Prometheus Pushgateway
Collect metrics from Prometheus
Configuration
Example configurations
{
"sources": {
"my_source_id": {
"type": "prometheus_pushgateway",
"address": "0.0.0.0:9091"
}
}
}
[sources.my_source_id]
type = "prometheus_pushgateway"
address = "0.0.0.0:9091"
sources:
my_source_id:
type: prometheus_pushgateway
address: 0.0.0.0:9091
{
"sources": {
"my_source_id": {
"type": "prometheus_pushgateway",
"address": "0.0.0.0:9091"
}
}
}
[sources.my_source_id]
type = "prometheus_pushgateway"
address = "0.0.0.0:9091"
sources:
my_source_id:
type: prometheus_pushgateway
address: 0.0.0.0:9091
acknowledgements
optional objectControls how acknowledgements are handled by this source.
This setting is deprecated in favor of enabling acknowledgements
at the global or sink level.
Enabling or disabling acknowledgements at the source level has no effect on acknowledgement behavior.
See End-to-end Acknowledgements for more information on how event acknowledgement is handled.
acknowledgements.enabled
optional booladdress
required string literalThe socket address to accept connections on.
The address must include a port.
aggregate_metrics
optional boolWhether to aggregate values across pushes.
Only applies to counters and histograms as gauges and summaries can’t be meaningfully aggregated.
false
auth
optional objectauth.password
required string literalauth.username
required string literalkeepalive
optional objectkeepalive.max_connection_age_jitter_factor
optional floatThe factor by which to jitter the max_connection_age_secs
value.
A value of 0.1 means that the actual duration will be between 90% and 110% of the specified maximum duration.
0.1
keepalive.max_connection_age_secs
optional uintThe maximum amount of time a connection may exist before it is closed by sending
a Connection: close
header on the HTTP response. Set this to a large value like
100000000
to “disable” this feature
Only applies to HTTP/0.9, HTTP/1.0, and HTTP/1.1 requests.
A random jitter configured by max_connection_age_jitter_factor
is added
to the specified duration to spread out connection storms.
300
(seconds)tls
optional objecttls.alpn_protocols
optional [string]Sets the list of supported ALPN protocols.
Declare the supported ALPN protocols, which are used during negotiation with peer. They are prioritized in the order that they are defined.
tls.ca_file
optional string literalAbsolute path to an additional CA certificate file.
The certificate must be in the DER or PEM (X.509) format. Additionally, the certificate can be provided as an inline string in PEM format.
tls.crt_file
optional string literalAbsolute path to a certificate file used to identify this server.
The certificate must be in DER, PEM (X.509), or PKCS#12 format. Additionally, the certificate can be provided as an inline string in PEM format.
If this is set, and is not a PKCS#12 archive, key_file
must also be set.
tls.enabled
optional boolWhether or not to require TLS for incoming or outgoing connections.
When enabled and used for incoming connections, an identity certificate is also required. See tls.crt_file
for
more information.
tls.key_file
optional string literalAbsolute path to a private key file used to identify this server.
The key must be in DER or PEM (PKCS#8) format. Additionally, the key can be provided as an inline string in PEM format.
tls.key_pass
optional string literalPassphrase used to unlock the encrypted key file.
This has no effect unless key_file
is set.
tls.server_name
optional string literalServer name to use when using Server Name Indication (SNI).
Only relevant for outgoing connections.
tls.verify_certificate
optional boolEnables certificate verification. For components that create a server, this requires that the client connections have a valid client certificate. For components that initiate requests, this validates that the upstream has a valid certificate.
If enabled, certificates must not be expired and must be issued by a trusted issuer. This verification operates in a hierarchical manner, checking that the leaf certificate (the certificate presented by the client/server) is not only valid, but that the issuer of that certificate is also valid, and so on until the verification process reaches a root certificate.
Do NOT set this to false
unless you understand the risks of not verifying the validity of certificates.
tls.verify_hostname
optional boolEnables hostname verification.
If enabled, the hostname used to connect to the remote host must be present in the TLS certificate presented by the remote host, either as the Common Name or as an entry in the Subject Alternative Name extension.
Only relevant for outgoing connections.
Do NOT set this to false
unless you understand the risks of not verifying the remote hostname.
Outputs
<component_id>
Output Data
Metrics
counter
countergauge
gaugehistogram
gaugesummary
gaugeTelemetry
Metrics
linkcomponent_discarded_events_total
counterfilter
transform, or false if due to an error.component_errors_total
countercomponent_received_bytes_total
countercomponent_received_event_bytes_total
countercomponent_received_events_count
histogramA histogram of the number of events passed in each internal batch in Vector’s internal topology.
Note that this is separate than sink-level batching. It is mostly useful for low level debugging performance issues in Vector due to small internal batches.
component_received_events_total
countercomponent_sent_event_bytes_total
countercomponent_sent_events_total
counterhttp_server_handler_duration_seconds
histogramhttp_server_requests_received_total
counterhttp_server_responses_sent_total
countersource_lag_time_seconds
histogramHow it works
Metric aggregation
When `aggregate_metrics` is enabled only counters and histograms will be
summed as it doesn't make sense to sum gauges or summaries from separate
pushes.
HTTP Methods - POST vs PUT
The official Prometheus Pushgateway implementation supports `POST` and
`PUT` requests for pushing metrics to a grouping key, with slightly
different semantics.
When metrics are sent via a `POST` request, only metrics with the same
name are replaced. When they're sent via a `PUT` request, all metrics
within the grouping key are replaced.
Due to the difficulty of supporting the `PUT` semantics in Vector's
architecture, only `POST` has been implemented.
Protobuf
The Prometheus Protobuf format is currently unsupported. Metrics can only
be pushed in the text exposition format.
Transport Layer Security (TLS)
tls.*
options and/or via an
OpenSSL configuration file. The file location defaults to
/usr/local/ssl/openssl.cnf
or can be specified with the OPENSSL_CONF
environment variable.