Go to file
Dominik Schulz 8f3088611b Use correct SemVer range condition. Fixes #38 (#39) 2016-11-29 01:49:25 +11:00
tests Tests passing for all postgres versions. 2016-11-18 02:47:24 +11:00
vendor Vendor new packages, fix bad sync dependency. 2016-11-18 03:45:42 +11:00
.gitignore Implement the compileable source code of the basic integration test suite. 2016-11-17 03:09:20 +11:00
.travis.yml Update .travis.yml to push tagged docker container releases. 2016-11-18 03:42:36 +11:00
Dockerfile Update Dockerfile with the new port (9187) (#37) 2016-11-26 13:06:23 +11:00
LICENSE Compiling version of the postgres_exporter. 2015-08-25 03:28:41 +10:00
Makefile Tests passing for PostgreSQL 9.1. Set semantic version in filename. 2016-11-18 02:26:33 +11:00
README.md README.md: Update to new default port 9187 2016-11-21 09:50:15 +01:00
postgres_exporter.go Use correct SemVer range condition. Fixes #38 (#39) 2016-11-29 01:49:25 +11:00
postgres_exporter_integration_test.go Update the integration test. 2016-11-18 03:52:58 +11:00
queries.yaml fix a bug in the query to fetch shared_buffers setting 2016-09-07 16:55:41 -04:00

README.md

Build Status

PostgresSQL Server Exporter

Prometheus exporter for PostgresSQL server metrics. Supported Postgres versions: 9.1 and up.

Quick Start

This package is available for Docker:

# Start an example database
docker run --net=host -it --rm -e POSTGRES_PASSWORD=password postgres
# Connect to it
docker run -e DATA_SOURCE_NAME="postgresql://postgres:password@localhost:5432/?sslmode=disable" -p 9187:9187 wrouesnel/postgres_exporter

Building and running

The default make file behavior is to build the binary:

make
export DATA_SOURCE_NAME="postgresql://login:password@hostname:port/dbname"
./postgres_exporter <flags>

To build the dockerfile, run make docker.

This will build the docker image as wrouesnel/postgres_exporter:latest. This is a minimal docker image containing just postgres_exporter. By default no SSL certificates are included, if you need to use SSL you should either bind-mount /etc/ssl/certs/ca-certificates.crt or derive a new image containing them.

Vendoring

Package vendoring is handled with govendor

Flags

  • web.listen-address Address to listen on for web interface and telemetry.

  • web.telemetry-path Path under which to expose metrics.

  • config.expect-replication-stats The target database has replication turned on - log errors when replication stats are missing.

Setting the Postgres server's data source name

The PostgresSQL server's data source name must be set via the DATA_SOURCE_NAME environment variable.

For running it locally on a default Debian/Ubuntu install, this will work (transpose to init script as appropriate):

sudo -u postgres DATA_SOURCE_NAME="user=postgres host=/var/run/postgresql/ sslmode=disable" postgres_exporter

See the github.com/lib/pq module for other ways to format the connection string.

Adding new metrics

The exporter will attempt to dynamically export additional metrics if they are added in the future, but they will be marked as "untyped". Additional metric maps can be easily created from Postgres documentation by copying the tables and using the following Python snippet:

x = """tab separated raw text of a documentation table"""
for l in StringIO(x):
    column, ctype, description = l.split('\t')
    print """"{0}" : {{ prometheus.CounterValue, prometheus.NewDesc("pg_stat_database_{0}", "{2}", nil, nil) }}, """.format(column.strip(), ctype, description.strip())

Adjust the value of the resultant prometheus value type appropriately. This helps build rich self-documenting metrics for the exporter.

Adding new metrics via a config file

The -extend.query-path command-line argument specifies a YAML file containing additional queries to run. Some examples are provided in queries.yaml.

Running as non-superuser

To be able to collect metrics from pg_stat_activity and pg_stat_replication as non-superuser you have to create functions and views to do so.

CREATE USER postgres_exporter PASSWORD 'password';
ALTER USER postgres_exporter SET SEARCH_PATH TO postgres_exporter,pg_catalog;

CREATE SCHEMA postgres_exporter AUTHORIZATION postgres_exporter;

CREATE FUNCTION postgres_exporter.f_select_pg_stat_activity()
RETURNS setof pg_catalog.pg_stat_activity
LANGUAGE sql
SECURITY DEFINER
AS $$
  SELECT * from pg_catalog.pg_stat_activity;
$$;

CREATE FUNCTION postgres_exporter.f_select_pg_stat_replication()
RETURNS setof pg_catalog.pg_stat_replication
LANGUAGE sql
SECURITY DEFINER
AS $$
  SELECT * from pg_catalog.pg_stat_replication;
$$;

CREATE VIEW postgres_exporter.pg_stat_replication
AS
  SELECT * FROM postgres_exporter.f_select_pg_stat_replication();

CREATE VIEW postgres_exporter.pg_stat_activity
AS
  SELECT * FROM postgres_exporter.f_select_pg_stat_activity();

GRANT SELECT ON postgres_exporter.pg_stat_replication TO postgres_exporter;
GRANT SELECT ON postgres_exporter.pg_stat_activity TO postgres_exporter;