Start your free 14-day ContainIQ trial

Prometheus Exporters | Tutorial and Best Practices

In this guide, we’ll discuss how Prometheus exporters work, practical steps for implementing exporters in a deployment, and recommended practices for using them.

September 30, 2022
Sudip Sengupta
Solutions Architect

Prometheus continues to be one of the most popular cloud-native monitoring tools for collecting and aggregating metric statistics as time series data. Unsurprisingly, Prometheus event monitoring and alerting is built on the accuracy and comprehensiveness of metric data. While Prometheus uses instrumented jobs to scrape metrics from non-Prometheus target endpoints, an exporter acts as an emissary push-gateway between a third-party application and the Prometheus server, to expose data as native metrics.

In this guide, we’ll discuss how Prometheus exporters work, practical steps for implementing exporters in a deployment, and recommended practices for using them.

What Is a Prometheus Exporter?

A Prometheus exporter aggregates and imports data from a non-Prometheus to a Prometheus system. An exporter is considered essential in any cloud-native ecosystem that includes applications that don’t expose Prometheus-supported metrics by default. A Prometheus exporter acts as a proxy between such an applications and the Prometheus server. Exporters use a simple, text-based, key-value format to scrape and expose metrics over time, via HTTP, for aggregation and decision-making.

How Prometheus Exporters Work

Prometheus implements the HTTP pull model to gather metrics from client components. For event-based monitoring, the Prometheus client relies on an exporter that acts as an abstraction layer between the application and the Prometheus server.

A Prometheus exporter’s working mechanism typically involves the following:

  • Providing a target endpoint that the Prometheus server periodically queries for metrics.
  • Extracting metrics data from a non-Prometheus application.
  • Transforming captured data into a Prometheus ingestible format by leveraging client libraries.
  • Initiating a web server to display metrics through a URL.

Prometheus Exporter Implementation Types

In a complex ecosystem of multiple stateful and stateless applications, there are two approaches to implementing Prometheus exporters for comprehensive metrics collection. These include:

Application Built-in Exporters
Built-in exporters are used when the client system natively exposes key metrics, including request rates, errors, and duration. Common use cases include:

  • Used to develop an application from scratch: developers assess and integrate Prometheus client requirements from the initial phases of application design.
  • Integrated into existing applications: teams modify code to add specific Prometheus client capabilities.

Third-party/standalone exporters
Standalone exporters are used to expose metrics so they can be collected and processed externally. In such instances, applications typically expose metrics through a metric API or logs. Standalone exporters are also provisioned in setups where the exposed data relies on transformation and aggregation by an external service.

Examples of Prometheus Exporters

Some popular open-source Prometheus exporters include:

Node/system Metrics Exporter

Node Exporter is the official exporter for hardware and kernel metrics exposed by *nix systems, such as Linux, OpenBSD, FreeBSD, and Darwin. The exporter reports metrics that are useful in monitoring node (host and server) performance, such as:

  • <terminal inline>node_cpu_seconds_total{mode="system"}<terminal inline> - Captures the amount of CPU time spent in system mode per second within the past 60 seconds.
  • <terminal inline>node_filesystem_avail_bytes<terminal inline> - Returns the storage capacity (in bytes) available to non-root users.
  • <terminal inline>node_network_receive_bytes_total<terminal inline> - Returns the average incoming network traffic per second over the past 60 seconds.

Windows Exporter

This exporter collects metrics from Windows hosts (both PCs and servers) and exposes them to the Prometheus server. The exporter collects and exposes host metrics such as:

  • <terminal inline>cpu<terminal inline> - Exposes multiple metrics about CPU usage, including time spent in idle states, time spent in different modes, number of hardware interrupts received or serviced, and total number of deferred procedure calls received.
  • <terminal inline>memory<terminal inline> - Used to export memory usage metrics, including amount of physical memory available for allocation, number of bytes used by the file system cache, amount of committed virtual memory, and number of page table entries in use by the system.
  • <terminal inline>logical disk<terminal inline> - Captures metric data about logical disks, such as rate of byte transfer during read operations, rate of write operations, time spent servicing requests, and total and unused disk size.

The exporter also exposes data on foundational Windows services, including:

Blackbox Exporter

The Blackbox exporter allows monitoring teams to collect metrics about endpoints over common transport protocols, including DNS, TCP, HTTP(S), gRPC, and ICMP. The exporter collects such metrics as:

  • <terminal inline>probe_ssl_earliest_cert_expiry<terminal inline> - Shows the duration (in seconds) during which a certificate remains valid.
  • <terminal inline>probe_success<terminal inline> - Detects when probes are failing.
  • <terminal inline>probe_http_content_length<terminal inline> - Shows the size of an entity body.

SQL Exporter

This database-agnostic exporter collects and exposes metrics for SQL-based database management systems. SQL metrics exposed include:

  • <terminal inline>mssql_deadlocks<terminal inline> - Identifies deadlocks in the database.
  • <terminal inline>mssql_disk_space_used_bytes_total<terminal inline> - Identifies utilized disk space.
  • <terminal inline>mssql_disk_space_available_bytes_total<terminal inline> - Identifies available disk space.

ElasticSearch Exporter

The ElasticSearch exporter fetches various metrics about ElasticSearch clusters. Some exposed metrics include:

  • <terminal inline>elasticsearch_indices_index_current<terminal inline> - Shows the number of documents currently in the index.
  • <terminal inline>elasticsearch_indices_mappings_stats_json_parse_failures_total<terminal inline> - Captures the total number of errors encountered when parsing JSON.
  • <terminal inline>elasticsearch_indices_query_cache_total<terminal inline> - Shows the size of memory cached by indexed queries.
  • <terminal inline>elasticsearch_thread_pool_active_count<terminal inline> - Shows the total number of active threads within the thread pool.

Other Prometheus Exporters

Other popular Prometheus exporters include:

How to Set up a Prometheus Exporter for Monitoring and Alerts

Although there are multiple ways of building exporters, Prometheus ships with a Python library to support the development of metric collectors and exporters in a few simple steps. In this section, we’ll discuss how to build a basic exporter for a Kubernetes cluster using a Python script. The demo workflow essentially includes the steps for building the exporter using Python, building a Docker image, and using the image in a cluster deployment object for exposing metrics.


An existing Kubernetes cluster.
Docker service installed with the CLI logged into Docker Hub…

Creating the Exporter Using Python Script

First, create the working directory using a command in this format:

$ mkdir custom-exporter

Navigate to the directory:

Create the directory for Python scripts and navigate to it:

$ cd code

Create the Python script that defines the exporter with related dependencies and objects:

$ nano

The exporter script is divided into three parts. The first part imports all the dependencies required to implement a metrics exporter. To perform this step, add the following code to <terminal inline><terminal inline>:

import time
from prometheus_client.core import GaugeMetricFamily, REGISTRY, CounterMetricFamily
from prometheus_client import start_http_server

The second part defines the custom exporter class to be built and implements the exporter object for each desired metric. Add the following code to <terminal inline><terminal inline> to build the custom exporter class:

class CustomCollector(object):
    def __init__(self):

To define objects for metric exporters, first add the following code to declare the exporter objects:

def collect(self):

Once that’s done, you add two objects for the metric exporters. To add a gauge metric for memory usage, add the following code to

g = GaugeMetricFamily("MemoryUsage", 'Help text', labels=['instance'])
g.add_metric([""], 20)
yield g

The second object is a counter metric that enumerates the number of HTTP requests made to the cluster. To add the counter metric object, add the following code to <terminal inline><terminal inline>:

        c = CounterMetricFamily("HttpRequests", 'Help text', labels=['app'])
        c.add_metric(["example"], 2000)
        yield c

Once the metric objects are added to the script, the third and final section of the script defines the initiation of the Prometheus server and provides an endpoint for scraping metrics.

if __name__ == '__main__':
    while True:

To build exporters when being deployed, this code will rely on Prometheus client libraries and modules. To store this data within the image, create a <terminal inline>pip-requirements.txt<terminal inline> file that references Prometheus client libraries:

$ nano pip-requirements.txt


Building the Docker Image

Navigate back to the Project directory:

$ cd -

Create the Dockerfile to be used in building container images:

$ nano Dockerfile

Add details of the working directory and environment to the Dockerfile, as shown below:

FROM python:3.6

ADD code /code
RUN pip install -r /code/pip-requirements.txt


CMD ["python" , "/code/"]

Once the Dockerfile is saved, run the following command to build the container image:

$ docker build -t <docker-hub-username>/custom-exporter .

Confirm the creation of the image by running the command:

$ docker images

Which should return a response similar to:

<docker-hub-user>/custom-explorer latest 4de8857db072 38 seconds ago 908MB
python 3.6 54260638d07c 8 months ago 902MB

Push the image to Docker Hub by running the command:

$ docker push <docker-hub-username>/custom-exporter

Which returns the details similar to:

Using default tag: latest
The push refers to repository [<docker-hub-username>/custom-exporter]
8bb18c915653: Pushed 
fb35e576358c: Pushed 
aa4c808c19f6: Mounted from library/python 
8ba9f690e8ba: Mounted from library/python 
3e607d59ef9f: Mounted from library/python 
1e18e7e1fcc2: Mounted from library/python 
c3a0d593ed24: Mounted from library/python 
26a504e63be4: Mounted from library/python 
8bf42db0de72: Mounted from library/python 
31892cc314cb: Mounted from library/python 
11936051f93b: Mounted from library/python 
latest: digest: sha256:e0e98d35e2fe77d974bbc98a1ac18dc56dfce2fbf5eb78de7dbe700619041c6b size: 2637

Building a Prometheus Deployment

Once the Docker image is successfully deployed, the next step is to build a service and deployment object that uses the Docker image to create a working operator.

Create and navigate to the folder to host the templates:

$ mkdir templates

$ cd templates

Create the deployment manifest:

$ nano deployment.yaml

apiVersion: apps/v1
kind: Deployment
  name: darwin-custom-collector
    app: darwin-custom-collector
  replicas: 1
      app: darwin-custom-collector
        app: darwin-custom-collector
      - name: darwin-custom-collector
        image: <docker-hub-username>/custom-exporter
        - containerPort: 80

Create the service manifest:

$ nano service.yaml

apiVersion: v1
kind: Service
  name: darwin-custom-collector-service
    app: darwin-custom-collector
  type: NodePort
  - protocol: TCP
    port: 80
    targetPort: 8000

Apply both the configurations:

$ kubectl apply -f deployment.yaml
deployment.apps/darwin-custom-collector created

$ kubectl apply -f service.yaml
service/darwin-custom-collector-service created

To verify if the configurations are correctly applied, run the command:

$ kubectl get pods

Which returns the response:

darwin-custom-collector-75cff7d89f-r8nml 1/1 Running 0 32s

To access Prometheus from the <terminal inline>localhost<terminal inline> over port <terminal inline>8080<terminal inline>, run a command similar to the one below (make sure to replace the pod name shown below with the one in your cluster):

$ kubectl port-forward darwin-custom-collector-75cff7d89f-r8nml 8080:9090

Which shows the response:

Forwarding from ->9090
Forwarding from [::1]:8080 -> 9090
Handling connection for 8080
Handling connection for 8080

The configured metrics can be accessed from the following URL:


Accessing this URL on a web browser gives access to memory and request metrics, as shown:

HTTP Request Metrics
Memory Statistics Exposed by the Exporter

Best Practices When Using Prometheus Exporters

Some best practices to adopt when using Prometheus exporters include:

Utilize an Existing Prometheus Exporter

Developers should leverage default Prometheus exporters built for collecting third-party metrics from different application types. Building a custom exporter not only adds to effort overhead but also introduces regressions into an application’s core functions. To find the right Prometheus exporter, developers should evaluate the maturity of the exporter as an open-source project and the type of metrics it can expose. The Prometheus website provides a comprehensive exporters and integrations list that can help you identify the best choice for a deployment. Other third-party sites, such as, also provide curated exporter lists that are useful in choosing the right exporter for a complex cluster of different applications.

Use Labels and Annotations to Help Understand Metrics

Each exporter collects and exposes a unique set of metrics. While the metric name is always verbose, comprehending the information it presents is often difficult at first glance. Some exporters use the OpenMetrics format to provide additional context about a metric out-of-the-box. In the absence of such information, attaching metadata through labels and annotations is recommended to offer context and meaning. Attaching metadata for Kubernetes object can be done with:

  • Labels are key-value pairs that help with grouping and querying objects. These can further be classified into:
    Instrumentation labels for analyzing the information exported from inside an application.
    Target labels for analyzing metrics aggregated from disparate sources in a full-scale deployment.
  • Annotations store information about objects that can be further used by internal tools and libraries.

Configure Actionable Alerts

Apart from capturing the right set of metrics, monitoring teams should set up alerts for events such as a metric drifting away from desired values. On a distributed cluster of numerous applications and continuous events, defining an alert strategy is a complex undertaking. If the metrics threshold is too low, the monitoring team gets overburdened with unnecessary alarms. But if the threshold is too high, the monitoring team may miss crucial events, leading to system failure or an undesirable user experience. As a recommended practice, monitoring teams should configure notifications to ensure the perfect balance between an optimum user experience and timely responses to deployment issues.

Adopt an Appropriate Scaling Mechanism

As deployments grow, leveraging numerous exporters and metrics introduces storage and visibility bottlenecks. Avoiding such bottlenecks often relies on comprehensive observability that conforms to the gradual growth of a cluster environment. Considering Prometheus’ innate inefficiency of horizontal scaling, administrators should adopt an appropriate scaling mechanism while proactively accounting for the rising number of services, metric cardinality, and memory usage. Although manual scaling using federation is one option, the approach typically introduces manual overhead in configuration and maintenance. As a recommended approach, organizations should adopt cloud-native, long-term storage (LTS) for automatic persistence of metric data.

Administer Robust Metric Access Privileges

As exporters expose sensitive information about applications, services, and hosts, determining who has access to these metrics and how they can use it is critical. HTTP endpoints and logs of Prometheus are also susceptible to vector attacks since they expose a cluster’s operating information and debugging patterns. Organizations should leverage role-based access controls and implement security filters to ensure that only authorized users can access metrics and execute reports. Another recommended practice is to make use of Prometheus’ default authorization and TLS encryption features to prevent API endpoints from exposing sensitive metric data.

Final Thoughts

Prometheus is a cloud-native observability solution that collects real-time application metrics for monitoring modern deployments. Exporters are crucial components of a Prometheus monitoring framework that help enable observability of deployed applications and host environments. Understandably, choosing the right exporter or building one is just one step toward comprehensive monitoring, which eventually relies on integration with other visualization platforms such as Grafana.

As an alternative to Prometheus, ContainIQ offers a comprehensive monitoring platform that helps with continuous profiling and visualization of cluster workloads. In addition, ContainIQ has a custom metrics toolset for teams who want to integrate custom metrics from Prometheus into the platform.

As a self-service SaaS platform, ContainIQ bundles many of the features that Prometheus offers, including support for custom metrics, an intuitive event and health dashboard, a built-in engine for alerting, and enterprise support. The platform also supports both on-prem and self-managed cloud deployments.

ContainIQ offers a free trial and a self-service experience, which can be found here.

Start your free 14-day ContainIQ trial
Start Free TrialBook a Demo
No card required
Sudip Sengupta
Solutions Architect

Sudip Sengupta is a TOGAF Certified Solutions Architect with more than 15 years of experience working for global majors such as CSC, Hewlett Packard Enterprise, and DXC Technology. Sudip now works as a full-time tech writer, focusing on Cloud, DevOps, SaaS, and Cybersecurity. When not writing or reading, he’s likely on the squash court or playing Chess.