| string | |
service.ipFamilyPolicy (2) PreferDualStack | string |
allowIcmp (1) true | boolean |
| string | |
| string | |
nodeSelector.agentpool (1) sysephem | string |
| number | |
tolerations[].effect (1) NoSchedule | string |
tolerations[].key (1) CriticalAddonsOnly | string |
| string | |
| string |