-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support modules configuration #225
Comments
Hey, there's already a probe endpoint, but I think it currently does not support domain based lookups. |
I was wrong! :D When you start the exporter with Code is here: What changes would you suggest? |
Hello @till, I checked usage at README.md and do not see anything which would mention such option or describe it's configuration flow. |
No worries. I know not everything might be documented adequately. So assuming the exporter does what you need already, I would really like a PR adjusting the README or adding the required information to it. :) |
Then usage |
@till already added |
@dragoangel I am open to supporting your use cases. Do you want to start a PR? The question of "multiple" resolvers comes up again and again. Still not entirely sure how to to implement that. I defer it to a local unbound. For the hashing bit - I am not familiar with that. Do you have an example? |
Hashing is rare thing, used to encode in rbl exactly links, like phishtank or emails, don't think someone would activelly used it 😅 in exporter, it was more to provide ideology on configuration I propose - that it allows to properly expand functionality without hardcoding things. |
About multiply resolvers and PR, unfortunately can't say my Go skills (none) and free time would allow to create PRs 😓, but maybe this as options could help: |
I renamed issue, to not confuse anybody :) as prober has a place |
About documentation - I will deploy it and after checking how it goes will create PR with my findings to Readme |
I'm also can provide PR to helm to support modules things if they would be in place 😊 |
@till |
Another thing that could be cool in rbl_configuration:
<rbl_domain_name>:
ignored:
- response: 127.0.0.7
description: "whitelisted"
- response_range: 127.0.0.100-127.0.0.115
blocked:
- response: 127.0.0.1
- response_range: 127.0.0.120-127.0.0.135
rate_limited:
- response: 127.0.0.8
- response_range: 127.0.0.200-127.0.0.215 This would allow to exclude false positive of
if rbl is configured with at least one known response, and response returned that is not in ignored, blocked or rate_limited it treated as optionally we can have |
Also from what I can see IPv6 aren't supported, here: |
Yeah, don't know if spamhaus supports it. We can work on that in another ticket if there's demand. |
It is, you can check https://multirbl.valli.org/lookup/2003%3Ae8%3A7f1d%3A%3A.html and see dns query. I now don't have ipv6 to monitor, tested out of curiosity 😄 |
I think such exporter would be fit much better with
/probe?module=rbl_ips&target=192.0.2.1
or/probe?module=rbl_domains&target=example.com
, like it done in blackbox exporter, ssl exporter, etc. It will allow people who using stuff like Prometheus Operator control which things to monitor by simply proving CRDs in k8s to probe, instead of creating\adjusting configuration of exporter, this is much more dynamic flow. People without Prometheus Operator still can just edit prometheys.yaml without accessing and redeploying dnsbl exporter.In this way
dnsbl_exporter.conf
configuration of module would have next scheme:resulting in:
Such workflow also as you see would allow using custom dns resolver per each module.
Here how would Prometheus probes would look like with probes flow:
The text was updated successfully, but these errors were encountered: