2017-08-20 20:30:02 +02:00
# SSL Certificate Exporter
2020-01-24 19:37:37 +02:00
The [blackbox_exporter ](https://github.com/prometheus/blackbox_exporter ) allows
you to test the expiry date of a certificate as part of its HTTP(S) probe -
which is great. It doesn't, however, tell you which certificate in the chain is
nearing expiry or give you any other information that might be useful when
sending alerts.
For instance, there's a definite value in knowing, upon first receiving an
alert, if it's a certificate you manage directly or one further up the chain.
It's also not always necessarily clear from the address you're polling what kind
of certificate renewal you're looking at. Is it a Let's Encrypt, in which case
it should be handled by automation? Or your organisation's wildcard? Maybe the
domain is managed by a third-party and you need to submit a ticket to get it
renewed.
Whatever it is, the SSL exporter gives you visibility over those dimensions at
the point at which you receive an alert. It also allows you to produce more
meaningful visualisations and consoles.
2017-08-20 20:30:02 +02:00
2019-08-15 18:08:43 +02:00
## Table of Contents
2019-12-08 22:40:43 +02:00
- [SSL Certificate Exporter ](#ssl-certificate-exporter )
2020-06-17 17:29:21 +02:00
- [Table of Contents ](#table-of-contents )
2019-12-08 22:40:43 +02:00
- [Building ](#building )
2020-06-17 17:29:21 +02:00
- [Docker ](#docker )
- [Release process ](#release-process )
- [Usage ](#usage )
2019-12-08 22:40:43 +02:00
- [Metrics ](#metrics )
2020-06-17 17:29:21 +02:00
- [Configuration ](#configuration )
- [Configuration file ](#configuration-file )
- [<module> ](#module )
- [<tls_config> ](#tls_config )
2020-06-22 17:50:21 +02:00
- [<https_probe> ](#https_probe )
- [<tcp_probe> ](#tcp_probe )
2020-06-17 17:29:21 +02:00
- [Example Queries ](#example-queries )
2020-09-11 19:20:41 +02:00
- [Peer Cerificates vs Verified Chain Certificates ](#peer-cerificates-vs-verified-chain-certificates )
2019-12-08 22:40:43 +02:00
- [Proxying ](#proxying )
2020-06-17 17:29:21 +02:00
- [Grafana ](#grafana )
2019-08-15 18:08:43 +02:00
Created by [gh-md-toc ](https://github.com/ekalinin/github-markdown-toc )
2017-08-20 20:30:02 +02:00
## Building
2019-08-15 10:43:34 +02:00
2017-12-02 20:55:31 +02:00
make
2017-08-20 20:30:02 +02:00
./ssl_exporter < flags >
2017-12-02 21:03:36 +02:00
2020-01-24 19:37:37 +02:00
Similarly to the blackbox_exporter, visiting
[http://localhost:9219/probe?target=example.com:443 ](http://localhost:9219/probe?target=example.com:443 )
will return certificate metrics for example.com. The `ssl_tls_connect_success`
metric indicates if the probe has been successful.
2017-08-20 20:30:02 +02:00
2020-03-12 19:25:42 +02:00
### Docker
2019-08-15 10:43:34 +02:00
2017-12-03 14:51:40 +02:00
docker pull ribbybibby/ssl-exporter
2019-12-18 12:48:50 +02:00
docker run -p 9219:9219 ribbybibby/ssl-exporter:latest < flags >
2017-12-03 14:51:40 +02:00
2020-03-12 19:25:42 +02:00
### Release process
2020-03-13 12:26:31 +02:00
- Update the `VERSION` file in this repository and commit to master
2020-03-12 19:25:42 +02:00
- [This github action ](.github/workflows/release.yaml ) will add a changelog and
upload binaries in response to a release being created in Github
- Dockerhub will build and tag a new container image in response to tags of the
format `/^v[0-9.]+$/`
2020-06-17 17:29:21 +02:00
## Usage
```
usage: ssl_exporter [< flags > ]
Flags:
-h, --help Show context-sensitive help (also try --help-long and
--help-man).
--web.listen-address=":9219"
Address to listen on for web interface and telemetry.
--web.metrics-path="/metrics"
Path under which to expose metrics
--web.probe-path="/probe" Path under which to expose the probe endpoint
--config.file="" SSL exporter configuration file
--log.level="info" Only log messages with the given severity or above. Valid
levels: [debug, info, warn, error, fatal]
--log.format="logger:stderr"
Set the log target and format. Example:
"logger:syslog?appname=bob& local=7" or
"logger:stdout?json=true"
--version Show application version.
```
2017-08-20 20:30:02 +02:00
## Metrics
2019-08-15 10:43:34 +02:00
2020-09-11 19:20:41 +02:00
| Metric | Meaning | Labels |
| ---------------------------- | ------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------- |
| ssl_cert_not_after | The date after which a peer certificate expires. Expressed as a Unix Epoch Time. | serial_no, issuer_cn, cn, dnsnames, ips, emails, ou |
| ssl_cert_not_before | The date before which a peer certificate is not valid. Expressed as a Unix Epoch Time. | serial_no, issuer_cn, cn, dnsnames, ips, emails, ou |
| ssl_prober | The prober used by the exporter to connect to the target. Boolean. | prober |
| ssl_tls_connect_success | Was the TLS connection successful? Boolean. | |
| ssl_tls_version_info | The TLS version used. Always 1. | version |
| ssl_verified_cert_not_after | The date after which a certificate in the verified chain expires. Expressed as a Unix Epoch Time. | chain_no, serial_no, issuer_cn, cn, dnsnames, ips, emails, ou |
| ssl_verified_cert_not_before | The date before which a certificate in the verified chain is not valid. Expressed as a Unix Epoch Time. | chain_no, serial_no, issuer_cn, cn, dnsnames, ips, emails, ou |
2017-08-20 20:30:02 +02:00
2020-06-17 17:29:21 +02:00
## Configuration
2019-08-15 10:43:34 +02:00
2020-01-24 19:37:37 +02:00
Just like with the blackbox_exporter, you should pass the targets to a single
instance of the exporter in a scrape config with a clever bit of relabelling.
This allows you to leverage service discovery and keeps configuration
centralised to your Prometheus config.
2019-08-15 10:43:34 +02:00
2017-08-20 20:30:02 +02:00
```yml
scrape_configs:
2019-08-15 10:43:34 +02:00
- job_name: "ssl"
2017-08-20 20:30:02 +02:00
metrics_path: /probe
static_configs:
- targets:
2019-08-15 10:43:34 +02:00
- example.com:443
- prometheus.io:443
2017-08-20 20:30:02 +02:00
relabel_configs:
- source_labels: [__address__]
target_label: __param_target
- source_labels: [__param_target]
target_label: instance
- target_label: __address__
2019-08-15 10:43:34 +02:00
replacement: 127.0.0.1:9219 # SSL exporter.
2017-08-20 20:30:02 +02:00
```
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
By default the exporter will make a TCP connection to the target. You can change
this to https by setting the module parameter:
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
```yml
scrape_configs:
- job_name: "ssl"
metrics_path: /probe
params:
module: ["https"] # < -----
static_configs:
- targets:
- example.com:443
- prometheus.io:443
relabel_configs:
- source_labels: [__address__]
target_label: __param_target
- source_labels: [__param_target]
target_label: instance
- target_label: __address__
replacement: 127.0.0.1:9219
```
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
### Configuration file
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
You can provide further module configuration by providing the path to a
configuration file with `--config.file` . The file is written in yaml format,
defined by the schema below.
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
```
modules: [< module > ]
```
#### \<module\>
```
2020-06-22 17:50:21 +02:00
# The protocol over which the probe will take place (https, tcp)
2020-06-17 17:29:21 +02:00
prober: < prober_string >
# Configuration for TLS
2020-06-17 17:48:59 +02:00
[ tls_config: < tls_config > ]
# The specific probe configuration
[ https: < https_probe > ]
2020-06-22 17:50:21 +02:00
[ tcp: < tcp_probe > ]
2020-06-17 17:29:21 +02:00
```
#### <tls_config>
```
# Disable target certificate validation.
[ insecure_skip_verify: < boolean > | default = false ]
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
# The CA cert to use for the targets.
[ ca_file: < filename > ]
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
# The client cert file for the targets.
[ cert_file: < filename > ]
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
# The client key file for the targets.
[ key_file: < filename > ]
2019-08-15 10:43:34 +02:00
2020-06-17 17:29:21 +02:00
# Used to verify the hostname for the targets.
[ server_name: < string > ]
```
2019-08-15 10:43:34 +02:00
2020-06-17 17:48:59 +02:00
#### <https_probe>
```
# HTTP proxy server to use to connect to the targets.
[ proxy_url: < string > ]
```
2020-06-22 17:50:21 +02:00
#### <tcp_probe>
```
# Use the STARTTLS command before starting TLS for those protocols that support it (smtp, ftp, imap)
[ starttls: < string > ]
```
2020-06-17 17:29:21 +02:00
## Example Queries
2019-08-15 10:43:34 +02:00
2020-01-24 19:37:37 +02:00
Certificates that expire within 7 days:
2017-08-20 20:30:02 +02:00
2019-12-08 22:40:43 +02:00
```
2020-01-24 19:37:37 +02:00
ssl_cert_not_after - time() < 86400 * 7
2019-12-08 22:40:43 +02:00
```
2017-08-20 20:30:02 +02:00
2020-01-24 19:37:37 +02:00
Wildcard certificates that are expiring:
2017-08-20 20:30:02 +02:00
2019-12-08 22:40:43 +02:00
```
2020-01-24 19:37:37 +02:00
ssl_cert_not_after{cn=~"\*.*"} - time() < 86400 * 7
2019-12-08 22:40:43 +02:00
```
2017-08-20 20:30:02 +02:00
2020-09-11 19:20:41 +02:00
Certificates that expire within 7 days in the verified chain that expires
latest:
2019-08-15 10:43:34 +02:00
2019-12-08 22:40:43 +02:00
```
2020-09-11 19:20:41 +02:00
ssl_verified_cert_not_after{chain_no="0"} - time() < 86400 * 7
```
Number of certificates presented by the server:
```
count(ssl_cert_not_after) by (instance)
2019-12-08 22:40:43 +02:00
```
2017-08-20 20:30:02 +02:00
Identify instances that have failed to create a valid SSL connection:
2019-12-08 22:40:43 +02:00
```
ssl_tls_connect_success == 0
```
2017-08-20 20:30:02 +02:00
2020-09-11 19:20:41 +02:00
## Peer Cerificates vs Verified Chain Certificates
Metrics are exported for the `NotAfter` and `NotBefore` fields for peer
certificates as well as for the verified chain that is
constructed by the client.
The former only includes the certificates that are served explicitly by the
target, while the latter can contain multiple chains of trust that are
constructed from root certificates held by the client to the target's server
certificate.
This has important implications when monitoring certificate expiry.
For instance, it may be the case that `ssl_cert_not_after` reports that the root
certificate served by the target is expiring soon even though clients can form
another, much longer lived, chain of trust using another valid root certificate
held locally. In this case, you may want to use `ssl_verified_cert_not_after` to
alert on expiry instead, as this will contain the chain that the client actually
constructs:
```
ssl_verified_cert_not_after{chain_no="0"} - time() < 86400 * 7
```
Each chain is numbered by the exporter in reverse order of expiry, so that
`chain_no="0"` is the chain that will expire the latest. Therefore the query
above will only alert when the chain of trust between the exporter and the
target is truly nearing expiry.
It's very important to note that a query of this kind only represents the chain
of trust between the exporter and the target. Genuine clients may hold different
root certs than the exporter and therefore have different verified chains of
trust.
2019-08-15 10:43:34 +02:00
## Proxying
2020-06-17 17:29:21 +02:00
The `https` prober supports the use of proxy servers discovered by the
environment variables `HTTP_PROXY` , `HTTPS_PROXY` and `ALL_PROXY` .
2019-08-15 10:43:34 +02:00
For instance:
$ export HTTPS_PROXY=localhost:8888
$ ./ssl_exporter
2020-06-17 17:48:59 +02:00
Or, you can set the `proxy_url` option in the module.
The latter takes precedence.
2020-03-12 20:06:37 +02:00
## Grafana
You can find a simple dashboard [here ](grafana/dashboard.json ) that tracks
certificate expiration dates and target connection errors.