1
0
mirror of https://github.com/ribbybibby/ssl_exporter.git synced 2025-07-12 23:50:14 +02:00
Commit Graph

37 Commits

Author SHA1 Message Date
3a594bc445 Bump modules and Go version (#148)
* Bump modules and Go version

* Bump go version in github actions
2024-01-05 16:41:58 +00:00
52fb44781c Amend module path for v2 2022-05-07 09:33:55 +01:00
02d61835e8 Add default_module and target options
If default_module is set then the exporter will use that when the module
parameter isn't set.

If target is set for a module then the module will use that target,
ignoring the target parameter completely.
2021-12-23 15:28:41 +00:00
83f01274fc Move to github.com/prometheus/common/promlog for logging (#71)
* Move to yaml.v3 everywhere

* Switch to github.com/prometheus/common/promlog for logging
2021-06-23 17:22:22 +01:00
0506638f63 Add file prober 2020-11-15 13:59:51 +00:00
c74c0de901 Refactor prober function and metrics collection
The existing implementation consists of a collector that exports
information from a tls.ConnectionState returned by the prober function.
This won't necessarily integrate well with additional probers that
retrieve certs from sources other than a tls handshake (from file, for
instance).

I've made the probing more generically expandable by removing the
collector and instead registering and collecting metrics inside the
prober. This makes it possible to collect the same metrics in a
different way, or collect different metrics depending on the prober.
2020-11-07 17:17:06 +00:00
e05745b959 Export OCSP stapling metrics (#54)
* Export OCSP stapling metrics

* Add ocsp_response_stapled boolean

* Add missing ocsp_this_update metric to README
2020-10-27 09:10:42 +00:00
119d3cd200 Add a configurable timeout to the module configuration (#55) 2020-10-09 16:47:21 +01:00
b84db808b7 Fix ssl_verified_cert_not_after typo 2020-09-22 18:10:07 +01:00
17aa4e2d2d Add metrics for certificates in the verified chains (#48) 2020-09-11 18:20:41 +01:00
ddedd5f1b5 Add more information to error logs (#49) 2020-09-10 07:35:44 +01:00
89eff28fac Add starttls for smtp, imap and ftp (#36) 2020-06-22 16:50:21 +01:00
801179eae7 Move to a modules/probers model, like the blackbox_exporter. (#34)
There are a number of reasons for this change:
- Modules allow a single instance of the exporter to be configured with numerous
different tls configs. Previously you had to run a different exporter for each
combination.
- Adding new and more complicated options to the exporter should be easier with
modules than if I was to go down the route of accepting configuration directly through url params
- I prefer defining a specific prober (https,tcp) over using the URL to guess
what the user wants
2020-06-17 16:29:21 +01:00
dc2882c1f5 Fix emailAddresses (#33) 2020-06-16 17:23:18 +01:00
41830d450f Fix connection leak (#31)
Connections were being left around after requests and in some cases this could
result in file descriptor errors when open files built up.

Closing the http response body and the tcp connection, as well as disabling http
keep alives seems to resolve this.
2020-06-05 13:59:50 +01:00
e3477cf63c add TLS version metric (#24) 2020-03-08 18:50:25 +00:00
11e3e4c216 move metadata out of metrics and into labels 2020-01-24 17:47:51 +00:00
486b47fd9d describe not before metric 2020-01-24 17:39:12 +00:00
0983ffdba6 use the parsed target when connecting with the http client 2019-12-18 19:26:31 +00:00
6d5223cb4b use promhttp.Handler()
allows the removal of SA1019 linter ignore
2019-12-08 19:33:55 +00:00
81504f6140 make it work with Go 1.13 2019-11-26 19:44:55 +01:00
cfab972f8f Use https or tcp client based on target address
There are some advantages to using a http client over tcp. For instance,
using http allows you to take advatange of a http proxy, which may be necessary
in some environments.

This commit puts the http client back, alongside tcp, and decides which one to use
based on the target address.
2019-09-21 10:28:49 +01:00
a36358fd5d Fix tests 2019-03-24 18:47:16 +00:00
b65beeb21f Fix subject_ou length check typo 2019-03-22 12:40:51 +00:00
ba94fb8386 Maintain backwards compatibility by parsing URL scheme into default port values 2019-03-22 12:00:28 +00:00
e45a499637 Support protocols other than HTTPS by reimplementing the exporter as a TLS client 2019-03-20 14:04:24 +00:00
7e59584659 Remove the relationship between client authentication and the alternative ca cert bundle.
Client authentication isn't the only situation where you might want to override the system ca bundle with an alternative.
2019-03-11 17:53:21 +00:00
645d7a6e42 Add defaults for the cert and key file flags. This could help reduce the number of flags passed to the exporter if the user is able to adhere to default. 2019-03-11 17:51:29 +00:00
1af3b2a3b2 Add initial support for client authentication 2019-03-11 17:21:22 +00:00
7e95d03166 Some cosmetic fixes
* Add comments to exports
* Update incorrect metric description text
* Rename variables that break typical golang conventions
2019-03-11 17:13:29 +00:00
0abd32fac6 Rename ou variable 2019-01-25 10:34:41 +02:00
b992e2c307 Support organization units 2019-01-25 08:14:56 +02:00
7aafd0d61c Fix the example target 2019-01-25 08:05:17 +02:00
4b08b71d0c Remove duplicate certificates from the list of peer certificates. Otherwise we could run the risk of registering duplicate series. 2017-11-06 14:48:34 +00:00
a28d8f7be1 Switch to kingpin flags 2017-10-08 18:28:48 +01:00
e036e6415a Fix a segmentation fault that would occur when a https URL redirected to http. I've also added a block to catch cases where the response is unencrypted and removed the checks against the tagret parameter. If the target is invalid it will be caught when we make the request. 2017-10-08 18:01:03 +01:00
57063a77df Initial commit 2017-08-20 19:41:00 +01:00